mpty, @local}, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x444040) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r6, &(0x7f0000000640)="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", 0x260, 0x0, 0x0, 0x0) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 07:16:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5415, 0x100000001) 07:16:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0xffff, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x10, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) munlockall() setxattr$security_ima(0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) ioctl$TCSETAF(r1, 0x5408, &(0x7f00000002c0)={0x2, 0x3, 0x4, 0x1f, 0x6, 0x40, 0x3, 0x3d, 0x6, 0x2}) fchdir(r0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x8c74a4698e26b89f, 0x0) ioctl$TIOCGDEV(r3, 0x80045432, &(0x7f0000000140)) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e24, 0x5, @mcast1, 0x710}], 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r4, &(0x7f0000000580)=ANY=[@ANYBLOB="a7724bdef64346bc14b7b0f781d1d3abf9d1a51c4bfce1e77551a8bd678625df08300200000040847bc2fdffe8cd918b035041291559f3ee3a46069062af9680d512f4d8a5c51817c3ff01a1f62ac71e85445d8f244f6be479ffffffffff8756ea7d486588272169d8b90f1d7106f5776f7894ee47382b8811e658a49a0eba9b9d6a05995f5ed199fcf8722be75fa42c080601d48e793d1429196b4d9182f7c46359a074"], 0xa4) sendfile(r4, r4, &(0x7f0000000000), 0x8080fffffffe) 07:16:28 executing program 4: syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0xe1) ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, &(0x7f0000000180)={0x3, 0x0, 0x103, 0x5, {0x6, 0x8, 0x80000000, 0x1}}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x18, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r0 = inotify_init() r1 = inotify_add_watch(r0, &(0x7f0000000240)='.\x00', 0xc0000080) inotify_rm_watch(0xffffffffffffffff, r1) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, 0x0, &(0x7f00000000c0)) connect$l2tp(r3, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x0, 0x0, 0x1, 0x3, {0xa, 0x4e21, 0x40, @mcast2}}}, 0x32) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) r5 = syz_open_dev$admmidi(&(0x7f0000000740)='/dev/admmidi#\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f00000002c0)=ANY=[@ANYBLOB="b0516fb2e8e3e3bb78e5d4973d2e6502906f529504254f946253fb6ff85d9f4373d747287ea75e547170453c1a2c2eebd8a0481eae90d2c7fe3610075c90e8893cdfd9084ebe28d0fd961f898fc045d7c3d4a01dda0c02e1af73414f2b00040000cc882bf0654b01000087b30cb122fed84e49eded2a96c5926d38053bc63882706b760e174ad8ef8b52ce34105a538f4e9753db5f7dee09806b92aafdaf243ee3d7a222000000000000"], 0x4) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)=0xcb, 0x4) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @empty, @local}, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x444040) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r6, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r6, &(0x7f0000000640)="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", 0x260, 0x0, 0x0, 0x0) sendto$inet(r6, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) 07:16:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x1) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000180)) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x3, 0x67) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5416, 0x100000001) 07:16:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5418, 0x100000001) 07:16:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x1) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000180)) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x3, 0x67) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:28 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:28 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x802) unshare(0x400) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = eventfd2(0x0, 0x0) fadvise64(r3, 0x0, 0x0, 0x0) ioctl$USBDEVFS_CONTROL(r0, 0x8108551b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0}) 07:16:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x541b, 0x100000001) 07:16:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x1) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000180)) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x3, 0x67) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:29 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ion\x00', 0x0, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cuse\x00', 0x2, 0x0) r1 = socket(0x200000000000031, 0x3, 0x4) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f0000000000)='syz0\x00') openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) bind$isdn(r1, &(0x7f00000003c0)={0x22, 0xfffffffffffffff9, 0x1, 0x10001, 0x8}, 0x6) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'bridge_slave_1\x00'}) sendmmsg(r0, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0xffffff7a}}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='\x01\bEv/vcs#\x00', 0x7fc, 0x8400) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000200)) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000002c0)=0xc) r5 = syz_open_procfs(r4, 0x0) r6 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) ioctl$UFFDIO_API(r5, 0xc018aa3f, &(0x7f0000000480)={0xaa, 0x3}) r7 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r6, 0x6) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r9 = syz_open_procfs(r8, &(0x7f0000000600)='\x00\x00U\x00\xa3\x9f&0?\x8f\\\x01\x00\x00\x00\x00\xbf\x06\x8a\xa9\xcb3\xe1uf\xdc\x1a\x0e\b\x7f\xc7\x05$\xfdm\xd3y\xa0\xef\xe1\xb6\xe8\xb7 \xc2\x1bnY1\xb3\x8b9\xfb*y\xbe\x0f2\x13 U\xdc\x12\xbf\v/T\xfb%\t\xc9c\x9e\x9e\xe4?\xb1\xab\"\xc8\x15:&h\tZ[\x87\xd7\xaf\xaf6\xdf\xbd#\\\x14i\x1a\xfc\xbbA~\xf1\xe7\xb5\x87y\x1a\xda\xe5f\xd0\f\xd5x;\x00\x90\xcb\x8a\xe6\xdeJ\r\t\x9b\a\xae\xac+\xbc\xd6\xe5\xed\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00j,`\x8a\xf3\x85\n\x1d\xecVJ\\t\xe5;\x84\xd2\x036\f\x84]V\x9ew[\xbfb\xbe,\xa0\xb6\x82\x9b_=\x00\x00\x00\x00\x00\x00\x7f\xff\xc7J\xde\xbe\n\b9\xb2\x9b\t0\x17_7Q\xf6\xa9\xf3\xcd\x14\xab\'\x1e.\'>\x05\xcd,\x01w\xda\x94O\xe1\xe0t\xe0;\x9e\xe3\x9f\xe7\xc8\x81d\x19/5\x9b\x80\x9ei\xa3\x83\x85\xb6|\xe6S\xc1\'t\xb3\xdd\x1b\xa3m\xa3=\x1a:\xb6\xdf\xbd\x00X\xbf\xf7[,\xdd\x1dxa\x04\xcaD0\x00}|p\f\xc2kL\x18\xc9\xf5%\xe6\xc46\x1c\xb0>\xb5\x98\x01+N\xb4\x99b\x10\xa2\x12\xea\xf6[F3\xf5\xda\xcf\x8e\x84~\xe4E\xec\x84I\x85`!~\xa1\x0e\x8d\xbd\xcc\xd7\x9f\xe2\xb8s\xd8\xfa\x01_)\xc6\x7f\f\xc7L3\xd8\x03\xe1\\\x87\x05\x00\x00;!]\xff\xc1\x1f\xb4\xde\xfb=\xdf\x1b%\xd8\xd7\f\xa4\xed<\xeb\x1a\xa3\xd7\x89\x88BE\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf4\x18\nSZ\x1f\x06\x88\x9fHGo\xfe\x8c\x93\n\x9f\x9e/\x86\xe5zS\xbe\xea\xf3\x00C\x910To\xeegtEW\xab26\x11s,\x01\x10\xc7\xf65K\'\xf1b7\xffz\x17iA\x14\x97\xa5\xdb\x9c\xaeL*\x94n\v%\xcc\xb1v\x90\xc0\xb6\'\x91q9\x1c?$|\x8bch\xed\x87\xc3\xd57\a{\xb4\x00\x00\x00') ioctl$int_out(r9, 0x5460, &(0x7f0000001900)) ioctl$DRM_IOCTL_GET_STATS(r9, 0x80f86406, 0x0) setsockopt(r7, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r7, &(0x7f0000e5c000)={0x2, 0x4e21, @empty}, 0x10) syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x1400) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) dup3(r7, 0xffffffffffffffff, 0x0) r10 = accept(r6, 0x0, &(0x7f0000000080)=0x10058) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x8}, &(0x7f00000001c0)=0x8) r11 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) sendmmsg(r7, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppol2tpin6={0x18, 0x1, {0x0, r11, 0x2, 0x4, 0x2, 0x4, {0xa, 0x4e23, 0x3, @loopback, 0x2}}}, 0x80, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000840)="0f2cd78559fae92f93589037ac1c4dcfd1518f629dcaf4d5e1b6ca91a07a2c1d1878b4dbd4fb3801dda1e671ff8244ff9d3df4c8e2e9cbe253b406ff7c9e40b3176625df976ac2b52546954d9167357a2ea71dbb91c1435d189170e04ff510a9c52feeb2356983f58a1fed974d3062342d98d3ce0fd6b38fe12315632dee4b9de64e529c42b98f6b8127d9966cbcecf426", 0x91}, {&(0x7f0000000280)="4e8290accf6bef9a0bfbfe1563799deddb4ad2b6c3946be8ea555e0c9831b59b4adf4c12eff86bef0d0b81d78ef529271b48963b54dbb2490fd2f29c9fc5", 0x3e}, {0x0}], 0x4}}], 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r10, 0x1, 0x19, &(0x7f0000000400)='erspan0\x00', 0x700e) sendmmsg(r7, &(0x7f000000a080)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f0000001900)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 07:16:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) accept$inet(r0, 0x0, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) fadvise64(r1, 0x0, 0x0, 0x4) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000140)={0x8, 0x0, 0x3ff}) creat(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000040)={'HL\x00'}, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev}, 0x10) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 07:16:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x541d, 0x100000001) 07:16:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x1) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000180)) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x3, 0x67) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:29 executing program 4: write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="006d65e0029c8500786b6d6f767920"], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) socket$rds(0x15, 0x5, 0x0) [ 290.596629][ T26] audit: type=1400 audit(1573715789.219:59): avc: denied { name_connect } for pid=10624 comm="syz-executor.5" dest=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 07:16:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180), 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x541e, 0x100000001) 07:16:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x1) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000180)) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x2, 0x3, 0x67) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) [ 290.776377][ T26] audit: type=1400 audit(1573715789.389:60): avc: denied { name_bind } for pid=10635 comm="syz-executor.0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 07:16:29 executing program 4: write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="006d65e0029c8500786b6d6f767920"], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) socket$rds(0x15, 0x5, 0x0) 07:16:29 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) accept$inet(r0, 0x0, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) fadvise64(r1, 0x0, 0x0, 0x4) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000140)={0x8, 0x0, 0x3ff}) creat(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000040)={'HL\x00'}, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev}, 0x10) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 290.857173][ T26] audit: type=1400 audit(1573715789.399:61): avc: denied { node_bind } for pid=10635 comm="syz-executor.0" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 290.950556][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 290.956504][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:29 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180), 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:30 executing program 0: r0 = socket$kcm(0x10, 0x3, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}, 0x800) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x5, 0x123a02) sendmsg$inet_sctp(r1, &(0x7f0000000500)={&(0x7f0000000140)=@in6={0xa, 0x4e20, 0x18000, @empty, 0xff}, 0x1c, &(0x7f0000000480)=[{&(0x7f0000000180)="42f9eeeb89fa060bfb11e9bf7b47b899e4da3b19aa31174e9d0fcc83f95df0849f24e5bd1333c777d5ba704d9696f0e1decf096776b2759043179b8cf8bc850de9cb9a412d2fe0f5d6715af8b7732787f9491e88c6a939e9f8db5d5de2d6bbe10e9633f2945e3d43d3c4b9fb9b7e962de39d56650652368e13", 0x79}, {&(0x7f0000000200)="b24c0247491740a77101b256a6f336072f8190af894536be1172ce03d9a5f21401165686f0dd6677a5b2fec7f8a2e6e8a7a41e5dc22794139a44e97ca7c13a03245e9ced459a09f8b3876c1b56e1943d64989cc1c12e9e3d4166fbfa27e6a964ed6c9609f90a7d344b7e2623d47586544587a8c789bec3d75093a4adc81fca7848f5578ae9b5efdbee5b67ec0f3db8328f7de7bc4f82f687b483ad7dbb5a9992d5211109bacc2b433d7813", 0xab}, {&(0x7f00000002c0)="0c9dd07c4fda366c51ee3ea79b4b0e061f8eb7f3a7d2e9c27292fba7b88b2a96d93c72dd55b1232f978d3b206314608cfa2580e2068952a0d87d4c62a8e0cd5e8c3c4b89eb06a33d7284f6976295bdc0105104581eb2af662bcc53cb4cf95c5245dfc29a91c0e93a54853c", 0x6b}, {&(0x7f0000000340)="e7dfaef7f149920e38a40e43344c0bd1a6a13d298f343d97df12025924ff21e0e3d23fc0f38b61dfa4f2aac4ef86fa199fb7dce6f7fda116bc7dbf9dfdaaf280bd737f6df5882205d1b21e434c4f49db340f16d1d3840b02d782953f33f30d3b36061dcfd6346cd6459eaf3e6903b215d45a026e2136ce4b079f99cfc537710ea1dcfae7362de55110cc68e97789d43d27adb257db0feceb76491471d1a34c7984463da5cd23", 0xa6}, {&(0x7f0000000400)="864d4e4e3ae47b300e046e4f7be0623597b647d307a05ddde60aa6af9b5798aa121a2188412c5e26494c766c387bea638eba83ae64b146f09ae185993c0e8a2a88fa86b8bd0e37502e0ea7e8f539fc82b8cea17fc85b8f10f8de3d9b48a77b8c837b82b41c1fde1841d7666b19d08b58572cd5ec6e36", 0x76}], 0x5, 0x0, 0x0, 0x4000002}, 0x20040001) 07:16:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x1) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000180)) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:30 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x541f, 0x100000001) 07:16:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180), 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x0, 0x0) accept$inet(r0, 0x0, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) fadvise64(r1, 0x0, 0x0, 0x4) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000140)={0x8, 0x0, 0x3ff}) creat(0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000040)={'HL\x00'}, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) r2 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e23, @dev}, 0x10) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto$rxrpc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 07:16:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x60, 0x0, 0x800, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}]}, 0x60}}, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e5c1a8855e897ca1d518d2aecf0d", @ANYRES32=r2, @ANYBLOB="00000000ffffffff0000000008000100687462001c0002"], 0x3}}, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cachefiles\x00', 0x40, 0x0) ioctl$SG_GET_REQUEST_TABLE(r3, 0x2286, &(0x7f0000000440)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) pipe(&(0x7f0000000000)) r4 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r5 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r5, 0x1000000) sendfile(r4, r5, 0x0, 0xeefffdef) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r7 = dup2(r6, r0) write$UHID_SET_REPORT_REPLY(r7, &(0x7f0000000200)={0xe, 0x4000000, 0x0, 0x10}, 0xc) r8 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r9 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r9, 0x1000000) sendfile(r8, r9, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r8, &(0x7f0000000200), 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x0) r10 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r10, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) 07:16:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:30 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5420, 0x100000001) 07:16:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x1) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000180)) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:30 executing program 0: syz_mount_image$xfs(&(0x7f0000000340)='xfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={[{@filestreams='filestreams'}]}) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f00000006c0)={"2efd25309eaf019973f37baeee8537ac4a08712fb51a522380262418e82a0bfbdf3efa3af131ba06de1cefc573f5912ffddab14983537f59d60f5d27cdbe2314e510974c573152c7f035195e7fd2eea680af09aa4f7384fb23d012a0c37219e5f6f37d5ff0f8c721ef0b9a822d76eb0dba395d9ee2f3e8ad9bfa864d64a706c9182573a5a23bf3b09a951899249758a61aa099cfa535bee8b9c0db22977e4235b68fd1f8fbc2ca6cb1fc37b101e91644f77c77392d54091c3d6fbdc59b8fc722bff44aca4837548626ea35511bf0f9cbab2310b7a218317f6b1267584871a2222c30d57938954e036339404aa9ea51ba88a097fb2e19f800b6b5efd2325d3d68aca7c7ab7c621f716086be2529c5ba2d258282625aa755e87822eb6cf780946f51584ba57cc1ecf9c4be4fb44d25c2ea0ee2971e3913119ed81ddce251d5d43621a79ea0d07d6c1f11b3f655246fd5e091a5ae95f749b20f3b6fa20ee7a2d7c0599ef256f9984eb80b3aa2e624ce74f0678b32b052fe34fd270cda71b6994c30ab6a77c7a29508bc089d69a88332f20d68b1f538dc144a948c957c4fc609e86873838911587973e6956c17b731836ab87eca01a39c483c4fb2eea204d585e58ccb45cac57412d0392b42de0c417bf2fdba753b1ed1e995316c3191e4ed7288a3ddc64598f8ce7758c8b788d490c35c06b1e7b383dde9db3e9e45bfda86b7757c4383274fb83d51482fc45cd7c76c5abf217b494774d7f230693fc3596dd14047b1a105377f79866e2a4f885685c70cecc77d2e3813b2c599fdc2dd4eff6371f0fc13784f817c09b63ba6f71c6d0b1b51317958b5c7e48cacfe7442294e695a03ddb7d54d44f8e32603b61e91941e4e22c8cacea7704cbccfdf30538a102fc9532e62c524e10d04121a16d24e6648c8490a5cb4fb1a22efdfcc66c53667a746d81e00fe4d6a2fdc3acaa6f4fc21b5b068187d2dd984dc7596b6a80cda294a6960acfc2af29c63692b5a4d70cf7ac092a0c528e3adb95cc06b33b28f42b447440b222e1ade5ac59930c784cab57b4519a3437795eaceb7b73118a4da2052d3f9139683dfaf46a8558d3bd6f7c1c39cfb6df8babd54a4c15a8fb8ec8af7678e8e19b46c45917fc95d191a9e90df4a679cec6bc158a74fb0f8f28092a7d1c828ea391c9cf766cd62b629d33d0d8739501dfa91930ea768797dbf6b2a792a79ab73c8f9f925d417e755ec33bc9a6cef09977f8660192ff49ae15b48ee231512288e9f7b14704a695c45808d2fe4a0b0d21ad736c681fe38f3abdd30f7f923243a7ee9f1a9fd847887410093c2bbe9a53d87d87dcc95f5971c3e17aa6cb5db9ef97509070ad32772d39581d1598e31a99e3bd1ebdfac7df0d061913835be2769c6f13e0a3df08642c119c8099c5b1275a654adbd1867f7f2a45a26c543d391bf64ae8d"}) 07:16:30 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x9, &(0x7f0000000040), 0x4) getsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f0000000040)={@dev, @empty}, &(0x7f0000000080)=0x8) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='dctcp\x00', 0x38d) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000000)=0x9, 0x4) r2 = socket$inet(0x10, 0x3, 0x4) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000680)="4c0000001200ff09ff1cfe956fa283b724a6008000000000000008000000150024001d001fc41180b598bc593ab6821148a730de33aa46ffecfde0258823dd8da49848c6cea97da172dcc121", 0x4c}], 0x1}, 0x0) 07:16:30 executing program 5: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) r3 = socket(0x2, 0x3, 0x67) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") recvmsg$can_j1939(r3, &(0x7f0000000240)={&(0x7f00000001c0)=@ipx, 0x80, &(0x7f0000000080)=[{&(0x7f0000000000)=""/19, 0x13}], 0x1, &(0x7f0000000140)=""/20, 0x14}, 0x40000002) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000100)=0x50d060000) r4 = socket(0x2, 0x3, 0x67) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000280)) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x11, r2, 0x0) r5 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x2000000, 0x11, r5, 0x0) io_submit(r1, 0x4110, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 07:16:30 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5421, 0x100000001) 07:16:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:30 executing program 4: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000180)={0x5, 0x2, 0x4, 0x40, {0x77359400}, {0x5, 0x2, 0x3, 0x0, 0xf7, 0x5, "0a6f7f64"}, 0x2, 0x4, @userptr=0x5, 0x4}) syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) syz_open_dev$radio(0x0, 0x2, 0x2) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x59, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200), 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(0xffffffffffffffff, 0xc0305615, &(0x7f0000000040)={0x0, {0x2, 0x9}}) 07:16:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x1) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000180)) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) [ 292.358982][ T26] audit: type=1400 audit(1573715790.979:62): avc: denied { map } for pid=10710 comm="syz-executor.5" path="/dev/sg0" dev="devtmpfs" ino=18032 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=chr_file permissive=1 [ 292.418202][T10707] XFS (loop0): Invalid superblock magic number 07:16:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5422, 0x100000001) 07:16:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x1) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000180)) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x1) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000180)) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5423, 0x100000001) 07:16:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:31 executing program 4: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) syz_open_pts(r0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r3 = socket(0x2, 0x3, 0x67) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r4 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r5 = gettid() fcntl$setownex(r4, 0xf, &(0x7f0000000280)={0x2, r5}) fcntl$setlease(r4, 0x400, 0x1) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r6, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32=r7, @ANYBLOB="0000d604"], 0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r7, 0x8}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000480)=ANY=[@ANYRES32=r7, @ANYBLOB="0100b5050900e94100000000d900d00c73bec50c9e55b55278359a3d9e979e63c7bd1c74cf0781cd474d6dc2bd99bd7d0b751a88db08bd73895d5ca5f8303f1abd6682a75d65fd0f3bc79a59555d51f05b65df2d33274b2588aeaf8609dbfe0c1b5a295b9a98d3038833c71d9a5f00fb316482435e0b59743d6ba28411d0eefcd4ee33b9000000007fffffffaba5d4cf6dce8d8e29d98756ff803ffcdeb620e3a422167f0c90f1ea047eb2ef31571b32b9ce778aeec1d459361e45c92b704bb3840f5e7540ecd0e559d81c7d0033046b3403b6c826584877aacd38352b376d78de10f6cabbe69db0a1f363a0a875f4ef77c0ad5671f9f670cc739e09000000845510ad072df1c846590bceb86e78ee5426c1827393e9f22d43791e909088cba6246bc240c09c4b01d87296c51b3635e5457905fda1c55534adc24b0b1ffd40101b39c90ef9d120b9ad4ffb3704393e936284cdcd27f3234937c19760ca8eb1908a428e81d45413b398"], 0x2) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[@ANYRES32=r7, @ANYBLOB="71000000b908230f66a29ef0fe6ecad1d7f78ac7c24a237a160994d303467ab0c0a0e3361c26314be8f446211fcb97309ecfd68f42f4eb6c710c41bf0cf761d857d341f5612367567dc3b1c11a8b6f3938aee4685e47256bdf74d13c07b313d4f4a9b8eb36a6a3c5ccf3df59e26de7092064000000"], &(0x7f0000000140)=0x79) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000280)={0x80, 0x8001, 0x1, 0x1ff, 0x3f, 0xfff, 0x4806254f, 0x3, r8}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, 0x0, 0x0) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmmsg$inet_sctp(r9, &(0x7f0000001b40)=[{0x0, 0x0, 0x0}], 0x1, 0x0) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu\x00', 0x200002, 0x0) r11 = openat$cgroup_int(r10, &(0x7f0000000180)='cpuset.sched_load_balance\x00', 0x2, 0x0) write$cgroup_int(r11, &(0x7f0000000040)=0x4000000000000200, 0x12) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)='cpuset.sched_load_balance\x00', 0x2, 0x0) r12 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r12}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 293.030588][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 293.035220][ T26] audit: type=1804 audit(1573715791.659:63): pid=10765 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir790579713/syzkaller.19iKOL/41/file0" dev="sda1" ino=16683 res=1 [ 293.036467][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:31 executing program 0: ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104307, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet(r0, &(0x7f0000000100)="97267bf882f7087cdddacc46a828c7b2c380326774fb85d196f9cb735a8b498ef08b177b14faca4aac837d52d30a7ab2b05a5176c609c1a909663894242f9b20d020d44fa9a1546e9217933eafcd607db8e3c7e4bac1ac84c8024196d36b954342409aac0a17bf2cf616083d305048208b9798a97b080cabd145a9dd1e14551da94c84fd2ef642436b7ee40321c316ebaf15027b41a9e6842713672e408caf634a5ec56804343f74d6eb0952ff4065905319d9ed7a4342cec8fe49f9ed1c3ed3d6b144732ea274b124e39f6072f26933b0038e8af4e37ba80a83246f3110", 0xde, 0x4000000, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x23}}, 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x2}}, 0xe8) sendmmsg(r0, &(0x7f0000008440), 0x400000000000107, 0x8000) 07:16:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5424, 0x100000001) 07:16:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x1) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000180)) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x2, 0x0) write$FUSE_INIT(r1, &(0x7f0000000180)={0x50, 0x0, 0x3, {0x7, 0x1f, 0x9, 0xa2500, 0x7, 0x8, 0x3f, 0x2}}, 0x50) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") socket$kcm(0x10, 0x2, 0x10) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x6, 0x220000) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="2e0000001e000507ed0080648c6394f21531d200100003402c00000001000080000000011400f88000f01700d0bd", 0x2e}], 0x100000000000014d, 0x0, 0x6e}, 0x0) r3 = gettid() sched_rr_get_interval(r3, &(0x7f0000000080)) 07:16:31 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5425, 0x100000001) 07:16:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x1) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000180)) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) r4 = getpid() r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGRS485(r5, 0x542e, &(0x7f0000000100)) sched_setscheduler(r4, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x4, 0x2c0, 0x6, 0x91, 0x0, 0x0, 0x0, 0x6, 0x80000, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8000, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x10000, 0xffff, 0x3f, 0x1, 0x7f, 0x367, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x7) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) r8 = socket(0x2, 0x3, 0x67) ioctl(r1, 0x3ff, &(0x7f00000003c0)="0800b5055e0bcfe87b0071caa237656b9622a004000000000000009c44bdf580c2ed8acbf0dc9334cc31daf3e998eae3cb8e6c0c0cd9da9033c753292122f87d0ea65badf33f2c93c0660929dded261963a291b099a0863539da2339d153923f454963915e1d04acfef432c8143b5305f5bb707c8b57a3d568f325016b53b4d3ef64036707f31f2a72bc7125bab2aee8878e86aa669bd59ab5b850a90376") setsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000200)=0x1, 0x4) sendmsg$tipc(r7, &(0x7f0000000500)={&(0x7f0000000280), 0x10, &(0x7f00000002c0)=[{&(0x7f0000001580)="276c5bd6f0db828036f59b152925d176a9e51a4722f8fd829657ff48969c3c5f309ceaf42e7b242b7fe4fa128061aec9827004000c31fd9e31cb1c79990c2b89045ea4dc3ad63a775c80850ea10827e8a40a6c8b5fa7cc514639bb99f13c6a3d0825a738a1a53433042c75230d368c95f8a0b5562b58ecf50fd78e5def7375cd62fb5728535bf371b2ffc7d8058398075e1d0a7a4451395c39f79c26b7287cebd130de7737e77714686b9d67d87a3cf8da02cc70fdc99c1a7c916ae542b9d5baaf1f9daa4fb845fd5d5cad2073a61ce51c345150f84b3900997296d55c7d394af17b01d445465ef377508a1a29a5d6b03b0da22c973f22814fb2a802d50fb1f051e7d95d53d598a0599ec79cd27123fa1d13b7996609d4548e81ef7b1e8de8f32593ef46c3081ab55929a3c1cb1fa28a485518391a76b7b80d5941aa42222cb6f25be29ebc938af75971ffffdd4dea114ac37f38e69cb670020a7448d99b7b5e3d09bcf2625c94d6599182ce9edb0bbfea111dae3b1c9d6cd3162ce0aaebcdcf22a8d29dca0d04ebf5944168f398c500915579070586dff7a2ec6d345d1f69a8c749740aea0dbb2d30c9f7e3afd498a886c906fe09a83322d8e94b3ebe288ec1601e6a16122fa44191b6b3f5315eb0b35cb628540438919b906502eeb7cacc7d15753e456b056e6145ab65ac7c01253f3c5663495a74a0598feed07436a72d3ee1185d0fbcf89e8c5d449e0216cab8110efe923be24366dffc65bb386e7f015bb40b6fd9abbf7180b217f88d99f168c113f3ff187c202e2ae32a0238e43af612678a44a3d8373b6dc6bf820f8bf73e6411c51152f51993c66effe25c6e72a3127da6996f13691ded659e1f9d6eab1124435750dfeb60de2b2d59d9196bda3a3c5cd5054b2960481d50ce28ac4159b54f3f26a9decfc8ab36b6110eda741e21c95e3631b3de40fd3c7828fb0e3c85070eb233d4d4b1b75e0167ec62e81f1a12a0cd2e02a7a43edb384e4d0d59744bbe86611575966efe25b4191f14a368a72c13aeb4de7caff7a9439b583d08714fd22a9b1ff08297a562a859e2d21dd4f8ecf6701bcd9a30d28909c52c56a8ef739f0841ae895ad858121b1ec82ae1bbec856730aba8e2f42841c33caa862fdf8b651d90055b6725e5bf0af348ec550ad23c5a3c15c7455fdb13a57a6e452bdebbeb32200ab7dce3fab98b206ec2571e3de8904bea2265288dbaec64359cb5cd926dc025343fff78e7bdab6f541a3d2b569f37b8339d14e706163854d01ba5380d648391740e1fc2e118557692796acf6e0fa8ab21c5657259bf05a8b510eb285f306c8cdd6e185094b0ff46ec71d5a9b8e344176f263730468db893eaba00c32bdafdb1ebdc3ec441abaf4e7b2db744411ae02f33b340a373ea1a485b88073c2da7bd6828bbe4028fef4c30088c9b28daf899741029da8f52d2927250c582f16ca173c0761ad74364f562f3106a15d17d34ff27abc49b8a7d9aa3d2d2bd5c406c9fe21e59ffad1a85c3d1283f983efaab087a92ce4bc66c934605b658f56857301278b09f5e22ba0034a3944ae27bd20cf9cd4a7d1973d4818716d0bf71d922d74ef68ede2604a98f6db652206e0a34ceed21cb950eebbee9686fc368e2b42f9417b22ab84c1a341630f962560900e02f20cc0ed618e657fe4ede15f9a105620dd2206dbd74ba7f061f2d058a127f5ecb72ad12264d81816d82169d668adf80bbdd279c684e11980f72ba126d0326dbfe6736d2b737069e0c5efb7e76276f10fa915907d91282084fa9a12c5636fd265ef705f49adc9924ffcc68742b17c9212fe8abcc49e4db91ee543a7fd438e59d030d6fa1c31ebe151f9c44af0069df608f0395159c41339aaf31b4c3e67526036c7f4d96fdd5afa5c4c85f2a6648098dccd6a49a8250e26bce3ca0e78976c961432783947e3a8ff5430af9cfebf3d2ee72153b7bd4d7f2cce79da6defba02cc5a73f7fa137c01a2cea52a961d9504d959aec7e2627fc33d07ef45bb8afbded876bee54c7f2feacf548bbab68a782e7bbcb6140d6c6b3fbe1108a6f4dd750c0424a9e1e0b8f239c4739f28463a23fe011cb8c98e25126c5693f19f16ab8a4b6351ff2955a397c3618ae47c78b2d123c334082f9aae0d7f9e7b761d58ef7e1f6dd20a23c7bcc3e84dbc75551573c425e5d56ca84e263b22c2ed5ff1255e500c1810574ff1af28114221fa6e72439d5fc117700bf5a7e01e2ffc0cfeabfddb8ae217a7033c9c8dce5a685ca7a0f4ceeb153ab2ae77652e1d73e9510f868b70270e386664ab4c45ddf353e61aef1ac0c673502b7e7faae557df3eaa5fd0a3a00c54f23723ce6406f616f678b6f789c57e09864895dd8a1e5da9ff0bc7be9f9174af99e157e4c71ed69c71783abb3ad18141d99e49ef32614b8ac29eb50f64b2355f4b599acbdf039877d68275a2ebeb0729791412dfd3194cc2cb4f045a4d2ac74afffec582df03ce4afd2aedc594c6cd34a4cd21d4ea653b04d49a8aa1e942df36b530c90d0c2c62ef8369677ce2ffd4304b0410ff9ef86be8afbf55adc6abca02acf03dcab2fe5339ab0eb9d79dfc4817c5e2c10676904192395d9b8552760b0fa79add2769284a0ef5ebc4d61e64dc9a8b2d4770cdb4be4345026f6d04549140f4bb01e8252eb06d70afd84247f8023a0cc31329499a0efcd8a79e0832992a96b437258ab186c6a9c8f2e55fe7319605453b888d928730a11a11b4f56eec25b4c18b2205aad508a9f6850e6e23103a517cf43af019d54593803b76a3529777a58441d781d2eb509fcb723ba3be91d12c809f0148095e2066e1b0f0656ceeb751ad610e265bd4bc1b67f5e521ef420420e9b7e137f29240d63a42d678c1739f33f39a09a0f4c5249f808f41152a07ce9bfcc94e35683bea83f82a5e34e1fef3f8ea2cf4c9f1c8ccef87d7f58fc1b4ace6cb667e62ed1f54f72b3a156551d96f9a16ff4864ae3a01dc86b5c65e6676493f07d7257b34d8c6c5851334a4542dd2bea4aef4f444b5f26ac89a27e3313a4a66bdad09382357f1adbd61d526a2541022814cc4b2515aec30f74729d1a5826a3206c02ccd6adfb6c2b6c7aee33b7213bdbc5878151b50d1a8fdc1b2b9b44a01606770028723c848e1faf60b89de5a2e72b7d19f7745f7c89989ab2a8174291ad7d0f2b172672aba9f4a1b42df53baf6d353b45d755eff7526efa8a87a2aeaf84d9a434e8844a98eab172fa474b353f19e1231aca846d93eb24e650e015a42c578d23d794c02304ff72e358ea5c75f6709e587951d3900b3b1066ddd4a2fe9186d0cfcfcc7e33e9b882e8c2242ba990face580f94d66bb6a5212190fba3c1f1e046738c422d9e94ed6671157af9145bcfe7fd0d431a7a7c84a3eec802794286e2dc2b59e93fcb09ea22a1e47ee8f0b3cf756fb67bc3676819cbc67396322ea6be61552533b52a2fd258e82dc7c57a09211cce3e785f5b4deacae7b9dcd48080c9edb03d935c9c9a426bb6d3ec71e559af61b796827b5e425c991d3485381e0842b35cb0ad91154f4a13117b35d2a9ebfcf0ef68d73093dd483923f7b3a00e9c04c0eec31effc9f908f38949e1766409fc9c8cc48f95d4d537520159dd794edb56e824d31c67d9c7cbefdb51860a8d1f859baa9bf5c2752d00b6969e94d47a88be798f6df9e6b5977a56206c33a38e74ac5de0b23489c9f5a037e13ae0194beb9f954c6b8ebefa78194a4e891c12ddb43019e60d9b8e7fe78df65a83671b76fd1a9c7be064c6d822bb0749d2162168821484ab78f906cb990167a2f9e19a33be2086dd55e54cb8b6dbcd6d1cc9b4c828472d55db6f175547f73db54d142f290ef99e8e26f2c6ebc7a53bfe31fe1eb2ac6a13dd0081debcc346cc0d3407ff158bc48a314a18b7fa781e32b66f9eaa792031567fa8d5c33fd85ebf85af958ef84c0c69f2bc3f842bff08b4b3112a6ac24a78c9476f15d40de489e50fb5e426167a10739db436cb1a63f5e7b3baf7c21c3506d3021c487ce4625f66a18468c89c3a9c94c7c1c2676e1f21a26bc393cf83e7bdf9bf66c2e9dd080574e1a80fe152124e5191c9367f22b4a712322986165964ccc2b016f0fc52e69d009a2f9fc13f344153f17bcebf937f59714f44dfdc11e69c7216cdb4f4d2143222e41d7415b3ef52e45477f62def841cea29c6258a2a2d8c7895712c51025ed7fd5d68bf8aa5a96fbbba98090dac42ad69522f47288af9f6f7acd2406c42706a940300ab41a59488966dc63f4ce8a6e6e7b18c1cf7b3e5013441ad0d7f201343e4a64da2cd513782877cb35d00f2113147ec4d7410971968daa76b1b9ad115c9ef6e8fe6abeb8b372806dbccb26f504f3fb8fb26c97fc6dcc7091f2f940e76fc121b39f215cb5ee96383b0ad5dcb2f7671e1d75612b3992a8bfd9ef25545b75845991f64a26c87a8abbdde668be3e6fb8ebdc31e73eb4eafda15215e0b545907a86c0fa3d5f1af4cf096cd7ec9c31dd57851203a2ce0c4cfecefe63e43ec9335f00fe3195965d0602bdf0fb36a8b4c6a538f18c002895f4d33968901c0228fbbfd250ae07075c9c3d8e3233027ca1ba82586797b9c3fd5c256c9562789f4393908ecba4bbd26a49672d71098198efe77b3661a2114c3b919330e67cd0ae6e90d88e1922750b6d36bde8926f9c635fbe0b1016f016af69965d762ebcab348ea4fe695007c9e1f91b8f7019a3206627751c8216dae9857569f152888ba8876b51d5d73bffb3c5544500e1121d72a0d2ca9b382bae36c36fdb5680b5973ec3529eefc2077654f5ec0021d473c221d544d6c0b56c48926ece451f01bd3b2746f6ccb0a44a2e934eefbc24c8f4ced796e4941bb6363d2bf0af8834e0dde49632c228477fcbae8d6667c5996aeb14eac620e35a1b3a3b29c4122c91f92a2f9917291c04cfb9ef91215d8b0dffccd082474c9a2ee26ab2139d4428c74efd41f820d671b4255253abad18028b4d19715ba084eaa884dcc975da4c316ac3f8c056a2dc1215bd1db2fd504169e6dab0494bc8e02d4374f061c517d424b0050b678fb240df83d19c0f9a71465541f706cf976f6f653a216dc290698158864c941067577cc0b54c8ccae532de0ec0ddc67d4a22f5c9dcee990b7ae21567991bb1fa1f83d51114f00248735a3b884311b695a65fe6671db499588fd69c79baa8962d6f4331e3dda9b3d7075b2240d58cbe88521c4bfab84066a6b69fbcbc3cb6cbf", 0x101d0}], 0x1, 0x0, 0x0, 0x4000}, 0x0) close(0xffffffffffffffff) [ 293.624080][ T26] audit: type=1804 audit(1573715792.249:64): pid=10770 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir790579713/syzkaller.19iKOL/41/file0" dev="sda1" ino=16683 res=1 [ 293.668460][ T26] audit: type=1400 audit(1573715792.289:65): avc: denied { map_create } for pid=10795 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:16:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x1) ioctl$KVM_GET_REGS(r1, 0x8090ae81, &(0x7f0000000180)) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:32 executing program 4: syz_open_dev$char_usb(0xc, 0xb4, 0x7e1) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x1000000, &(0x7f0000000100)={[{@xino_off='xino=off'}, {@metacopy_off='metacopy=off'}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 07:16:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5427, 0x100000001) 07:16:32 executing program 0: ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104307, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet(r0, &(0x7f0000000100)="97267bf882f7087cdddacc46a828c7b2c380326774fb85d196f9cb735a8b498ef08b177b14faca4aac837d52d30a7ab2b05a5176c609c1a909663894242f9b20d020d44fa9a1546e9217933eafcd607db8e3c7e4bac1ac84c8024196d36b954342409aac0a17bf2cf616083d305048208b9798a97b080cabd145a9dd1e14551da94c84fd2ef642436b7ee40321c316ebaf15027b41a9e6842713672e408caf634a5ec56804343f74d6eb0952ff4065905319d9ed7a4342cec8fe49f9ed1c3ed3d6b144732ea274b124e39f6072f26933b0038e8af4e37ba80a83246f3110", 0xde, 0x4000000, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x23}}, 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x2}}, 0xe8) sendmmsg(r0, &(0x7f0000008440), 0x400000000000107, 0x8000) 07:16:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x1) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:32 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5428, 0x100000001) [ 294.220129][T10817] overlayfs: option "workdir=./file1\" is useless in a non-upper mount, ignore 07:16:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) r4 = getpid() r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGRS485(r5, 0x542e, &(0x7f0000000100)) sched_setscheduler(r4, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x4, 0x2c0, 0x6, 0x91, 0x0, 0x0, 0x0, 0x6, 0x80000, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8000, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x10000, 0xffff, 0x3f, 0x1, 0x7f, 0x367, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x7) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) r8 = socket(0x2, 0x3, 0x67) ioctl(r1, 0x3ff, &(0x7f00000003c0)="0800b5055e0bcfe87b0071caa237656b9622a004000000000000009c44bdf580c2ed8acbf0dc9334cc31daf3e998eae3cb8e6c0c0cd9da9033c753292122f87d0ea65badf33f2c93c0660929dded261963a291b099a0863539da2339d153923f454963915e1d04acfef432c8143b5305f5bb707c8b57a3d568f325016b53b4d3ef64036707f31f2a72bc7125bab2aee8878e86aa669bd59ab5b850a90376") setsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000200)=0x1, 0x4) sendmsg$tipc(r7, &(0x7f0000000500)={&(0x7f0000000280), 0x10, &(0x7f00000002c0)=[{&(0x7f0000001580)="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", 0x101d0}], 0x1, 0x0, 0x0, 0x4000}, 0x0) close(0xffffffffffffffff) [ 294.283450][T10817] overlayfs: missing 'lowerdir' 07:16:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x1) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5429, 0x100000001) 07:16:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) r4 = getpid() r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGRS485(r5, 0x542e, &(0x7f0000000100)) sched_setscheduler(r4, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x4, 0x2c0, 0x6, 0x91, 0x0, 0x0, 0x0, 0x6, 0x80000, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8000, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x10000, 0xffff, 0x3f, 0x1, 0x7f, 0x367, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x7) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) r8 = socket(0x2, 0x3, 0x67) ioctl(r1, 0x3ff, &(0x7f00000003c0)="0800b5055e0bcfe87b0071caa237656b9622a004000000000000009c44bdf580c2ed8acbf0dc9334cc31daf3e998eae3cb8e6c0c0cd9da9033c753292122f87d0ea65badf33f2c93c0660929dded261963a291b099a0863539da2339d153923f454963915e1d04acfef432c8143b5305f5bb707c8b57a3d568f325016b53b4d3ef64036707f31f2a72bc7125bab2aee8878e86aa669bd59ab5b850a90376") setsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000200)=0x1, 0x4) sendmsg$tipc(r7, &(0x7f0000000500)={&(0x7f0000000280), 0x10, &(0x7f00000002c0)=[{&(0x7f0000001580)="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", 0x101d0}], 0x1, 0x0, 0x0, 0x4000}, 0x0) close(0xffffffffffffffff) 07:16:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x1) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:33 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5437, 0x100000001) 07:16:33 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) r4 = getpid() r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGRS485(r5, 0x542e, &(0x7f0000000100)) sched_setscheduler(r4, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x4, 0x2c0, 0x6, 0x91, 0x0, 0x0, 0x0, 0x6, 0x80000, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8000, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x10000, 0xffff, 0x3f, 0x1, 0x7f, 0x367, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x7) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) r8 = socket(0x2, 0x3, 0x67) ioctl(r1, 0x3ff, &(0x7f00000003c0)="0800b5055e0bcfe87b0071caa237656b9622a004000000000000009c44bdf580c2ed8acbf0dc9334cc31daf3e998eae3cb8e6c0c0cd9da9033c753292122f87d0ea65badf33f2c93c0660929dded261963a291b099a0863539da2339d153923f454963915e1d04acfef432c8143b5305f5bb707c8b57a3d568f325016b53b4d3ef64036707f31f2a72bc7125bab2aee8878e86aa669bd59ab5b850a90376") setsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000200)=0x1, 0x4) sendmsg$tipc(r7, &(0x7f0000000500)={&(0x7f0000000280), 0x10, &(0x7f00000002c0)=[{&(0x7f0000001580)="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", 0x101d0}], 0x1, 0x0, 0x0, 0x4000}, 0x0) close(0xffffffffffffffff) 07:16:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) r4 = getpid() r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGRS485(r5, 0x542e, &(0x7f0000000100)) sched_setscheduler(r4, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x4, 0x2c0, 0x6, 0x91, 0x0, 0x0, 0x0, 0x6, 0x80000, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8000, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x10000, 0xffff, 0x3f, 0x1, 0x7f, 0x367, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x7) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) r8 = socket(0x2, 0x3, 0x67) ioctl(r1, 0x3ff, &(0x7f00000003c0)="0800b5055e0bcfe87b0071caa237656b9622a004000000000000009c44bdf580c2ed8acbf0dc9334cc31daf3e998eae3cb8e6c0c0cd9da9033c753292122f87d0ea65badf33f2c93c0660929dded261963a291b099a0863539da2339d153923f454963915e1d04acfef432c8143b5305f5bb707c8b57a3d568f325016b53b4d3ef64036707f31f2a72bc7125bab2aee8878e86aa669bd59ab5b850a90376") setsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000200)=0x1, 0x4) sendmsg$tipc(r7, &(0x7f0000000500)={&(0x7f0000000280), 0x10, &(0x7f00000002c0)=[{&(0x7f0000001580)="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", 0x101d0}], 0x1, 0x0, 0x0, 0x4000}, 0x0) close(0xffffffffffffffff) 07:16:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5441, 0x100000001) 07:16:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:33 executing program 4: ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104307, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x803, 0x2) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet(r0, &(0x7f0000000100)="97267bf882f7087cdddacc46a828c7b2c380326774fb85d196f9cb735a8b498ef08b177b14faca4aac837d52d30a7ab2b05a5176c609c1a909663894242f9b20d020d44fa9a1546e9217933eafcd607db8e3c7e4bac1ac84c8024196d36b954342409aac0a17bf2cf616083d305048208b9798a97b080cabd145a9dd1e14551da94c84fd2ef642436b7ee40321c316ebaf15027b41a9e6842713672e408caf634a5ec56804343f74d6eb0952ff4065905319d9ed7a4342cec8fe49f9ed1c3ed3d6b144732ea274b124e39f6072f26933b0038e8af4e37ba80a83246f3110", 0xde, 0x4000000, &(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x23}}, 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001}, {{@in6=@empty, 0x0, 0x3c}, 0x0, @in=@empty, 0x0, 0x4, 0x0, 0x2}}, 0xe8) sendmmsg(r0, &(0x7f0000008440), 0x400000000000107, 0x8000) [ 295.110559][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 295.116512][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 295.190634][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 295.196533][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5450, 0x100000001) 07:16:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5451, 0x100000001) [ 295.430552][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 295.436458][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)=0x80000) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000040), 0x0) ftruncate(r3, 0x200004) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r4, 0x0, 0x41, &(0x7f0000000180)={'raw\x00', 0x89, "c2df62ad5255edad558dd948eef09670398f27e02e3760d9ad13b865ae77a9cfe5dd1444c14e1561ffc26b764ef2479a28082df82166832ab80c8e37c51e0080667da537dc2a6553db2f3a1dc51a3b0d88893e497a990ec069d025ed1f0289d4c0630a23325ebcd6606fda1cbb097933e749a16d899e53a20dd2c75831f1150f1ae6b358c98050f2b7"}, &(0x7f0000000100)=0xad) sendfile(r0, r3, 0x0, 0x80001d00c0d4) 07:16:34 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:34 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5452, 0x100000001) 07:16:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3}, 0x2c) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r0) r4 = getpid() r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$TIOCGRS485(r5, 0x542e, &(0x7f0000000100)) sched_setscheduler(r4, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x4, 0x2c0, 0x6, 0x91, 0x0, 0x0, 0x0, 0x6, 0x80000, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8000, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x10000, 0xffff, 0x3f, 0x1, 0x7f, 0x367, 0x5}, r4, 0xd, 0xffffffffffffffff, 0x7) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r6) setsockopt$sock_attach_bpf(r7, 0x10f, 0x87, &(0x7f0000000180), 0x127) r8 = socket(0x2, 0x3, 0x67) ioctl(r1, 0x3ff, &(0x7f00000003c0)="0800b5055e0bcfe87b0071caa237656b9622a004000000000000009c44bdf580c2ed8acbf0dc9334cc31daf3e998eae3cb8e6c0c0cd9da9033c753292122f87d0ea65badf33f2c93c0660929dded261963a291b099a0863539da2339d153923f454963915e1d04acfef432c8143b5305f5bb707c8b57a3d568f325016b53b4d3ef64036707f31f2a72bc7125bab2aee8878e86aa669bd59ab5b850a90376") setsockopt$netrom_NETROM_T1(r8, 0x103, 0x1, &(0x7f0000000200)=0x1, 0x4) sendmsg$tipc(r7, &(0x7f0000000500)={&(0x7f0000000280), 0x10, &(0x7f00000002c0)=[{&(0x7f0000001580)="276c5bd6f0db828036f59b152925d176a9e51a4722f8fd829657ff48969c3c5f309ceaf42e7b242b7fe4fa128061aec9827004000c31fd9e31cb1c79990c2b89045ea4dc3ad63a775c80850ea10827e8a40a6c8b5fa7cc514639bb99f13c6a3d0825a738a1a53433042c75230d368c95f8a0b5562b58ecf50fd78e5def7375cd62fb5728535bf371b2ffc7d8058398075e1d0a7a4451395c39f79c26b7287cebd130de7737e77714686b9d67d87a3cf8da02cc70fdc99c1a7c916ae542b9d5baaf1f9daa4fb845fd5d5cad2073a61ce51c345150f84b3900997296d55c7d394af17b01d445465ef377508a1a29a5d6b03b0da22c973f22814fb2a802d50fb1f051e7d95d53d598a0599ec79cd27123fa1d13b7996609d4548e81ef7b1e8de8f32593ef46c3081ab55929a3c1cb1fa28a485518391a76b7b80d5941aa42222cb6f25be29ebc938af75971ffffdd4dea114ac37f38e69cb670020a7448d99b7b5e3d09bcf2625c94d6599182ce9edb0bbfea111dae3b1c9d6cd3162ce0aaebcdcf22a8d29dca0d04ebf5944168f398c500915579070586dff7a2ec6d345d1f69a8c749740aea0dbb2d30c9f7e3afd498a886c906fe09a83322d8e94b3ebe288ec1601e6a16122fa44191b6b3f5315eb0b35cb628540438919b906502eeb7cacc7d15753e456b056e6145ab65ac7c01253f3c5663495a74a0598feed07436a72d3ee1185d0fbcf89e8c5d449e0216cab8110efe923be24366dffc65bb386e7f015bb40b6fd9abbf7180b217f88d99f168c113f3ff187c202e2ae32a0238e43af612678a44a3d8373b6dc6bf820f8bf73e6411c51152f51993c66effe25c6e72a3127da6996f13691ded659e1f9d6eab1124435750dfeb60de2b2d59d9196bda3a3c5cd5054b2960481d50ce28ac4159b54f3f26a9decfc8ab36b6110eda741e21c95e3631b3de40fd3c7828fb0e3c85070eb233d4d4b1b75e0167ec62e81f1a12a0cd2e02a7a43edb384e4d0d59744bbe86611575966efe25b4191f14a368a72c13aeb4de7caff7a9439b583d08714fd22a9b1ff08297a562a859e2d21dd4f8ecf6701bcd9a30d28909c52c56a8ef739f0841ae895ad858121b1ec82ae1bbec856730aba8e2f42841c33caa862fdf8b651d90055b6725e5bf0af348ec550ad23c5a3c15c7455fdb13a57a6e452bdebbeb32200ab7dce3fab98b206ec2571e3de8904bea2265288dbaec64359cb5cd926dc025343fff78e7bdab6f541a3d2b569f37b8339d14e706163854d01ba5380d648391740e1fc2e118557692796acf6e0fa8ab21c5657259bf05a8b510eb285f306c8cdd6e185094b0ff46ec71d5a9b8e344176f263730468db893eaba00c32bdafdb1ebdc3ec441abaf4e7b2db744411ae02f33b340a373ea1a485b88073c2da7bd6828bbe4028fef4c30088c9b28daf899741029da8f52d2927250c582f16ca173c0761ad74364f562f3106a15d17d34ff27abc49b8a7d9aa3d2d2bd5c406c9fe21e59ffad1a85c3d1283f983efaab087a92ce4bc66c934605b658f56857301278b09f5e22ba0034a3944ae27bd20cf9cd4a7d1973d4818716d0bf71d922d74ef68ede2604a98f6db652206e0a34ceed21cb950eebbee9686fc368e2b42f9417b22ab84c1a341630f962560900e02f20cc0ed618e657fe4ede15f9a105620dd2206dbd74ba7f061f2d058a127f5ecb72ad12264d81816d82169d668adf80bbdd279c684e11980f72ba126d0326dbfe6736d2b737069e0c5efb7e76276f10fa915907d91282084fa9a12c5636fd265ef705f49adc9924ffcc68742b17c9212fe8abcc49e4db91ee543a7fd438e59d030d6fa1c31ebe151f9c44af0069df608f0395159c41339aaf31b4c3e67526036c7f4d96fdd5afa5c4c85f2a6648098dccd6a49a8250e26bce3ca0e78976c961432783947e3a8ff5430af9cfebf3d2ee72153b7bd4d7f2cce79da6defba02cc5a73f7fa137c01a2cea52a961d9504d959aec7e2627fc33d07ef45bb8afbded876bee54c7f2feacf548bbab68a782e7bbcb6140d6c6b3fbe1108a6f4dd750c0424a9e1e0b8f239c4739f28463a23fe011cb8c98e25126c5693f19f16ab8a4b6351ff2955a397c3618ae47c78b2d123c334082f9aae0d7f9e7b761d58ef7e1f6dd20a23c7bcc3e84dbc75551573c425e5d56ca84e263b22c2ed5ff1255e500c1810574ff1af28114221fa6e72439d5fc117700bf5a7e01e2ffc0cfeabfddb8ae217a7033c9c8dce5a685ca7a0f4ceeb153ab2ae77652e1d73e9510f868b70270e386664ab4c45ddf353e61aef1ac0c673502b7e7faae557df3eaa5fd0a3a00c54f23723ce6406f616f678b6f789c57e09864895dd8a1e5da9ff0bc7be9f9174af99e157e4c71ed69c71783abb3ad18141d99e49ef32614b8ac29eb50f64b2355f4b599acbdf039877d68275a2ebeb0729791412dfd3194cc2cb4f045a4d2ac74afffec582df03ce4afd2aedc594c6cd34a4cd21d4ea653b04d49a8aa1e942df36b530c90d0c2c62ef8369677ce2ffd4304b0410ff9ef86be8afbf55adc6abca02acf03dcab2fe5339ab0eb9d79dfc4817c5e2c10676904192395d9b8552760b0fa79add2769284a0ef5ebc4d61e64dc9a8b2d4770cdb4be4345026f6d04549140f4bb01e8252eb06d70afd84247f8023a0cc31329499a0efcd8a79e0832992a96b437258ab186c6a9c8f2e55fe7319605453b888d928730a11a11b4f56eec25b4c18b2205aad508a9f6850e6e23103a517cf43af019d54593803b76a3529777a58441d781d2eb509fcb723ba3be91d12c809f0148095e2066e1b0f0656ceeb751ad610e265bd4bc1b67f5e521ef420420e9b7e137f29240d63a42d678c1739f33f39a09a0f4c5249f808f41152a07ce9bfcc94e35683bea83f82a5e34e1fef3f8ea2cf4c9f1c8ccef87d7f58fc1b4ace6cb667e62ed1f54f72b3a156551d96f9a16ff4864ae3a01dc86b5c65e6676493f07d7257b34d8c6c5851334a4542dd2bea4aef4f444b5f26ac89a27e3313a4a66bdad09382357f1adbd61d526a2541022814cc4b2515aec30f74729d1a5826a3206c02ccd6adfb6c2b6c7aee33b7213bdbc5878151b50d1a8fdc1b2b9b44a01606770028723c848e1faf60b89de5a2e72b7d19f7745f7c89989ab2a8174291ad7d0f2b172672aba9f4a1b42df53baf6d353b45d755eff7526efa8a87a2aeaf84d9a434e8844a98eab172fa474b353f19e1231aca846d93eb24e650e015a42c578d23d794c02304ff72e358ea5c75f6709e587951d3900b3b1066ddd4a2fe9186d0cfcfcc7e33e9b882e8c2242ba990face580f94d66bb6a5212190fba3c1f1e046738c422d9e94ed6671157af9145bcfe7fd0d431a7a7c84a3eec802794286e2dc2b59e93fcb09ea22a1e47ee8f0b3cf756fb67bc3676819cbc67396322ea6be61552533b52a2fd258e82dc7c57a09211cce3e785f5b4deacae7b9dcd48080c9edb03d935c9c9a426bb6d3ec71e559af61b796827b5e425c991d3485381e0842b35cb0ad91154f4a13117b35d2a9ebfcf0ef68d73093dd483923f7b3a00e9c04c0eec31effc9f908f38949e1766409fc9c8cc48f95d4d537520159dd794edb56e824d31c67d9c7cbefdb51860a8d1f859baa9bf5c2752d00b6969e94d47a88be798f6df9e6b5977a56206c33a38e74ac5de0b23489c9f5a037e13ae0194beb9f954c6b8ebefa78194a4e891c12ddb43019e60d9b8e7fe78df65a83671b76fd1a9c7be064c6d822bb0749d2162168821484ab78f906cb990167a2f9e19a33be2086dd55e54cb8b6dbcd6d1cc9b4c828472d55db6f175547f73db54d142f290ef99e8e26f2c6ebc7a53bfe31fe1eb2ac6a13dd0081debcc346cc0d3407ff158bc48a314a18b7fa781e32b66f9eaa792031567fa8d5c33fd85ebf85af958ef84c0c69f2bc3f842bff08b4b3112a6ac24a78c9476f15d40de489e50fb5e426167a10739db436cb1a63f5e7b3baf7c21c3506d3021c487ce4625f66a18468c89c3a9c94c7c1c2676e1f21a26bc393cf83e7bdf9bf66c2e9dd080574e1a80fe152124e5191c9367f22b4a712322986165964ccc2b016f0fc52e69d009a2f9fc13f344153f17bcebf937f59714f44dfdc11e69c7216cdb4f4d2143222e41d7415b3ef52e45477f62def841cea29c6258a2a2d8c7895712c51025ed7fd5d68bf8aa5a96fbbba98090dac42ad69522f47288af9f6f7acd2406c42706a940300ab41a59488966dc63f4ce8a6e6e7b18c1cf7b3e5013441ad0d7f201343e4a64da2cd513782877cb35d00f2113147ec4d7410971968daa76b1b9ad115c9ef6e8fe6abeb8b372806dbccb26f504f3fb8fb26c97fc6dcc7091f2f940e76fc121b39f215cb5ee96383b0ad5dcb2f7671e1d75612b3992a8bfd9ef25545b75845991f64a26c87a8abbdde668be3e6fb8ebdc31e73eb4eafda15215e0b545907a86c0fa3d5f1af4cf096cd7ec9c31dd57851203a2ce0c4cfecefe63e43ec9335f00fe3195965d0602bdf0fb36a8b4c6a538f18c002895f4d33968901c0228fbbfd250ae07075c9c3d8e3233027ca1ba82586797b9c3fd5c256c9562789f4393908ecba4bbd26a49672d71098198efe77b3661a2114c3b919330e67cd0ae6e90d88e1922750b6d36bde8926f9c635fbe0b1016f016af69965d762ebcab348ea4fe695007c9e1f91b8f7019a3206627751c8216dae9857569f152888ba8876b51d5d73bffb3c5544500e1121d72a0d2ca9b382bae36c36fdb5680b5973ec3529eefc2077654f5ec0021d473c221d544d6c0b56c48926ece451f01bd3b2746f6ccb0a44a2e934eefbc24c8f4ced796e4941bb6363d2bf0af8834e0dde49632c228477fcbae8d6667c5996aeb14eac620e35a1b3a3b29c4122c91f92a2f9917291c04cfb9ef91215d8b0dffccd082474c9a2ee26ab2139d4428c74efd41f820d671b4255253abad18028b4d19715ba084eaa884dcc975da4c316ac3f8c056a2dc1215bd1db2fd504169e6dab0494bc8e02d4374f061c517d424b0050b678fb240df83d19c0f9a71465541f706cf976f6f653a216dc290698158864c941067577cc0b54c8ccae532de0ec0ddc67d4a22f5c9dcee990b7ae21567991bb1fa1f83d51114f00248735a3b884311b695a65fe6671db499588fd69c79baa8962d6f4331e3dda9b3d7075b2240d58cbe88521c4bfab84066a6b69fbcbc3cb6cbf", 0x101d0}], 0x1, 0x0, 0x0, 0x4000}, 0x0) close(0xffffffffffffffff) 07:16:34 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x545d, 0x100000001) [ 296.056362][ T26] audit: type=1800 audit(1573715794.679:66): pid=10898 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.0" name="bus" dev="sda1" ino=16697 res=0 [ 296.081105][ C1] net_ratelimit: 4 callbacks suppressed [ 296.081150][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 296.092706][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:16:34 executing program 0: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x2a000, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f0000000200)="b805000000b9510000000f01c10f46a78900000066ba2100b07bee66ba4100edb9800000830f32b9800000c00f3235000100000f300f304f215c66b808008ed0660f38806f000f011c268ee0", 0xfffffffffffffdfd}], 0x1, 0x2, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r3, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="580000000000000014010000070000000300000004000000", @ANYPTR=&(0x7f0000000640)=ANY=[], @ANYPTR, @ANYBLOB="0100000000000000050000000000000008000000000000000500000000000000700000000000000002000000000000007bf8011511fd528c12a20885a8881f76acbef167fc0e42da13"], 0x58}, 0x0) socket$inet(0x2, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='team_slave_1\x00') syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x1, 0x30400) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000004cb]}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 07:16:34 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5460, 0x100000001) [ 296.374081][T10919] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 07:16:35 executing program 4: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000240)="200000001800010000000066835f67081c1400000010004617433892ba2b1400", 0x20) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xed3, 0x80000) write$P9_RLCREATE(r1, &(0x7f0000000040)={0x18, 0xf, 0x1, {{0x0, 0x3, 0x2}, 0xffffff95}}, 0x18) 07:16:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x2f, 0x3ff, 0x0, 0x0, {0xa}, [@typed={0x8, 0x3, @str='\x00'}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@initdev}}, &(0x7f00000003c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001c80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003400)={{{@in=@remote, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000003500)=0xe8) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800120008000100736974000c00020008000300c2aa9c1f9dd736ce7dd69f7774b3f675bcaf3449679b485cb12801790a2d07b6eeaff6fb5a345d552258cab27c616b187d64432e20085cca8f9970ac4a80446f6218be4ba8631180d87b5b4209294bc3e167fce7f49f6f2d71057fd14259536c143b50b03e", @ANYRES32=r4], 0x38}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r10}]]}}}]}, 0x38}}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r13}]]}}}]}, 0x38}}, 0x0) r14 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r14, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x2f, 0x3ff, 0x0, 0x0, {0xa}, [@typed={0x8, 0x3, @str='\x00'}]}, 0x1c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r14, 0x8933, &(0x7f00000036c0)={'team0\x00'}) r15 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') r16 = socket$netlink(0x10, 0x3, 0x0) sendfile(r16, r15, 0x0, 0x33fe0) getpeername$packet(r15, &(0x7f0000003700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003740)=0x14) getpeername(r0, &(0x7f0000003780)=@can, &(0x7f0000003800)=0x80) 07:16:35 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:35 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x6364, 0x100000001) [ 296.598094][T10936] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 296.680103][T10936] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 07:16:35 executing program 4: pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r2, 0x0, r3) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r4, 0x110, 0x4, &(0x7f0000000000)=0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, 0x0, &(0x7f00000000c0)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r5, 0xc0096616, &(0x7f0000000040)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@mmap='mmap'}]}}) [ 296.769494][T10935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10935 comm=syz-executor.5 [ 296.800416][T10935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10935 comm=syz-executor.5 [ 296.821919][T10935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10935 comm=syz-executor.5 [ 296.844019][T10935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10935 comm=syz-executor.5 [ 296.878561][T10935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10935 comm=syz-executor.5 07:16:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x8912, 0x100000001) [ 296.942157][T10935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10935 comm=syz-executor.5 [ 297.012151][T10935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10935 comm=syz-executor.5 07:16:35 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) [ 297.077134][T10935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10935 comm=syz-executor.5 [ 297.157449][T10935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10935 comm=syz-executor.5 [ 297.190560][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 297.196493][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 297.230957][T10935] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=10935 comm=syz-executor.5 [ 297.270598][ C0] protocol 88fb is buggy, dev hsr_slave_0 07:16:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x8933, 0x100000001) 07:16:35 executing program 0: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) io_setup(0x83, &(0x7f00000003c0)=0x0) fcntl$setstatus(r0, 0x4, 0x44800) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000200), 0xc) r4 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r5 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r5, 0x1000000) sendfile(r4, r5, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000200), 0xc) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f0000000000)={0x2, r4}) r6 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x800003, 0x11, r6, 0x0) r7 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) r8 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$UI_SET_PROPBIT(r8, 0x4004556e, 0x1c) ftruncate(r7, 0x8200) ioctl$EXT4_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000080)) io_submit(r1, 0x0, &(0x7f0000000540)) [ 297.276536][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0x4}]}, 0x30}}, 0x0) r0 = socket(0x2, 0x3, 0x67) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000000c0)={0x81, 0x3, 0x3b, 0x58}, 0x6) 07:16:35 executing program 2: r0 = socket$inet6(0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x40045431, 0x100000001) [ 297.510544][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 297.516555][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x40045436, 0x100000001) 07:16:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x2f, 0x3ff, 0x0, 0x0, {0xa}, [@typed={0x8, 0x3, @str='\x00'}]}, 0x1c}}, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6=@initdev}}, &(0x7f00000003c0)=0xe8) accept$packet(0xffffffffffffffff, &(0x7f0000001c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001c80)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003400)={{{@in=@remote, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000003500)=0xe8) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001800120008000100736974000c00020008000300c2aa9c1f9dd736ce7dd69f7774b3f675bcaf3449679b485cb12801790a2d07b6eeaff6fb5a345d552258cab27c616b187d64432e20085cca8f9970ac4a80446f6218be4ba8631180d87b5b4209294bc3e167fce7f49f6f2d71057fd14259536c143b50b03e", @ANYRES32=r4], 0x38}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r7}]]}}}]}, 0x38}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r10}]]}}}]}, 0x38}}, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) r12 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r12, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r12, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x3, r13}]]}}}]}, 0x38}}, 0x0) r14 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r14, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x1c, 0x2f, 0x3ff, 0x0, 0x0, {0xa}, [@typed={0x8, 0x3, @str='\x00'}]}, 0x1c}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r14, 0x8933, &(0x7f00000036c0)={'team0\x00'}) r15 = syz_open_procfs(0x0, &(0x7f0000000000)='pagemap\x00') r16 = socket$netlink(0x10, 0x3, 0x0) sendfile(r16, r15, 0x0, 0x33fe0) getpeername$packet(r15, &(0x7f0000003700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000003740)=0x14) getpeername(r0, &(0x7f0000003780)=@can, &(0x7f0000003800)=0x80) 07:16:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400454ca, 0x100000001) 07:16:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:37 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x30040, 0x0) ioctl$USBDEVFS_DISCARDURB(r0, 0x550b, &(0x7f0000000100)=0xfffffffffffffff7) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) lremovexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="6f7330230130302300"/25]) 07:16:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:16:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000340)={0xa, 0x4, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:37 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:16:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) 07:16:37 executing program 0: perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x30040, 0x0) ioctl$USBDEVFS_DISCARDURB(r0, 0x550b, &(0x7f0000000100)=0xfffffffffffffff7) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0}) lremovexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="6f7330230130302300"/25]) 07:16:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:37 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xffffffffffffff44}}, 0x0) r1 = socket(0x2, 0x3, 0x67) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") getsockname$ax25(r1, &(0x7f0000000100)={{0x3, @bcast}, [@bcast, @remote, @default, @remote, @rose, @default, @remote, @null]}, &(0x7f00000001c0)=0x48) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x40003, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x9, 0x8, 0x0, "b4"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x8, 0x0) 07:16:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:37 executing program 0: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="04000000", @ANYRES16=r2, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x8}, 0x20040044) r3 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r4, 0x1000000) sendfile(r3, r4, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000200), 0xc) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f0000000380)={0xa, 0x2, 0x9}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/d_v/ne\xd9\x06\xdbFn\x00', 0xe94c7508f6bebf0a, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r6, &(0x7f0000000200), 0xc) r8 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x66) write$RDMA_USER_CM_CMD_BIND_IP(r8, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @empty}, r9}}, 0x30) write$RDMA_USER_CM_CMD_DESTROY_ID(r6, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r9}}, 0x18) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000100)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0$v', 0x5019}) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'n\x00\x00t\x00\x00\xe6\xff\x00', 0x7132}) [ 299.270587][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 299.276489][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:37 executing program 5: bind$alg(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x8, 0x44142) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x0, 0x0, 0x0, 0x2, 0x4, 0x3ff, 0x9}, 0x0, 0xffffffffffffffff, r1, 0x0) io_setup(0x1ff, &(0x7f00000004c0)) io_submit(0x0, 0x0, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x14c) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) r3 = socket$bt_bnep(0x1f, 0x3, 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x2) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 07:16:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:38 executing program 0: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0xfffffffffffffdc6) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='numa_maps\x00') readv(r0, &(0x7f0000000080)=[{&(0x7f0000001400)=""/4096, 0x5a0}], 0x1) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000140)={0x0, 0x0, 0xffffffffffffffff}) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x7}, 0x0) open(0x0, 0x8001141042, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000100)={0x0, 0x43}, 0x8) socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/arp\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000080)='comm\x00') sendfile(r3, r2, 0x0, 0x80000000) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, &(0x7f0000000580)=0x80) r4 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0xfffffffe}) ioctl$sock_inet6_SIOCADDRT(r4, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) r5 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r5, 0x800442d3, &(0x7f0000000180)={0xfc, 0xfff, 0x1, @dev={[], 0x13}, 'ip6gre0\x00'}) r6 = socket(0x2, 0x3, 0x67) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r7 = socket$netlink(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)={0x6c, r8, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0@'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xfc000000]}}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @rand_addr="b6eeb94dabff920469d573bd92064dbf"}}}}]}]}, 0x6c}}, 0x0) sendmsg$TIPC_NL_MON_GET(r6, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2487012}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="00032dbd7000fcdbdf2512000000380004000c00010073797a30000000000c00010073797a31000000001c0007000800040040000000080002000100008008000300ef440000"], 0x4c}, 0x1, 0x0, 0x0, 0xae9780d80e6aa69c}, 0x4000010) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) 07:16:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:38 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) [ 301.032017][ T9424] Bluetooth: hci0: command 0x1003 tx timeout [ 301.039067][T11049] Bluetooth: hci0: sending frame failed (-49) [ 303.110594][ T9413] Bluetooth: hci0: command 0x1001 tx timeout [ 303.116754][T11049] Bluetooth: hci0: sending frame failed (-49) [ 305.190610][ T9424] Bluetooth: hci0: command 0x1009 tx timeout 07:16:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x40049409, 0x100000001) 07:16:48 executing program 5: bind$alg(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x8, 0x44142) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x400}, 0x0, 0x0, 0x0, 0x2, 0x4, 0x3ff, 0x9}, 0x0, 0xffffffffffffffff, r1, 0x0) io_setup(0x1ff, &(0x7f00000004c0)) io_submit(0x0, 0x0, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000580)=ANY=[@ANYBLOB="a7724bdef64346bc14b7b0f781d1d3abf9d1a51c4bfce1e77551a8bd678625f508300200000040847bc2fdffe8cd918b035041291559f3ee3a46069062af9680d512f4d8a5c51817c3ff01a1f62ac71e85445d8f244f6be479ffffffffff8756ea7d486588272169d8b90f1d7106f5776f7894ee47382b8811e658a49a0eba9b9d6a05995f5ed199fcf8722be75fa42c080601d48e793d1429196b4d9182f7c46359a074285b251aca195af3b2887cc79d0cede7cc0b7e7f95c7d70472f7d3981e50042390a546375c8c1f1734a24583e1f8066319e93802eda50f3fb22ab8d6dc3d2afd102b71b6c5c2f2c915b6c3fc55000000000100000046a6fc39740aac6f2282f8b1f18c90da3dcbf729cb4ed8f4ed869a5f099d7cf2a2d80f132077b478cebc5552e1499b6da655e11e2ed527922afd77afdf66e1909327700767da23890e276a6a4ec7fc80749d55"], 0x14c) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) r3 = socket$bt_bnep(0x1f, 0x3, 0x4) fsetxattr$trusted_overlay_origin(r3, &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f0000000240)='y\x00', 0x2, 0x2) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 07:16:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x91, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:48 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, 0x0, 0x0) 07:16:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000200), 0xc) ioctl$VIDIOC_SUBDEV_G_SELECTION(r2, 0xc040563d, &(0x7f0000000040)={0x0, 0x0, 0x101, 0x4, {0x5, 0x8000, 0x81, 0x5}}) dup(r1) r4 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r5 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r5, 0x1000000) sendfile(r4, r5, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000200), 0xc) r6 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x3fe) ioctl$TUNSETLINK(r0, 0x400454cd, 0x7) r7 = socket$nl_route(0x10, 0x3, 0x0) dup3(r7, r0, 0x80000) 07:16:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext={0x0, 0xffffffffffffffe3}, 0x4, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0xffffffff}, 0x0, 0xe, 0xffffffffffffffff, 0x0) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x81, 0x20) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000100)={0x7, @pix_mp={0x2, 0x0, 0x0, 0x6, 0x0, [{}, {0x2}, {0x4000000}, {}, {}, {0x3f}]}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x2, 0x3, 0x67) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000340)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r3, 0x0, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40004800}, 0x40004) r4 = socket(0x2, 0x3, 0x67) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") accept4$bt_l2cap(r4, &(0x7f00000000c0), &(0x7f0000000200)=0xe, 0x80000) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000240)={0xa5, 0x574, 0x8000, 0xfff, 0x16, 0x5, 0xb6, 0x7f, 0x20, 0xb5, 0x200}) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="280080002300010000000000000000000400ac00140013d2d8960000000000000000ffff000001000b44ebedce8130d3bb4bb8259a4439537fd58ca3bdf56f3d1872bb87aeff314a1d5107ed695bf8b4db975d94fda7a3d4d720e866a9d2fa5ce1065518ed20a75b21e4a9227f9412fb22fb8f114790b0202cb009e887e613da010000000000001785553a2c2afa8800d4fb3827d6f8d7ecd3ebd1d1125d048cd36551139f336387a577618ab5"], 0x28}}, 0x0) 07:16:48 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\"\x00', 0x2}, 0xfffffffffffffe2f) ioctl(r1, 0x8916, &(0x7f0000000000)) ioctl(r1, 0x8936, &(0x7f0000000000)) 07:16:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x40086602, 0x100000001) [ 309.671438][ C0] net_ratelimit: 10 callbacks suppressed [ 309.671466][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 309.683991][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 309.762507][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 309.769054][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:48 executing program 4: r0 = getpid() sched_getattr(r0, &(0x7f0000000040)={0x30}, 0x30, 0x0) 07:16:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x40087602, 0x100000001) [ 309.990532][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 309.996365][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:16:48 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, 0x0) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) 07:16:48 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), 0x0) r1 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f00000000c0)={'stack ', 'v\"an0\x00'}, 0x9d) ioctl$USBDEVFS_RELEASE_PORT(0xffffffffffffffff, 0x80045519, 0x0) fstat(0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000002a40)={{0x1, 0x1, 0x7}}) 07:16:48 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/snmp\x00\xdc\xbb\xaa\xfa\xe5]\xfc\xb2\xcd<\x1d\xc8\xdd\xae\x89\'\x00TB\x0fg%\x04\xae`>\x8dA\xb3\x88\n\x8e\x96\f!\x87\x84t`\xcf\x8a\xda\xbd\xf9\x7fj\xbc\xca\xba\xff\x81\x9d\xcc1\xc6\x0e>Lm\x9e\x1a\x10\xec\x1e\xf1\xc0^\xd1\xaa\xbd\xd2\xb3\x1e\xdc\x94\x18\xeao\x86[\"X.)\xa6\xfc\x14\xffO\xde\x98eY\xd8\xb5e\x86\x04\xc7@\x86I\xf07\xb0\xbd\xff\xb3\x9aOv\xd1\x0fD\xa8$\xa3\xc9\xfanfI\xb0\x89D\xe8\x89>\xdd8\xe8G\xe2^\xcf\xfa*\xad\xca5E\xb3\xf8r)') r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendfile(r1, r0, 0x0, 0x100001) 07:16:48 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:49 executing program 0: ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x40, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) open(0x0, 0x0, 0x0) 07:16:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x4020940d, 0x100000001) 07:16:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x80202) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) 07:16:49 executing program 5: unshare(0x20600) r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000140)) 07:16:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:49 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x3ffe, 0x4) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:16:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80045430, 0x100000001) 07:16:49 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xb, 0x16, &(0x7f0000000300)=ANY=[@ANYBLOB="711204000000000061134c0000000000bf200000000000001500000008ffffffbd0301000000000095000000000000006916000000000000bf67000000000000170600000fff070067060000020000000706000007000000bf050000000000000f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000000500000000000000950000000000000032ed3c5be95e5db67754bb12dc8c27df8ecf264e0f84f9ed7a1b142f84f17d3c30e304000000c1ccf37f712fe9755ba08508460b603daf5a7d1dbdd2d17f2f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a674f888a08034b7dd399703d6c4f633a9a4f16d0a3e1282ee45a010fb94fe9de56c9d8a814261bdb94a6538b89dc6c60bf70d742a81b72bab8395fa44810b5b9088f54ed1f18e2cbd3594e1fbc01e964292d4597e3131c52a571f11e9b49b4f0965867f8a3243e95efba59aba6d2ef2f818fe045d3bf7cfc0be4f7787adc348e801"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x137, 0x10, &(0x7f0000000040)}, 0x48) poll(0x0, 0x0, 0xffffffff) [ 310.631985][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 310.638989][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:16:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) bind(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0xbb8) 07:16:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:49 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x0, 0x0) getpid() r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r1, 0x0) 07:16:49 executing program 4: openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000240)) setgid(r1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000180)='./file0//ile0\x00', 0x0) 07:16:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fcntl$dupfd(r0, 0x406, r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x7f, 0x8, 0x800}) r2 = openat(r0, &(0x7f0000000340)='./file0\x00', 0x4140, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x77) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x4081}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r3, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/197, 0xc5}], 0x1, 0x0) sendto$inet(r3, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) socket$nl_route(0x10, 0x3, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0), 0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) clock_gettime(0x0, &(0x7f0000000000)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[], @ANYRES32=0x0, @ANYRES32], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() flistxattr(r3, &(0x7f0000000600)=""/167, 0xa7) 07:16:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80045432, 0x100000001) 07:16:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) bind(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0xbb8) 07:16:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs_stats_percpu\x00') sendfile(r0, r0, 0x0, 0x3f) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f0000000340), 0x41395527) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000380)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0xfffffffffffffffb, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000004c0)=ANY=[@ANYRES16, @ANYBLOB="e54e000000000000"], 0x2}}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x10000000005, 0x84) creat(0x0, 0x0) r3 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r3, 0x0, 0x40d09) syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') rt_tgsigqueueinfo(0x0, 0x0, 0x16, &(0x7f0000000000)) accept(0xffffffffffffffff, 0x0, 0x0) stat(&(0x7f00000003c0)='./bus\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$security_capability(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000200)=@v3={0x3000000, [{0x9, 0x2}, {0x101, 0x3}], r4}, 0x18, 0x2) 07:16:49 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) [ 311.387871][T11221] IPVS: ftp: loaded support on port[0] = 21 07:16:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80045438, 0x100000001) 07:16:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) bind(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0xbb8) 07:16:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) [ 311.539003][T11224] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 07:16:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) bind(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0xbb8) 07:16:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) [ 312.080348][T11231] IPVS: ftp: loaded support on port[0] = 21 07:16:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) creat(0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x1dfe, 0x4) 07:16:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80045439, 0x100000001) 07:16:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fcntl$dupfd(r0, 0x406, r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x7f, 0x8, 0x800}) r2 = openat(r0, &(0x7f0000000340)='./file0\x00', 0x4140, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x77) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x4081}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r3, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/197, 0xc5}], 0x1, 0x0) sendto$inet(r3, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) socket$nl_route(0x10, 0x3, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0), 0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) clock_gettime(0x0, &(0x7f0000000000)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[], @ANYRES32=0x0, @ANYRES32], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() flistxattr(r3, &(0x7f0000000600)=""/167, 0xa7) 07:16:51 executing program 5: dup(0xffffffffffffffff) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000)={0xa0, 0x6, 0x0, 0x0, 0x60}, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 07:16:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fcntl$dupfd(r0, 0x406, r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x7f, 0x8, 0x800}) r2 = openat(r0, &(0x7f0000000340)='./file0\x00', 0x4140, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x77) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x4081}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r3, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/197, 0xc5}], 0x1, 0x0) sendto$inet(r3, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) socket$nl_route(0x10, 0x3, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0), 0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) clock_gettime(0x0, &(0x7f0000000000)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[], @ANYRES32=0x0, @ANYRES32], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() flistxattr(r3, &(0x7f0000000600)=""/167, 0xa7) [ 312.448847][T11274] vhci_hcd: Wrong hub descriptor type for USB 3.0 roothub. 07:16:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x0, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80045440, 0x100000001) 07:16:51 executing program 5: dup(0xffffffffffffffff) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000)={0xa0, 0x6, 0x0, 0x0, 0x60}, 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 312.607418][T11276] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 07:16:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x0, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:51 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) creat(0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x1dfe, 0x4) [ 312.787899][T11292] vhci_hcd: Wrong hub descriptor type for USB 3.0 roothub. 07:16:51 executing program 5: ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, 0x0, &(0x7f0000000300)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x40, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) open(0x0, 0x0, 0x0) 07:16:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x800454d2, 0x100000001) 07:16:51 executing program 4: ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x40, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetl\x04\x00\x00\x00\x00\x00\x00\x00age_ir_Z\xa2\xf4es\x00', 0x275a, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4ac04e11}) open(0x0, 0x0, 0x0) 07:16:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x0, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) creat(0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f4067d03b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489fdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e601c4dca4c6970a469beb625b67fca0bb1ef6d3c6958da4bddac602e0048bbb8de874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ed84c2be021a6c9da73f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714010d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc4852621ad19c854622f7c7d79ec3ab4494353ba2130be57f838b948cfcaebb109382cc4afc982f7e7d2dd39787fff621e3072ec94f6c73018974f63b45c87a7fdfea50c5bd945120da2fb5c646d3438c499194bfaafd3169039961fab0cd13000010e713b0c36228233e886850bd5920b6196a15d61d355c65347857d4330a03837de840b8bcb9cc17cb8ce2f00c7de343477ff2d6620379797961d06afbfa5265054a430f3d9570bdd8dae14be4fe8c8761f8ddcd7ca3bc452935f9083ab91d14ef7803292a2cbc5a9903392eed60629fb955"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x1dfe, 0x4) 07:16:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fcntl$dupfd(r0, 0x406, r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x7f, 0x8, 0x800}) r2 = openat(r0, &(0x7f0000000340)='./file0\x00', 0x4140, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x77) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x4081}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r3, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/197, 0xc5}], 0x1, 0x0) sendto$inet(r3, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) socket$nl_route(0x10, 0x3, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0), 0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) clock_gettime(0x0, &(0x7f0000000000)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[], @ANYRES32=0x0, @ANYRES32], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() flistxattr(r3, &(0x7f0000000600)=""/167, 0xa7) 07:16:52 executing program 5: socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RWALK(r0, 0x0, 0x0) 07:16:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x800455c9, 0x100000001) 07:16:52 executing program 5: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) write$P9_RWRITE(r0, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, 0x0) 07:16:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x800455ca, 0x100000001) 07:16:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:52 executing program 4: lstat(0x0, 0x0) socket$netlink(0x10, 0x3, 0xc) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, 0x0, 0x0) lstat(0x0, 0x0) memfd_create(&(0x7f0000000440)=')\x00', 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(0xffffffffffffffff, 0x4000000000000002) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x52, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "82ab9c", 0x1c, 0x2c, 0x0, @remote, @local, {[@hopopts={0x2c}], @tcp={{0x0, 0xfffe, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000040)) r4 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r4, 0x0, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r4, 0x4008af14, &(0x7f00000000c0)={0x1, 0x7ff}) 07:16:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fcntl$dupfd(r0, 0x406, r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x7f, 0x8, 0x800}) r2 = openat(r0, &(0x7f0000000340)='./file0\x00', 0x4140, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x77) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280)}, 0x4081}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) munmap(&(0x7f00000c6000/0x3000)=nil, 0x3000) bind$inet(r3, &(0x7f0000000100)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r3, 0x1, 0x3c, &(0x7f0000000440)=0x1, 0xffe6) sendto$inet(r3, 0x0, 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/197, 0xc5}], 0x1, 0x0) sendto$inet(r3, &(0x7f0000000140)="7c0d111317b1ff8ec8f29f81319ec5b10d0d000000efd9448dbef1ffb4e3a6af87131512da528f6235fe35d3053b5cb4877c1b89bbf83f6d749d5b00679601a3abdc204cf1ad797252bb0c7b43e3e9763221cb2c8d76f824f4bea338f53aa75703f465e50e434e2193900c39ab79d37cc0ce7a", 0x2fdf442dff3bb63, 0x401c005, 0x0, 0xffffffffffffff36) socket$nl_route(0x10, 0x3, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) write(0xffffffffffffffff, &(0x7f00000000c0), 0x0) socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) clock_gettime(0x0, &(0x7f0000000000)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYPTR64=&(0x7f0000000a80)=ANY=[], @ANYRES32=0x0, @ANYRES32], 0x3}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') geteuid() flistxattr(r3, &(0x7f0000000600)=""/167, 0xa7) 07:16:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) creat(0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x1dfe, 0x4) 07:16:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = dup(r0) setsockopt$inet_int(r2, 0x0, 0x32, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 07:16:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x800455cc, 0x100000001) 07:16:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x0) 07:16:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000100)={0xa21, 0x3, 0x8204, 0x7, 0x4, 0x3f, 0xffff4e51, 0x4}, 0x20) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80086301, 0x100000001) 07:16:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:52 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) creat(0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) [ 314.206802][T11354] ptrace attach of "/root/syz-executor.5"[11353] was attempted by "/root/syz-executor.5"[11354] 07:16:53 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) creat(0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:16:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80086601, 0x100000001) 07:16:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) [ 316.473810][T11382] IPVS: ftp: loaded support on port[0] = 21 [ 316.566593][T11382] chnl_net:caif_netlink_parms(): no params data found [ 316.599665][T11382] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.607083][T11382] bridge0: port 1(bridge_slave_0) entered disabled state [ 316.615084][T11382] device bridge_slave_0 entered promiscuous mode [ 316.623679][T11382] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.631368][T11382] bridge0: port 2(bridge_slave_1) entered disabled state [ 316.639162][T11382] device bridge_slave_1 entered promiscuous mode [ 316.662707][T11382] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 316.674355][T11382] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 316.705043][T11382] team0: Port device team_slave_0 added [ 316.712930][T11382] team0: Port device team_slave_1 added [ 316.794325][T11382] device hsr_slave_0 entered promiscuous mode [ 316.860863][T11382] device hsr_slave_1 entered promiscuous mode [ 316.930655][T11382] debugfs: Directory 'hsr0' with parent '/' already present! [ 316.960817][T11382] bridge0: port 2(bridge_slave_1) entered blocking state [ 316.968274][T11382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 316.976315][T11382] bridge0: port 1(bridge_slave_0) entered blocking state [ 316.983451][T11382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.004394][T11385] IPVS: ftp: loaded support on port[0] = 21 [ 317.049790][T11382] 8021q: adding VLAN 0 to HW filter on device bond0 [ 317.076064][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 317.090969][ T2859] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.098984][ T2859] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.109012][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 317.133299][T11382] 8021q: adding VLAN 0 to HW filter on device team0 [ 317.327308][ T9445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 317.336152][ T9445] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.343278][ T9445] bridge0: port 1(bridge_slave_0) entered forwarding state [ 317.351422][ T9445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 317.359794][ T9445] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.366925][ T9445] bridge0: port 2(bridge_slave_1) entered forwarding state [ 317.393805][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 317.406633][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 317.416280][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 317.433215][T11388] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 317.454409][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 317.487297][T11382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 317.517959][T11385] chnl_net:caif_netlink_parms(): no params data found [ 317.560280][T11385] bridge0: port 1(bridge_slave_0) entered blocking state [ 317.568862][T11385] bridge0: port 1(bridge_slave_0) entered disabled state [ 317.577809][T11385] device bridge_slave_0 entered promiscuous mode [ 317.587007][T11385] bridge0: port 2(bridge_slave_1) entered blocking state [ 317.594829][T11385] bridge0: port 2(bridge_slave_1) entered disabled state [ 317.605032][T11385] device bridge_slave_1 entered promiscuous mode [ 317.634521][T11385] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 317.646613][T11385] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 317.657643][ T9445] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 317.665452][ T9445] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 317.692411][T11382] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 317.707434][T11385] team0: Port device team_slave_0 added [ 317.720408][T11385] team0: Port device team_slave_1 added [ 317.775031][T11385] device hsr_slave_0 entered promiscuous mode [ 317.841155][T11385] device hsr_slave_1 entered promiscuous mode [ 317.841853][T11396] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 317.890770][T11385] debugfs: Directory 'hsr0' with parent '/' already present! 07:16:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2000, 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) ftruncate(r3, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, 0x0) 07:16:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) creat(0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:16:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80087601, 0x100000001) 07:16:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) [ 318.428461][T11385] 8021q: adding VLAN 0 to HW filter on device bond0 [ 318.442846][ T9445] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 318.456126][ T9445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 318.464655][ T9445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 318.476617][T11385] 8021q: adding VLAN 0 to HW filter on device team0 [ 318.491695][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 318.500918][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 318.509381][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.516920][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.527212][ T9445] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 318.538830][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 318.552603][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 318.566667][ T2859] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.574025][ T2859] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.601077][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 318.609867][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 318.619746][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 318.628813][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 318.638558][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 318.647852][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 318.656900][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 318.781877][T11388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 318.791545][T11388] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 318.803046][ T9445] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 318.812580][ T9445] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 318.824138][T11385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 318.840364][ T9445] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 318.848407][ T9445] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 318.861120][T11385] 8021q: adding VLAN 0 to HW filter on device batadv0 07:16:57 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) 07:16:57 executing program 5: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = socket$inet(0x2, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000780)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000e000000040000001804000008020000000000001001000010010000080200008003000080030000800300008003000080030000040000", @ANYBLOB], 0x2) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3, 0x0, 0x8, 0x9}, 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket(0x80000000000000a, 0x2, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)={0x38, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x10000}, @NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x48091}, 0x18800) ioctl$SIOCAX25DELFWD(r1, 0x89eb, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)) 07:16:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc0045878, 0x100000001) 07:16:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x9, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:57 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) creat(0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:16:57 executing program 0: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 07:16:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) creat(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:16:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc0045878, 0x100000001) 07:16:58 executing program 5: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r1) msgctl$MSG_STAT(0x0, 0xb, 0x0) 07:16:58 executing program 4: r0 = add_key(&(0x7f0000000380)='id_resolver\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000cc0)='C', 0x1, 0xffffffffffffffff) keyctl$revoke(0x3, r0) 07:16:58 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) creat(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:16:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:16:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc0189436, 0x100000001) 07:16:58 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) ftruncate(0xffffffffffffffff, 0x200004) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f00000001c0)) 07:16:58 executing program 4: 07:16:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) [ 321.866299][T11484] IPVS: ftp: loaded support on port[0] = 21 [ 321.956609][T11484] chnl_net:caif_netlink_parms(): no params data found [ 321.990355][T11484] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.997886][T11484] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.006398][T11484] device bridge_slave_0 entered promiscuous mode [ 322.015883][T11484] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.024070][T11484] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.032249][T11484] device bridge_slave_1 entered promiscuous mode [ 322.054901][T11484] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 322.066856][T11484] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 322.091496][T11484] team0: Port device team_slave_0 added [ 322.098647][T11484] team0: Port device team_slave_1 added [ 322.153110][T11484] device hsr_slave_0 entered promiscuous mode [ 322.200911][T11484] device hsr_slave_1 entered promiscuous mode [ 322.240584][T11484] debugfs: Directory 'hsr0' with parent '/' already present! [ 322.343366][T11484] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.350541][T11484] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.358062][T11484] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.365212][T11484] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.414474][T11484] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.429756][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.440019][ T2859] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.448920][ T2859] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.458287][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 322.474313][T11484] 8021q: adding VLAN 0 to HW filter on device team0 [ 322.489020][ T9424] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 322.497921][ T9424] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.505131][ T9424] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.518929][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.528035][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.535336][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.558581][ T9424] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 322.568746][ T9424] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 322.582993][ T2859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 322.603094][T11387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.611787][T11387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.624636][T11484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 322.643950][ T80] device bridge_slave_1 left promiscuous mode [ 322.651652][ T80] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.674823][ T80] device bridge_slave_0 left promiscuous mode [ 322.684529][ T80] bridge0: port 1(bridge_slave_0) entered disabled state [ 323.374809][ T26] audit: type=1400 audit(1573715821.999:67): avc: denied { map } for pid=11487 comm="sh" path="/bin/dash" dev="sda1" ino=1473 scontext=system_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 325.011617][ T80] device hsr_slave_0 left promiscuous mode [ 325.050792][ T80] device hsr_slave_1 left promiscuous mode [ 325.106016][ T80] team0 (unregistering): Port device team_slave_1 removed [ 325.121442][ T80] team0 (unregistering): Port device team_slave_0 removed [ 325.136180][ T80] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 325.198446][ T80] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 325.341552][ T80] bond0 (unregistering): Released all slaves [ 325.531873][T11484] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 325.546512][T11388] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 325.554138][T11388] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 07:17:04 executing program 0: 07:17:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc020660b, 0x100000001) 07:17:04 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) creat(0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:04 executing program 4: 07:17:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:17:04 executing program 5: 07:17:04 executing program 5: 07:17:04 executing program 4: 07:17:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000003) 07:17:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800a1695e1dcfe87b1071") r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={'syz_tun\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'syz_tun\x00', 0x2000000000000001}) 07:17:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:17:04 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:04 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) read$rfkill(r0, 0x0, 0xff02160) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x81, 0x11, r0, 0x0) clone3(&(0x7f0000000740)={0x0, &(0x7f0000000540), &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0x0, &(0x7f0000000600)=""/189, 0xbd, &(0x7f00000006c0)=""/117}, 0x40) 07:17:04 executing program 4: r0 = socket$inet(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)="24000000120007031dfffd946fa2830012000a0009000000741d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) [ 326.151494][ T26] audit: type=1400 audit(1573715824.769:68): avc: denied { map } for pid=11531 comm="syz-executor.5" path="/dev/dsp" dev="devtmpfs" ino=18374 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:sound_device_t:s0 tclass=chr_file permissive=1 07:17:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:17:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000005) 07:17:04 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) [ 326.312121][T11542] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 07:17:05 executing program 5: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x2000002) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) socket$inet(0x2, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 07:17:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="f4cdfdea"], 0x8) 07:17:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000007) 07:17:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) [ 326.558980][ T26] audit: type=1804 audit(1573715825.179:69): pid=11556 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir713270235/syzkaller.JpZiY7/68/file0" dev="sda1" ino=16809 res=1 [ 326.636733][T11542] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 326.792942][ T26] audit: type=1804 audit(1573715825.419:70): pid=11559 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir713270235/syzkaller.JpZiY7/68/file0" dev="sda1" ino=16809 res=1 07:17:05 executing program 0 (fault-call:3 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:05 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) clone(0x86000, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:17:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:05 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000009) 07:17:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:17:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000300) 07:17:06 executing program 3: socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:06 executing program 2 (fault-call:4 fault-nth:0): r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 327.540979][T11590] debugfs: Directory '11590-4' with parent 'kvm' already present! 07:17:06 executing program 3: socket$inet(0x2, 0x4000000000000001, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:06 executing program 3: syz_genetlink_get_family_id$fou(&(0x7f00000001c0)='fou\x00') r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:06 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040), 0x4) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000000c0)={'raw\x00', 0x88, "8ac20970cdbb2a958f85db0207b9964e64fd3e63ffb8718a53ae50e30c4a5a68c3c2d093f0e543916fe057d6f346fd669ce928626c50e400d2c6bd2138dd2af081d93390826ac195f87c319d77b643e1ca074d9a6482f2f06e3276667a5b53c7a8a51d41d85a86ab4d13503702e9d79ea23585a11bedf8472b40162a71de6230e21b14b5b262f0ac"}, &(0x7f0000000000)=0xac) inotify_init1(0x80000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/d\xab]\x14x\x00', 0x2000, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VIDIOC_OVERLAY(r2, 0x4004560e, &(0x7f0000000240)=0x5b) r3 = syz_open_dev$amidi(&(0x7f0000000280)='\x00j\xad\x00', 0x0, 0x84281) setsockopt$IP_VS_SO_SET_ADDDEST(r3, 0x0, 0x487, &(0x7f00000002c0)={{0x3c, @rand_addr=0x72e19fe1, 0x4e24, 0x0, 'dh\x00', 0x10, 0x3, 0x43}, {@broadcast, 0x4e23, 0x7, 0x1, 0x9, 0x871c}}, 0x44) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f00000001c0)={{0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xa1}, {0xa, 0x4e22, 0x9, @remote, 0xfffff3e7}, 0x6, [0x4, 0xaec, 0x101, 0x7, 0xfffff1ed, 0x2, 0x3f, 0x7]}, 0x5c) ioctl$KDADDIO(r1, 0x400455cb, 0x100000001) 07:17:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:06 executing program 4: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x2, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="1e", 0x1, 0xfffffffffffffffe) keyctl$revoke(0x3, r2) keyctl$get_security(0x11, r2, &(0x7f0000000200)=""/149, 0x95) r3 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r1, r3, 0x0, 0x1) write$UHID_SET_REPORT_REPLY(r1, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r0], 0x1) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @initdev}, &(0x7f00000000c0)=0x10, 0x80800) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0x1fa) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080), 0x2) [ 328.086339][T11634] misc userio: The device must be registered before sending interrupts [ 329.350958][T11388] Bluetooth: hci0: command 0x1003 tx timeout [ 329.357264][T11049] Bluetooth: hci0: sending frame failed (-49) [ 331.435275][T11388] Bluetooth: hci0: command 0x1001 tx timeout [ 331.441484][T11049] Bluetooth: hci0: sending frame failed (-49) [ 333.520717][ T2859] Bluetooth: hci0: command 0x1009 tx timeout 07:17:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:17:16 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xce6, 0x882) ioctl$TCSETS(r1, 0x5402, &(0x7f00000000c0)={0x6, 0x187, 0x6d2, 0x1, 0x10, 0x7f, 0x0, 0x81, 0x3, 0x4, 0x7, 0x6381}) 07:17:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0x2, 0x0, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x2, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:16 executing program 4: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x8}) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x106, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000340)={0xb, 0x10, 0xfa00, {&(0x7f00000001c0), r1, 0x5}}, 0x18) write$FUSE_ENTRY(r0, &(0x7f00000000c0)={0x90, 0x0, 0x0, {0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0xa7b, 0x0, 0x0, 0x1}}}, 0x90) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r4, &(0x7f0000000440)=""/46, 0x2e) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000017c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', r5}) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x16}, @loopback, @ipv4={[], [], @local}, 0x5, 0x3, 0xd036, 0x500, 0x0, 0x10000, r5}) fallocate(r2, 0x0, 0x40000000, 0x10000101) 07:17:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) syz_open_pts(r1, 0x200000) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r3, 0x80dc5521, &(0x7f0000000240)=""/201) r4 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r5 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x2) ftruncate(r5, 0x1000000) sendfile(r4, r5, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB="0e0000000000000000000000cb73087c75cccefd7910c8"], 0xc) ioctl$TIOCGISO7816(r4, 0x80285442, &(0x7f0000000000)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xd) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:17:16 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x4000, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0x25, 0x0, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:16 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x1000000, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 338.389331][ T26] audit: type=1800 audit(1573715837.009:71): pid=11648 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16836 res=0 [ 338.411860][ T26] audit: type=1800 audit(1573715837.019:72): pid=11662 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.4" name="bus" dev="sda1" ino=16836 res=0 [ 339.830613][T11388] Bluetooth: hci0: command 0x1003 tx timeout [ 339.836843][T11049] Bluetooth: hci0: sending frame failed (-49) [ 340.531958][ T80] device bridge_slave_1 left promiscuous mode [ 340.538262][ T80] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.581935][ T80] device bridge_slave_0 left promiscuous mode [ 340.588159][ T80] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.632886][ T80] device bridge_slave_1 left promiscuous mode [ 340.639147][ T80] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.691721][ T80] device bridge_slave_0 left promiscuous mode [ 340.697970][ T80] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.910663][ T22] Bluetooth: hci0: command 0x1001 tx timeout [ 341.916774][T11049] Bluetooth: hci0: sending frame failed (-49) [ 343.990600][ T22] Bluetooth: hci0: command 0x1009 tx timeout [ 344.711269][ T80] device hsr_slave_0 left promiscuous mode [ 344.780794][ T80] device hsr_slave_1 left promiscuous mode [ 344.829852][ T80] team0 (unregistering): Port device team_slave_1 removed [ 344.844524][ T80] team0 (unregistering): Port device team_slave_0 removed [ 344.856387][ T80] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 344.897835][ T80] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 345.030852][ T80] bond0 (unregistering): Released all slaves [ 345.221391][ T80] device hsr_slave_0 left promiscuous mode [ 345.270813][ T80] device hsr_slave_1 left promiscuous mode [ 345.334214][ T80] team0 (unregistering): Port device team_slave_1 removed [ 345.349460][ T80] team0 (unregistering): Port device team_slave_0 removed [ 345.362958][ T80] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 345.408174][ T80] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 345.538221][ T80] bond0 (unregistering): Released all slaves 07:17:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:17:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:26 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = socket$inet(0x2, 0x1, 0xca) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r2, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x1000000, &(0x7f0000000200)={[{@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x619}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, 'ctr-aes-aesni\x00'}}, {@fowner_lt={'fowner<', r2}}]}) bind$alg(r0, &(0x7f0000000440)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-aes-aesni\x00'}, 0x58) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 07:17:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x2000000, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000000)={0x6, 0x9f}) fcntl$getown(r0, 0x9) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:17:26 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) [ 347.990651][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 347.996531][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:17:26 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x15) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:17:26 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x2, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x40000000, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = socket$inet(0x2, 0x1, 0xca) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r2, 0x0) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='bpf\x00', 0x1000000, &(0x7f0000000200)={[{@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x619}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode', 0x3d, 0x9}}], [{@obj_role={'obj_role', 0x3d, 'ctr-aes-aesni\x00'}}, {@fowner_lt={'fowner<', r2}}]}) bind$alg(r0, &(0x7f0000000440)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-aes-aesni\x00'}, 0x58) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 07:17:26 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) [ 348.390557][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 348.396733][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 349.990692][ T22] Bluetooth: hci0: command 0x1003 tx timeout [ 349.997112][T11049] Bluetooth: hci0: sending frame failed (-49) [ 352.070756][ T22] Bluetooth: hci0: command 0x1001 tx timeout [ 352.076968][T11049] Bluetooth: hci0: sending frame failed (-49) [ 354.160758][T11388] Bluetooth: hci0: command 0x1009 tx timeout 07:17:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:17:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x3, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:36 executing program 1: r0 = socket(0x2, 0x3, 0x67) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") sendmsg$nl_netfilter(r0, &(0x7f00000011c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], 0x101c}, 0x1, 0x0, 0x0, 0x44801}, 0x4008011) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) fcntl$setown(r0, 0x8, r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r3 = socket(0x2, 0x3, 0x67) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") setsockopt$nfc_llcp_NFC_LLCP_RW(r3, 0x118, 0x0, &(0x7f0000000000)=0x1, 0x4) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r2, 0x400455cb, 0x100000001) 07:17:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x9}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:36 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:36 executing program 4: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f00000000c0)=[{0x0}], 0x1) unshare(0x2040400) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, 0x0, 0xffffff15) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000440)="f38465a12ffe71080696cfd7254c6003d2560284820723bf3999d525c40d26c4c924e1660e99fd9a1aff221f5c9c6ab376b5cc6a64747798e4fa710a77228267f70b455f5d2e5fe8c4aa243733a4540f0add97adaa146724c9fc9e321806136d9593c94966a20881f5128a6926a7ff4f7742676d86eb9ddb6e60c56728", 0x7d) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) add_key$keyring(&(0x7f0000000380), 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000180)) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x11080, 0x0) getsockopt$ARPT_SO_GET_INFO(r3, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000080)=0x44) ioctl$sock_ifreq(r2, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) [ 358.179156][ T26] audit: type=1400 audit(1573715856.789:73): avc: denied { create } for pid=11776 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 07:17:36 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) [ 358.289487][T11777] bond0: (slave bond_slave_1): Releasing backup interface 07:17:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0xa}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 358.309850][ T26] audit: type=1400 audit(1573715856.839:74): avc: denied { ioctl } for pid=11776 comm="syz-executor.4" path="socket:[37584]" dev="sockfs" ino=37584 ioctlcmd=0x8991 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 07:17:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:17:37 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x20000130}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:17:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x5, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:37 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000000c0)=0xfffff001) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r1, 0x400455cb, 0x100000001) 07:17:37 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:37 executing program 5: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x100000001) 07:17:38 executing program 4: r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f00000000c0)=[{0x0}], 0x1) unshare(0x2040400) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, 0x0, 0xffffff15) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000440)="f38465a12ffe71080696cfd7254c6003d2560284820723bf3999d525c40d26c4c924e1660e99fd9a1aff221f5c9c6ab376b5cc6a64747798e4fa710a77228267f70b455f5d2e5fe8c4aa243733a4540f0add97adaa146724c9fc9e321806136d9593c94966a20881f5128a6926a7ff4f7742676d86eb9ddb6e60c56728", 0x7d) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) add_key$keyring(&(0x7f0000000380), 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000180)) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x11080, 0x0) getsockopt$ARPT_SO_GET_INFO(r3, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000080)=0x44) ioctl$sock_ifreq(r2, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16\b\xea\xff\xff\x80\x00\x06\x02\xff', @ifru_names='bond_slave_1\x00t\x00'}) ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000240)={'bond0\x00\xe1\x03\f\x00!!\x00\x01\x00\x01', @ifru_names='bond_slave_1\x00\x00\x00\b'}) 07:17:38 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000700)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x400400, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000140)={0x4, [0x1ff, 0x5, 0x4, 0x8]}, &(0x7f0000000180)=0xc) r4 = openat$cgroup_ro(r1, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f00000000c0)=0x3) 07:17:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x7ffff000}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x6, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:38 executing program 5: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x100000001) 07:17:38 executing program 5: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x100000001) 07:17:38 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000700)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x7, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x2}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) [ 359.960883][T11858] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 07:17:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:17:38 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x0, 0x150}, 0x20) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/rt6_stats\x00') preadv(r3, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/133, 0x85}], 0x1, 0x12) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) r5 = open(&(0x7f0000000600)='./bus\x00', 0x0, 0x0) write$P9_RATTACH(r5, &(0x7f0000000080)={0x14}, 0x14) read$FUSE(r5, 0x0, 0x0) open(&(0x7f0000000600)='./bus\x00', 0x40042, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x14) r6 = shmget(0x3, 0x1000, 0x140, &(0x7f0000013000/0x1000)=nil) shmctl$SHM_LOCK(r6, 0xb) read$FUSE(0xffffffffffffffff, &(0x7f0000000640), 0x10000011b) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000440)={{0x7f, 0x9}, {0x33}, 0x0, 0x0, 0xbd}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r4) semctl$SETALL(0x0, 0x0, 0x11, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='coredump_filter\x00') r7 = socket(0x40000000015, 0x5, 0x0) getsockname$inet(r7, 0x0, &(0x7f00000000c0)) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) getsockname$inet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) sendmsg$nl_route(r7, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x803221}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="24000000ffdbdf250a000000", @ANYRES32=0x0, @ANYBLOB="1000200b0800070006000000"], 0x24}, 0x1, 0x0, 0x0, 0x4100}, 0x0) 07:17:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) r1 = socket(0x2, 0x3, 0x67) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") sendto$netrom(r1, &(0x7f00000000c0)="70f4fcba1704945f665b2d3b8c4e6a9069d269ad9ddb914adbe326edd0fd592141261f6656822c177d84a24dca6e7d43401a2a547af05b7a024aae24e6015d5154a2602307c804cfbc5521ac68c81daf4ff04839e6c06f9562cbe3cf322da2200558f68cd59a9c165b0da3ed37", 0x6d, 0x4000000, 0x0, 0x0) 07:17:39 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000700)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x8}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xa, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) [ 360.561766][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 360.570765][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:17:39 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:17:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0xffffff1f}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x48, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:39 executing program 1: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455cb, 0x100000001) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000000)={0x5, 0x2, 0x5, 0x6, 0x15, 0x5, 0x2, 0xda, 0x2, 0x81, 0x1000, 0x7}) 07:17:39 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1, 0x0, 0x2}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:17:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4c, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$TCSBRK(r0, 0x5409, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, &(0x7f00000000c0)) poll(&(0x7f0000000000)=[{r0, 0x557a}, {r1, 0x100}, {r2, 0x8}, {r0, 0x100}], 0x4, 0x1ff) r3 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f00000002c0)={0x0, 0x0, 0x2080}) ftruncate(r4, 0x1000000) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, 0x0, &(0x7f00000000c0)) sendfile(0xffffffffffffffff, r4, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="0e0000000000000000000000392e71abd443eff9ab3f3f271b61defda38d514dfec77ec1074e43de7fd92324edeb0b54d5579770fd7b8bea546321376a80ae4d972a24e6592cd5d60a551059e8b22341c891d807bc4bfd00583402565c51a992722d73589569e2be38c0d96fc3c046f927936e15e79b"], 0xc) open_tree(r3, &(0x7f0000000100)='./file0\x00', 0x380) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, 0x0, 0xeefffdef) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r8, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r9 = dup2(r8, 0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(r9, &(0x7f0000002340)={0xe, 0x0, 0x0, 0x8}, 0x1c6) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r6, 0xc0bc5351, &(0x7f0000000200)={0x6, 0x1, 'client0\x00', 0x4, "8af92a522b037a0c", "dcd3450d1623b898ac02bf7291fb7a3fe909b027a2f1a588a1bf8cbab2f2f930", 0x1000, 0x5}) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) [ 361.340849][ T26] audit: type=1804 audit(1573715859.959:75): pid=11889 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/root/syzkaller-testdir439261381/syzkaller.aJz0WK/14/bus" dev="sda1" ino=16863 res=1 07:17:40 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:40 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x0, 0x150}, 0x20) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/rt6_stats\x00') preadv(r3, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/133, 0x85}], 0x1, 0x12) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) r5 = open(&(0x7f0000000600)='./bus\x00', 0x0, 0x0) write$P9_RATTACH(r5, &(0x7f0000000080)={0x14}, 0x14) read$FUSE(r5, 0x0, 0x0) open(&(0x7f0000000600)='./bus\x00', 0x40042, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x14) r6 = shmget(0x3, 0x1000, 0x140, &(0x7f0000013000/0x1000)=nil) shmctl$SHM_LOCK(r6, 0xb) read$FUSE(0xffffffffffffffff, &(0x7f0000000640), 0x10000011b) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000440)={{0x7f, 0x9}, {0x33}, 0x0, 0x0, 0xbd}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r4) semctl$SETALL(0x0, 0x0, 0x11, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='coredump_filter\x00') r7 = socket(0x40000000015, 0x5, 0x0) getsockname$inet(r7, 0x0, &(0x7f00000000c0)) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) getsockname$inet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) sendmsg$nl_route(r7, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x803221}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="24000000ffdbdf250a000000", @ANYRES32=0x0, @ANYBLOB="1000200b0800070006000000"], 0x24}, 0x1, 0x0, 0x0, 0x4100}, 0x0) 07:17:40 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x26, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:17:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x68, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1, 0x0, 0x4000}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:17:40 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x26, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:17:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1, 0x0, 0x1000000}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x6c, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:40 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x26, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f4067d03b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489fdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e601c4dca4c6970a469beb625b67fca0bb1ef6d3c6958da4bddac602e0048bbb8de874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000240)={0x6, @capture={0x1000, 0x2, {0x1f, 0x2a77}, 0x14, 0x7}}) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000000, 0x1005a, r3, 0x4bad6000) [ 362.413379][ T26] audit: type=1400 audit(1573715861.039:76): avc: denied { map } for pid=12009 comm="syz-executor.1" path="socket:[39974]" dev="sockfs" ino=39974 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=rawip_socket permissive=1 07:17:41 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000001640)=ANY=[@ANYBLOB="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"], 0x0, 0x150}, 0x20) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/rt6_stats\x00') preadv(r3, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/133, 0x85}], 0x1, 0x12) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) r5 = open(&(0x7f0000000600)='./bus\x00', 0x0, 0x0) write$P9_RATTACH(r5, &(0x7f0000000080)={0x14}, 0x14) read$FUSE(r5, 0x0, 0x0) open(&(0x7f0000000600)='./bus\x00', 0x40042, 0x0) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000080)={0x14}, 0x14) r6 = shmget(0x3, 0x1000, 0x140, &(0x7f0000013000/0x1000)=nil) shmctl$SHM_LOCK(r6, 0xb) read$FUSE(0xffffffffffffffff, &(0x7f0000000640), 0x10000011b) getpeername$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(0xffffffffffffffff, 0x40505331, &(0x7f0000000440)={{0x7f, 0x9}, {0x33}, 0x0, 0x0, 0xbd}) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$RTC_PIE_OFF(0xffffffffffffffff, 0x7006) close(r4) semctl$SETALL(0x0, 0x0, 0x11, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='coredump_filter\x00') r7 = socket(0x40000000015, 0x5, 0x0) getsockname$inet(r7, 0x0, &(0x7f00000000c0)) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) getsockname$inet(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) sendmsg$nl_route(r7, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x803221}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="24000000ffdbdf250a000000", @ANYRES32=0x0, @ANYBLOB="1000200b0800070006000000"], 0x24}, 0x1, 0x0, 0x0, 0x4100}, 0x0) 07:17:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:17:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x74, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1, 0x0, 0x2000000}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:41 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) [ 362.630582][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 362.636482][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:17:41 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:17:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x7a, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1, 0x0, 0x40000000}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:17:41 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f4067d03b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489fdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e601c4dca4c6970a469beb625b67fca0bb1ef6d3c6958da4bddac602e0048bbb8de874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ed84c2be021a6c9da73f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714010d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc4852621ad19c854622f7c7d79ec3ab4494353ba2130be57f838b948cfcaebb109382cc4afc982f7e7d2dd39787fff621e3072ec94f6c73018974f6"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/d\x05v\xa3Srol\x00', 0x440000, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, &(0x7f00000000c0)) getsockopt$inet6_mreq(r2, 0x29, 0x36, &(0x7f0000000100)={@initdev, 0x0}, &(0x7f0000000140)=0x14) bind$can_j1939(r1, &(0x7f0000000180)={0x1d, r3, 0x2, {0x2, 0x1, 0x1}, 0x11b88c1a0a2fc9cb}, 0x18) 07:17:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1, 0x0, 0x100000000000000}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:17:42 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x42, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x300, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) fsetxattr$security_selinux(r0, &(0x7f0000000100)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:inetd_var_run_t:s0\x00', 0x25, 0x2) timer_delete(0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:17:42 executing program 4: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f00000000c0)=0xfffffffb, 0x4) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000000)={0x39, 0x4023, 0x11}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000040)={0x0, {0x77359400}, 0x7, 0x5}) r0 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000000)) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000140)={0xe, 0x0, 0x0, 0x0, 0xfffffec9, "b1551e262ea16f54923c37d6868c61d15b555304be00"/31}, 0x2b) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000080)) close(r0) syz_genetlink_get_family_id$nbd(0x0) [ 363.515091][ T26] audit: type=1400 audit(1573715862.139:77): avc: denied { associate } for pid=12072 comm="syz-executor.1" name="ptmx" dev="devtmpfs" ino=16472 scontext=system_u:object_r:inetd_var_run_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 07:17:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x100000001) 07:17:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x200580, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) r3 = openat$cgroup_ro(r1, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0x12) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:17:42 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x42, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x500, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1, 0x0, 0x200000000000000}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:42 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x42, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x100000001) 07:17:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x600, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x100000001) 07:17:42 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x47, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:43 executing program 4: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f00000000c0)=0xfffffffb, 0x4) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000000)={0x39, 0x4023, 0x11}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000040)={0x0, {0x77359400}, 0x7, 0x5}) r0 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000000)) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000140)={0xe, 0x0, 0x0, 0x0, 0xfffffec9, "b1551e262ea16f54923c37d6868c61d15b555304be00"/31}, 0x2b) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000080)) close(r0) syz_genetlink_get_family_id$nbd(0x0) 07:17:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1, 0x0, 0x4000000000000000}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:43 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) [ 364.529569][ T80] Bluetooth: hci0: Frame reassembly failed (-84) 07:17:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x700, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:43 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x47, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:43 executing program 1: r0 = syz_open_dev$midi(&(0x7f00000010c0)='/dev/midi#\x00', 0x0, 0x2101) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x101, 0x400000) r2 = dup2(r1, r0) syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x7, 0x10000) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000001100)) ioctl$VFIO_GET_API_VERSION(r0, 0x3b64) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000000140), 0x1, 0x2) r5 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r5, 0x1000000) sendfile(r4, r5, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000200), 0xc) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0x13) r6 = getpid() r7 = getpid() sched_setscheduler(r7, 0x5, &(0x7f0000000380)) r8 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r9 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r9, 0x1000000) sendfile(r8, r9, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r8, &(0x7f0000000200), 0xc) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f00000001c0)) r10 = getpid() sched_setscheduler(r10, 0x5, &(0x7f0000000380)) sched_setscheduler(r10, 0x3, &(0x7f0000000380)) sched_setscheduler(r6, 0x1, &(0x7f0000000180)) ioctl$KDADDIO(r3, 0x400455cb, 0x100000001) r11 = getpid() sched_setscheduler(r11, 0x5, &(0x7f0000000380)) prctl$PR_SET_PTRACER(0x59616d61, r11) r12 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$EVIOCGABS3F(r12, 0x8018457f, &(0x7f0000002180)=""/4110) 07:17:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:43 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x47, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xa00, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:43 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x49, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f4067d03b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489fdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e601c4dca4c6970a469beb625b67fca0bb1ef6d3c6958da4bddac602e0048bbb8de874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ed84c2be021a6c9da73f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714010d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc4852621ad19c854622f7c7d79ec3ab4494353ba2130be57f838b948cfcaebb109382cc4afc982f7e7d2dd39787fff621e3072ec94f6c73018974f63b45c87a7fdfea50c5bd945120da2fb5c646d3438c499194bfaafd3169039961fab0cd13000010e713b0c36228233e886850bd5920b6196a15d61d355c65347857d4330a03837de840b8bcb9cc17cb8ce2f00c7de343477ff2d6620379797961d06afbfa5265054a430f3d9570bdd8dae14be4fe8c8761f8ddcd7ca3bc452935f9083ab91d"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1, 0x0, 0x0, 0x2}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:43 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x49, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) [ 365.040560][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 365.046501][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:17:43 executing program 4: futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f00000000c0)=0xfffffffb, 0x4) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000000)={0x39, 0x4023, 0x11}) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(0xffffffffffffffff, 0xc0385720, &(0x7f0000000040)={0x0, {0x77359400}, 0x7, 0x5}) r0 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x0, 0x0) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000000)) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000140)={0xe, 0x0, 0x0, 0x0, 0xfffffec9, "b1551e262ea16f54923c37d6868c61d15b555304be00"/31}, 0x2b) ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000080)) close(r0) syz_genetlink_get_family_id$nbd(0x0) 07:17:43 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4800, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) [ 366.550733][T11388] Bluetooth: hci0: command 0x1003 tx timeout [ 366.556904][T11049] Bluetooth: hci0: sending frame failed (-49) [ 368.630758][ T9445] Bluetooth: hci0: command 0x1001 tx timeout [ 368.637402][T11049] Bluetooth: hci0: sending frame failed (-49) [ 370.710795][ T9445] Bluetooth: hci0: command 0x1009 tx timeout 07:17:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 07:17:53 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x49, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:17:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1, 0x0, 0x0, 0x4000}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:17:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x4c00, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:17:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) fsmount(r3, 0x3, 0x102) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:17:53 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='/\x00\x00g\xa4N\xff\xb5+\xa9\x1a\xc29\x1a\x8a&\x9froup/s+,A4\x94\xa9ciz\x8c[\xca5\xc0\x12vd\xa5$z\xeb\xf4LvPv\xa0c\x17]h\x8b\xb0\xcbD\x83\xa9Mp\x83II\x05\xa5\a\xfc\xd4z\xfaU\xde\xf8\t\xf0\x1b\x88\xeb\x16\x9b\xfa\xd7\xd1&\x83\x9c\xc7\xfff\x1d\xc7\xca\x7f\xbfk\x83yP\x9b0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev_mcast\x00') [ 395.270531][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 395.276349][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:18:13 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4b, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:18:14 executing program 5: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {}, 0x0, 0x5, &(0x7f0000000000), 0xe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 07:18:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}, 0x2}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x2, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) [ 395.493403][T12335] usb usb2: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. 07:18:14 executing program 1: bind$netlink(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfd, 0x9020000}, 0xc) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x3) 07:18:14 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4b, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f4067d03b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489fdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e601c4dca4c6970a469beb625b67fca0bb1ef6d3c6958da4bddac602e0048bbb8de874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ed84c2be021a6c9da73f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714010d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc4852621ad19c854622f7c7d79ec3ab4494353ba2130be57f838b948cfcaebb109382cc4afc982f7e7d2dd39787fff621e3072ec94f6c73018974f63b45c87a7fdfea50c5bd945120da2fb5c646d3438c499194bfaafd3169039961fab0cd13000010e713b0c36228233e886850bd5920b6196a15d61d355c65347857d4330a03837de840b8bcb9cc17cb8ce2f00c7de343477ff2d6620379797961d06afbfa5265054a430f3d9570bdd8dae14be4fe8c8761f8ddcd7ca3bc452935f9083ab91d14ef7803292a2cbc5a9903392eed60629f"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) [ 395.550891][T12335] vhci_hcd: default hub control req: 0000 v0000 i0000 l0 07:18:14 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:14 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000005d00)={0xa, 0x0, 0x0, @mcast1, 0x4}, 0x1c) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0xc, "ef8c534c632b4a21b2752e83"}, 0x0) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x2, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) 07:18:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}, 0x4000}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x3, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:14 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) r3 = syz_open_dev$media(&(0x7f00000000c0)='\xdd\x00\x02\x00\x00)\x9bd\x8e\xff\x00', 0x8000, 0x10800) ioctl$TIOCSIG(r3, 0x40045436, 0x24) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="0e00000000000000000000002eb3b69562953662167cd8730d709fe726a05a01ea3255b93e2e1a1f4b6f56c2018bce3bdbe791aabd28fbcabf9129172c7555339844a18e36b412a23a6c264053a2111308a4dac6d947ca5d11b1f54a42abc81b939c226e7ba43320c231219fb56e30dd1fff46afa03d36e9560a56d914a926863b321383"], 0xc) ioctl$KDADDIO(r1, 0x400455cb, 0x100001001) 07:18:14 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:14 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4c, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f4067d03b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489fdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e601c4dca4c6970a469beb625b67fca0bb1ef6d3c6958da4bddac602e0048bbb8de874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ed84c2be021a6c9da73f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714010d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc4852621ad19c854622f7c7d79ec3ab4494353ba2130be57f838b948cfcaebb109382cc4afc982f7e7d2dd39787fff621e3072ec94f6c73018974f63b45c87a7fdfea50c5bd945120da2fb5c646d3438c499194bfaafd3169039961fab0cd13000010e713b0c36228233e886850bd5920b6196a15d61d355c65347857d4330a03837de840b8bcb9cc17cb8ce2f00c7de343477ff2d6620379797961d06afbfa5265054a430f3d9570bdd8dae14be4fe8c8761f8ddcd7ca3bc452935f9083ab91d14ef7803292a2cbc5a9903392eed60629fb9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:18:14 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4c, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:18:14 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:14 executing program 4: add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f0000000380), 0x0, 0x0) request_key(&(0x7f0000000980)='dns_resolver\x00', &(0x7f0000000840)={'\x00\x97\xdf', 0x3}, &(0x7f0000000880)='./cgroup.net/syz1\x00', 0x0) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, r0) add_key$keyring(0x0, 0x0, 0x0, 0x0, r1) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', 0x0, &(0x7f0000000040), 0x0, 0xfffffffffffffffb) fsmount(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r2, 0xc0185500, &(0x7f00000000c0)=@urb_type_control={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x12, 0x0, 0x0, 0x0, 0xb01, 0x0, 0x0, 0x0, 0x4, [], 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 07:18:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}, 0x1000000}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x4, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:15 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4c, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) [ 396.443483][T12397] vhci_hcd: default hub control req: 0200 v0000 i0000 l0 07:18:15 executing program 4: add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f0000000380), 0x0, 0x0) request_key(&(0x7f0000000980)='dns_resolver\x00', &(0x7f0000000840)={'\x00\x97\xdf', 0x3}, &(0x7f0000000880)='./cgroup.net/syz1\x00', 0x0) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, r0) add_key$keyring(0x0, 0x0, 0x0, 0x0, r1) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', 0x0, &(0x7f0000000040), 0x0, 0xfffffffffffffffb) fsmount(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r2, 0xc0185500, &(0x7f00000000c0)=@urb_type_control={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x12, 0x0, 0x0, 0x0, 0xb01, 0x0, 0x0, 0x0, 0x4, [], 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 07:18:15 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}, 0x2000000}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x4066787ae9f93b49) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f00000000c0)=0x8a4a) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:18:15 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4c, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:18:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x5, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:15 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) 07:18:15 executing program 4: add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f0000000380), 0x0, 0x0) request_key(&(0x7f0000000980)='dns_resolver\x00', &(0x7f0000000840)={'\x00\x97\xdf', 0x3}, &(0x7f0000000880)='./cgroup.net/syz1\x00', 0x0) r0 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, r0) add_key$keyring(0x0, 0x0, 0x0, 0x0, r1) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) memfd_create(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000080)='dns_resolver\x00', 0x0, &(0x7f0000000040), 0x0, 0xfffffffffffffffb) fsmount(0xffffffffffffffff, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r2, 0xc0185500, &(0x7f00000000c0)=@urb_type_control={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x12, 0x0, 0x0, 0x0, 0xb01, 0x0, 0x0, 0x0, 0x4, [], 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 07:18:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}, 0x40000000}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:15 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4c, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:18:15 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) 07:18:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x6, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:15 executing program 4: mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x52f6bdeedbaf89b5, 0xffffffffffffffff, 0x0) 07:18:15 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x440441, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x800) 07:18:16 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4c, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:18:16 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) 07:18:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x2, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x20000, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x4fc, 0x5, 0x2014, 0xd, 0x15, 0x24d58c62a1f07692, 0x0, 0x6}}) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:18:16 executing program 4: bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f4067d03b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489fdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e601c4dca4c6970a469beb625b67fca0bb1ef6d3c6958da4bddac602e0048bbb8de874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ed84c2be021a6c9da73f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714010d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc4852621ad19c854622f7c7d79ec3ab4494353ba2130be57f838b948cfcaebb109382cc4afc982f7e7d2dd39787fff621e3072ec94f6c73018974f63b45c87a7fdfea50c5bd945120da2fb5c646d3438c499194bfaafd3169039961fab0cd13000010e713b0c36228233e886850bd5920b6196a15d61d355c65347857d4330a03837de840b8bcb9cc17cb8ce2f00c7de343477ff2d6620379797961d06afbfa5265054a430f3d9570bdd8dae14be4fe8c8761f8ddcd7ca3bc452935f9083ab91d14ef7803292a2cbc5a9903392eed60629fb955"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:18:16 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r3, 0x0) 07:18:16 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4c, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:18:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x7, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x8, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 397.796435][T12493] Unknown ioctl -1067952636 [ 397.885903][T12508] Unknown ioctl -1067952636 07:18:16 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r3, 0x0) 07:18:16 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4c, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f4067d03b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489fdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e601c4dca4c6970a469beb625b67fca0bb1ef6d3c6958da4bddac602e0048bbb8de874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ed84c2be021a6c9da73f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714010d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc4852621ad19c854622f7c7d79ec3ab4494353ba2130be57f838b948cfcaebb109382cc4afc982f7e7d2dd39787fff621e3072ec94f6c73018974f63b45c87a7fdfea50c5bd945120da2fb5c646d3438c499194bfaafd3169039961fab0cd13000010e713b0c36228233e886850bd5920b6196a15d61d355c65347857d4330a03837de840b8bcb9cc17cb8ce2f00c7de343477ff2d6620379797961d06afbfa5265054a430f3d9570bdd8dae14be4fe8c8761f8ddcd7ca3bc452935f9083ab91d14ef7803292a2cbc5a9903392eed60629fb955"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) [ 397.910560][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 397.916436][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:18:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) socket$kcm(0x29, 0xa, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) ioctl$KDADDIO(r1, 0x400455cb, 0x8) 07:18:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700690000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x16f, 0x1a0}]) 07:18:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0xa, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0xffffff1f, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:16 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r3, 0x0) 07:18:16 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4c, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) [ 398.231253][T12530] loop4: p1 < > p4 [ 398.238970][T12530] loop4: partition table partially beyond EOD, truncated [ 398.284850][T12530] loop4: p1 size 2 extends beyond EOD, truncated [ 398.310553][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 398.316506][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 398.343187][T12530] loop4: p4 start 1854537728 is beyond EOD, truncated 07:18:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x48, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:17 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4c, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f4067d03b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489fdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e601c4dca4c6970a469beb625b67fca0bb1ef6d3c6958da4bddac602e0048bbb8de874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ed84c2be021a6c9da73f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714010d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc4852621ad19c854622f7c7d79ec3ab4494353ba2130be57f838b948cfcaebb109382cc4afc982f7e7d2dd39787fff621e3072ec94f6c73018974f63b45c87a7fdfea50c5bd945120da2fb5c646d3438c499194bfaafd3169039961fab0cd13000010e713b0c36228233e886850bd5920b6196a15d61d355c65347857d4330a03837de840b8bcb9cc17cb8ce2f00c7de343477ff2d6620379797961d06afbfa5265054a430f3d9570bdd8dae14be4fe8c8761f8ddcd7ca3bc452935f9083ab91d14ef7803292a2cbc5a9903392eed60629fb955"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:18:17 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 07:18:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 07:18:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x4c, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) [ 398.819497][ T80] Bluetooth: hci0: Frame reassembly failed (-84) 07:18:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000100)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f00000000c0)}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) setxattr$security_evm(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='security.evm\x00', &(0x7f0000000180)=@ng={0x4, 0xd, "d92ff0760f51be80a640084bbd9ba93c98"}, 0x13, 0x1) 07:18:17 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4c, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:18:17 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 07:18:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x4000, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x68, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:17 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 07:18:17 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x4c, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:18:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x1000000, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:17 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 07:18:17 executing program 3: syz_genetlink_get_family_id$fou(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 400.870786][ T9445] Bluetooth: hci0: command 0x1003 tx timeout [ 400.877002][T11049] Bluetooth: hci0: sending frame failed (-49) [ 402.950597][T11388] Bluetooth: hci0: command 0x1001 tx timeout [ 402.956719][T11049] Bluetooth: hci0: sending frame failed (-49) [ 405.030661][ T9445] Bluetooth: hci0: command 0x1009 tx timeout 07:18:27 executing program 4 (fault-call:2 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:18:27 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x6c, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:27 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 07:18:27 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x10000, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x9a, 0x200c0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000300)={0x6, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {0x0}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r2, 0x40086424, &(0x7f0000000340)={r4, 0x1}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f0000000180)={r4, 0x2}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) r5 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r5, 0xc0505350, &(0x7f00000000c0)={{0x1, 0x1f}, {0x8, 0x40}, 0x80000000, 0x3, 0xe5}) 07:18:27 executing program 3: syz_genetlink_get_family_id$fou(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f4067d03b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489fdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e601c4dca4c6970a469beb625b67fca0bb1ef6d3c6958da4bddac602e0048bbb8de874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ed84c2be021a6c9da73f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714010d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc4852621ad19c854622f7c7d79ec3ab4494353ba2130be57f838b948cfcaebb109382cc4afc982f7e7d2dd39787fff621e3072ec94f6c73018974f63b45c87a7fdfea50c5bd945120da2fb5c646d3438c499194bfaafd3169039961fab0cd13000010e713b0c36228233e886850bd5920b6196a15d61d355c65347857d4330a03837de840b8bcb9cc17cb8ce2f00c7de343477ff2d6620379797961d06afbfa5265054a430f3d9570bdd8dae14be4fe8c8761f8ddcd7ca3bc452935f9083ab91d14ef7803292a2cbc5a9903392eed60629fb955"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 07:18:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x2000000, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:28 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r0, r1, 0x0) 07:18:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000140)=@mangle={'mangle\x00', 0x1f, 0x6, 0x1828, 0x1318, 0x0, 0x1d0, 0x1568, 0x0, 0x1758, 0x1758, 0x1758, 0x1758, 0x1758, 0x6, &(0x7f00000000c0), {[{{@uncond, 0x0, 0x188, 0x1d0, 0x0, {}, [@common=@unspec=@conntrack2={0xc0, 'conntrack\x00', 0x2, {{@ipv4=@remote, [0x0, 0xffffffff, 0xff000000, 0xff000000], @ipv6=@loopback, [0xff000000, 0xff000000, 0xffffff00, 0xffffffff], @ipv4=@multicast1, [0x0, 0xff000000, 0xff], @ipv6=@rand_addr="c02c21b802588d0df67cb5a58d5436ce", [0xff000000, 0xff, 0x0, 0xffffff00], 0x30, 0x4, 0x5a1ccd0958138564, 0x4e24, 0x4e24, 0x4e21, 0x4e20, 0x42c9021419ac4cd7, 0x100}, 0x40, 0x801}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@multicast1, @ipv4=@multicast2, 0x33, 0x24, 0x5}}}, {{@uncond, 0x0, 0x1120, 0x1148, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @common=@unspec=@cgroup1={0x1030, 'cgroup\x00', 0x1, {0x1, 0x0, 0x0, 0x0, './cgroup.net/syz0\x00', 0x0, 0x8}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}, @inet=@rpfilter={0x28, 'rpfilter\x00'}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@remote, @ipv4=@local, 0x6, 0x20, 0x4}}}, {{@uncond, 0x0, 0xc8, 0xf0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x6}}}, {{@ipv6={@local, @mcast2, [0xff, 0xff000000, 0x0, 0xffffff00], [0xffffff00, 0x80000101, 0xff, 0xffffffff], 'sit0\x00', 'ipddp0\x00', {0xff}, {0xff}, 0x24, 0x40, 0x4, 0x18}, 0x0, 0xc8, 0x1f0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x80, 'system_u:object_r:usbtty_device_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x1888) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:18:28 executing program 3: syz_genetlink_get_family_id$fou(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 409.411023][T12637] FAULT_INJECTION: forcing a failure. [ 409.411023][T12637] name failslab, interval 1, probability 0, space 0, times 0 [ 409.455656][T12637] CPU: 1 PID: 12637 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 409.463586][T12637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.473693][T12637] Call Trace: [ 409.477000][T12637] dump_stack+0x197/0x210 [ 409.481355][T12637] should_fail.cold+0xa/0x15 [ 409.485996][T12637] ? fault_create_debugfs_attr+0x180/0x180 [ 409.491829][T12637] ? ___might_sleep+0x163/0x2c0 [ 409.496703][T12637] __should_failslab+0x121/0x190 [ 409.501679][T12637] should_failslab+0x9/0x14 07:18:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x40000000, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 409.506192][T12637] __kmalloc+0x2e0/0x770 [ 409.510445][T12637] ? mark_held_locks+0xf0/0xf0 [ 409.515214][T12637] ? _parse_integer+0x190/0x190 [ 409.520075][T12637] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 409.525811][T12637] tomoyo_realpath_from_path+0xcd/0x7b0 [ 409.531554][T12637] ? tomoyo_path_number_perm+0x193/0x520 [ 409.537204][T12637] tomoyo_path_number_perm+0x1dd/0x520 [ 409.542766][T12637] ? tomoyo_path_number_perm+0x193/0x520 [ 409.548423][T12637] ? tomoyo_execute_permission+0x4a0/0x4a0 07:18:28 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) [ 409.554264][T12637] ? __f_unlock_pos+0x19/0x20 [ 409.558959][T12637] ? ___might_sleep+0x163/0x2c0 [ 409.563845][T12637] ? selinux_file_mprotect+0x620/0x620 [ 409.570220][T12637] ? __fget+0x384/0x560 [ 409.574395][T12637] ? ksys_dup3+0x3e0/0x3e0 [ 409.578822][T12637] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 409.585334][T12637] ? fput_many+0x12c/0x1a0 [ 409.589773][T12637] tomoyo_file_ioctl+0x23/0x30 [ 409.594574][T12637] security_file_ioctl+0x77/0xc0 [ 409.599886][T12637] ksys_ioctl+0x57/0xd0 07:18:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) getuid() ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = socket(0x2, 0x3, 0x67) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") recvfrom$llc(r1, &(0x7f00000000c0)=""/4096, 0x1000, 0x100, &(0x7f0000000000)={0x1a, 0xb, 0x3, 0x1, 0x3f, 0xfd, @remote}, 0x10) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) [ 409.604060][T12637] __x64_sys_ioctl+0x73/0xb0 [ 409.608671][T12637] do_syscall_64+0xfa/0x760 [ 409.613194][T12637] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.619094][T12637] RIP: 0033:0x45a219 [ 409.623001][T12637] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 409.642789][T12637] RSP: 002b:00007fe3ca7c2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 409.651319][T12637] RAX: ffffffffffffffda RBX: 00007fe3ca7c2c90 RCX: 000000000045a219 [ 409.659336][T12637] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 409.667322][T12637] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 409.675309][T12637] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe3ca7c36d4 [ 409.683336][T12637] R13: 00000000004c3209 R14: 00000000004d73a8 R15: 0000000000000004 [ 409.701991][T12637] ERROR: Out of memory at tomoyo_realpath_from_path. [ 411.750910][T11387] Bluetooth: hci0: command 0x1003 tx timeout [ 411.757248][T11049] Bluetooth: hci0: sending frame failed (-49) [ 413.831027][T11387] Bluetooth: hci0: command 0x1001 tx timeout [ 413.838148][T11049] Bluetooth: hci0: sending frame failed (-49) [ 415.910850][T11387] Bluetooth: hci0: command 0x1009 tx timeout 07:18:38 executing program 4 (fault-call:2 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:18:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x74, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x100000000000000, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:38 executing program 3: syz_genetlink_get_family_id$fou(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:18:38 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 07:18:38 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x80000001, 0x88002) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e21, @local}}}, &(0x7f0000000180)=0x84) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r1, 0x400455cb, 0x100000001) [ 420.230541][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 420.236436][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:18:38 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 07:18:38 executing program 3: syz_genetlink_get_family_id$fou(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f4067d03b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489fdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e601c4dca4c6970a469beb625b67fca0bb1ef6d3c6958da4bddac602e0048bbb8de874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ed84c2be021a6c9da73f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714010d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc4852621ad19c854622f7c7d79ec3ab4494353ba2130be57f838b948cfcaebb109382cc4afc982f7e7d2dd39787fff621e3072ec94f6c73018974f63b45c87a7fdfea50c5bd945120da2fb5c646d3438c499194bfaafd3169039961fab0cd13000010e713b0c36228233e886850bd5920b6196a15d61d355c65347857d4330a03837de840b8bcb9cc17cb8ce2f00c7de343477ff2d6620379797961d06afbfa5265054a430f3d9570bdd8dae14be4fe8c8761f8ddcd7ca3bc452935f9083ab91d14ef7803292a2cbc5a9903392eed60629fb955"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) [ 420.356522][T12687] FAULT_INJECTION: forcing a failure. [ 420.356522][T12687] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 420.369918][T12687] CPU: 1 PID: 12687 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 420.377821][T12687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.387887][T12687] Call Trace: [ 420.387921][T12687] dump_stack+0x197/0x210 [ 420.395543][T12687] should_fail.cold+0xa/0x15 [ 420.395565][T12687] ? fault_create_debugfs_attr+0x180/0x180 [ 420.395585][T12687] ? __kasan_check_read+0x11/0x20 [ 420.411060][T12687] should_fail_alloc_page+0x50/0x60 [ 420.416289][T12687] __alloc_pages_nodemask+0x1a1/0x900 [ 420.421705][T12687] ? avc_has_extended_perms+0x8e4/0x1100 [ 420.427358][T12687] ? __alloc_pages_slowpath+0x2920/0x2920 [ 420.433097][T12687] ? __kasan_check_read+0x11/0x20 [ 420.438137][T12687] ? fault_create_debugfs_attr+0x180/0x180 [ 420.443969][T12687] cache_grow_begin+0x90/0xd20 [ 420.448751][T12687] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 420.454485][T12687] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 420.460745][T12687] __kmalloc+0x6b2/0x770 [ 420.465003][T12687] ? mark_held_locks+0xf0/0xf0 [ 420.469786][T12687] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 420.475525][T12687] tomoyo_realpath_from_path+0xcd/0x7b0 [ 420.481085][T12687] ? tomoyo_path_number_perm+0x193/0x520 [ 420.486740][T12687] tomoyo_path_number_perm+0x1dd/0x520 [ 420.492219][T12687] ? tomoyo_path_number_perm+0x193/0x520 [ 420.497953][T12687] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 420.503770][T12687] ? __f_unlock_pos+0x19/0x20 [ 420.508473][T12687] ? ___might_sleep+0x163/0x2c0 [ 420.513363][T12687] ? selinux_file_mprotect+0x620/0x620 [ 420.518809][T12687] ? __fget+0x384/0x560 [ 420.522978][T12687] ? ksys_dup3+0x3e0/0x3e0 [ 420.527410][T12687] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 420.533839][T12687] ? fput_many+0x12c/0x1a0 [ 420.538292][T12687] tomoyo_file_ioctl+0x23/0x30 [ 420.543076][T12687] security_file_ioctl+0x77/0xc0 [ 420.548030][T12687] ksys_ioctl+0x57/0xd0 [ 420.552206][T12687] __x64_sys_ioctl+0x73/0xb0 07:18:39 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 07:18:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x8) 07:18:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x7a, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) [ 420.556811][T12687] do_syscall_64+0xfa/0x760 [ 420.561331][T12687] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 420.567239][T12687] RIP: 0033:0x45a219 [ 420.571141][T12687] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 420.590756][T12687] RSP: 002b:00007fe3ca7c2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 420.599187][T12687] RAX: ffffffffffffffda RBX: 00007fe3ca7c2c90 RCX: 000000000045a219 07:18:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0xd16ac51198827516, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rfcomm\x00') r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='sel\xf2{mnet1\x00', 0x0) ftruncate(r2, 0x1000000) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, 0x0, &(0x7f00000000c0)) sendfile(r1, r3, 0x0, 0x3) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'/12], 0xc) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0xa, 0x12, r4, 0x1d314000) ioctl$KDADDIO(r1, 0x400455cb, 0x100000002) ioctl$VFIO_GET_API_VERSION(r1, 0x3b64) [ 420.607183][T12687] RDX: 0000000100000001 RSI: 00000000400455c8 RDI: 0000000000000003 [ 420.615183][T12687] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 420.623190][T12687] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe3ca7c36d4 [ 420.631179][T12687] R13: 00000000004c3209 R14: 00000000004d73a8 R15: 0000000000000004 07:18:39 executing program 4 (fault-call:2 fault-nth:2): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:18:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x200000000000000, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:39 executing program 3: syz_genetlink_get_family_id$fou(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f4067d03b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489fdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e601c4dca4c6970a469beb625b67fca0bb1ef6d3c6958da4bddac602e0048bbb8de874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ed84c2be021a6c9da73f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714010d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc4852621ad19c854622f7c7d79ec3ab4494353ba2130be57f838b948cfcaebb109382cc4afc982f7e7d2dd39787fff621e3072ec94f6c73018974f63b45c87a7fdfea50c5bd945120da2fb5c646d3438c499194bfaafd3169039961fab0cd13000010e713b0c36228233e886850bd5920b6196a15d61d355c65347857d4330a03837de840b8bcb9cc17cb8ce2f00c7de343477ff2d6620379797961d06afbfa5265054a430f3d9570bdd8dae14be4fe8c8761f8ddcd7ca3bc452935f9083ab91d14ef7803292a2cbc5a9903392eed60629fb955"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400}, 0x28) 07:18:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x300, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x401, 0x1000, 0x1, 0x9, 0x17, 0x6b, 0x3, 0x9, 0x6, 0x4, 0xfffffff8, 0x9}) 07:18:39 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) [ 420.870553][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 420.876480][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:18:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x4000000000000000, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:18:39 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x40) 07:18:39 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 07:18:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) [ 421.190576][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 421.196471][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:18:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x500, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, &(0x7f00000000c0)) recvmmsg(r2, &(0x7f0000002780)=[{{&(0x7f0000000080)=@caif=@util, 0x0, &(0x7f0000001340)=[{&(0x7f00000001c0)=""/59}, {&(0x7f0000000240)=""/42}, {&(0x7f0000000280)=""/180}, {&(0x7f0000000340)=""/4096}], 0x0, &(0x7f0000001380)=""/147}, 0xabaf}, {{&(0x7f0000001440)=@in6={0xa, 0x0, 0x0, @empty}, 0x0, &(0x7f0000001740)=[{&(0x7f00000014c0)=""/11}, {&(0x7f0000001500)=""/250}, {&(0x7f0000001600)=""/160}, {&(0x7f00000016c0)=""/118}], 0x0, &(0x7f0000001780)=""/4096}, 0x9}], 0x1de, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r4, 0x1000000) sendfile(r3, r4, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000200), 0xc) ioctl$EVIOCGKEYCODE_V2(r3, 0x80284504, &(0x7f0000000100)=""/107) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:40 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x40) 07:18:40 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f4067d03b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489fdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e601c4dca4c6970a469beb625b67fca0bb1ef6d3c6958da4bddac602e0048bbb8de874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ed84c2be021a6c9da73f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714010d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc4852621ad19c854622f7c7d79ec3ab4494353ba2130be57f838b948cfcaebb109382cc4afc982f7e7d2dd39787fff621e3072ec94f6c73018974f63b45c87a7fdfea50c5bd945120da2fb5c646d3438c499194bfaafd3169039961fab0cd13000010e713b0c36228233e886850bd5920b6196a15d61d355c65347857d4330a03837de840b8bcb9cc17cb8ce2f00c7de343477ff2d6620379797961d06afbfa5265054a430f3d9570bdd8dae14be4fe8c8761f8ddcd7ca3bc452935f9083ab91d14ef7803292a2cbc5a9903392eed60629fb955"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x40) 07:18:40 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x600, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x101000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f00000000c0)=0x3, 0x8) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) r3 = socket$inet(0x2, 0x1, 0xca) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r4, 0x0) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x9, &(0x7f0000000040), 0x4) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@ipv4={[], [], @multicast1}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in6=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@empty}}, &(0x7f00000005c0)=0xe8) r9 = socket$inet(0x2, 0x1, 0xca) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r10, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000600)={{{@in=@empty, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@loopback}}, &(0x7f0000000700)=0xe8) r12 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r13 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r13, 0x0, 0x10, &(0x7f0000000140)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) r15 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r16) r17 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r17, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r17, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xfffffffffffffeb3) r19 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r20) r21 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r22) r23 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x0, r24}, {0x8, 0x0, r24}], {0x10, 0x6}}, 0x34, 0x0) fsetxattr$system_posix_acl(r12, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000540)={{}, {0x1, 0x1}, [{0x2, 0x67aa0e1dbddc5c9d, r14}, {0x2, 0xf}, {0x2, 0x0, r16}, {0x2, 0x1}, {0x2, 0x1, r18}, {0x2, 0x5, r20}, {0x2, 0x4, r22}], {0x4, 0x2}, [{0x8, 0xda0610c6b32be233}, {0x8, 0x6, r24}], {}, {0x20, 0x3}}, 0x6c, 0x2) fsetxattr$system_posix_acl(r2, &(0x7f0000000200)='system.posix_acl_default\x00', &(0x7f0000000740)={{}, {}, [{0x2, 0x0, r4}, {0x2, 0x1, r6}, {0x2, 0x4, r7}, {0x2, 0x6, r8}, {0x2, 0x1, r10}, {0x2, 0x2, r11}], {}, [{0x8, 0x5, r24}, {0x8, 0x1, 0xffffffffffffffff}], {0x10, 0x2}, {0x20, 0x4}}, 0x64, 0x1) ioctl$KDADDIO(r0, 0x400455cb, 0x96) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000000100)=""/127, &(0x7f0000000180)=0x7f) 07:18:40 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) [ 422.160556][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 422.166385][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 422.172374][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 422.178166][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 423.430591][T11388] Bluetooth: hci0: command 0x1003 tx timeout [ 423.437006][T11049] Bluetooth: hci0: sending frame failed (-49) [ 425.510788][T11388] Bluetooth: hci0: command 0x1001 tx timeout [ 425.516982][T11049] Bluetooth: hci0: sending frame failed (-49) [ 427.590687][ T9424] Bluetooth: hci0: command 0x1009 tx timeout 07:18:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x700, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:50 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f4067d03b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489fdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e601c4dca4c6970a469beb625b67fca0bb1ef6d3c6958da4bddac602e0048bbb8de874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ed84c2be021a6c9da73f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714010d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc4852621ad19c854622f7c7d79ec3ab4494353ba2130be57f838b948cfcaebb109382cc4afc982f7e7d2dd39787fff621e3072ec94f6c73018974f63b45c87a7fdfea50c5bd945120da2fb5c646d3438c499194bfaafd3169039961fab0cd13000010e713b0c36228233e886850bd5920b6196a15d61d355c65347857d4330a03837de840b8bcb9cc17cb8ce2f00c7de343477ff2d6620379797961d06afbfa5265054a430f3d9570bdd8dae14be4fe8c8761f8ddcd7ca3bc452935f9083ab91d14ef7803292a2cbc5a9903392eed60629fb955"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x400}, 0x40) 07:18:50 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, &(0x7f00000000c0)=""/136, &(0x7f0000000000)=0x88) ioctl$KDADDIO(r1, 0x4b34, 0x7) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:18:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x75001, 0x0) r3 = socket(0x2, 0x3, 0x67) alarm(0x4) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") setsockopt$packet_int(r3, 0x107, 0x11, &(0x7f0000000200)=0x800000fc, 0xfffffffffffffe4f) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x88a83, 0x0) ioctl$SIOCX25SFACILITIES(r4, 0x89e3, &(0x7f00000001c0)={0x16, 0x515, 0x8, 0xb, 0x0, 0x81}) r5 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r6 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r6, 0x1000000) sendfile(r5, r6, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r5, &(0x7f0000000780)=ANY=[@ANYBLOB="0e000000002c8a9432abb376a1f4880c0e317fa32c48f1bf6e7647494ae1582c8bb18497"], 0xc) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r5, 0xc040564b, &(0x7f0000000740)={0x9, 0x0, 0x11, 0xcf2, 0x6, {0x7, 0x7}, 0x1}) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) process_vm_readv(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000280)=""/93, 0x5d}, {&(0x7f0000000300)=""/36, 0x24}, {&(0x7f0000000340)=""/233, 0xe9}, {&(0x7f0000000440)=""/44, 0x2c}], 0x5, &(0x7f0000000700)=[{&(0x7f0000000500)=""/77, 0x4d}, {&(0x7f0000000580)=""/184, 0xb8}, {&(0x7f0000000640)=""/180, 0xb4}], 0x3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$IMGETVERSION(r2, 0x80044942, &(0x7f0000000080)) 07:18:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x2, 0x100000001) 07:18:50 executing program 5: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x10, 0x100000001) 07:18:50 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x400}, 0x40) 07:18:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0xa00, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:50 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x400}, 0x40) 07:18:50 executing program 5: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x227c, 0x100000001) 07:18:50 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x7, 0x0, &(0x7f00000006c0)="b9ff0300000d69", 0x0, 0x400}, 0x40) 07:18:50 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x4800, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) [ 432.550591][ C0] net_ratelimit: 2 callbacks suppressed [ 432.550600][ C0] protocol 88fb is buggy, dev hsr_slave_0 07:18:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400000f) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) socket$inet6(0xa, 0x5, 0x3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x2}}, 0x20) r4 = socket(0x2, 0x3, 0x67) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") ioctl$sock_inet6_tcp_SIOCATMARK(r4, 0x8905, &(0x7f0000000140)) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000000)="04504f0b4ca8fdd086116f0788fb") 07:18:51 executing program 5: mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:51 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x7, 0x0, &(0x7f00000006c0)="b9ff0300000d69", 0x0, 0x400}, 0x40) 07:18:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x2286, 0x100000001) 07:18:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x4c00, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) r2 = socket(0x2, 0x3, 0x67) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r4 = gettid() fcntl$setownex(r3, 0xf, &(0x7f0000000280)={0x2, r4}) fcntl$setlease(r3, 0x400, 0x1) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r5, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32=r6, @ANYBLOB="0000d604"], 0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r6, 0x8}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32=r6, @ANYBLOB="0100b5050900e94100000000d900d00c73bec50c9e55b55278359a3d9e979e63c7bd1c74cf0781cd474d6dc2bd99bd7d0b751a88db08bd73895d5ca5f8303f1abd6682a75d65fd0f3bc79a59555d51f05b65df2d33274b2588aeaf8609dbfe0c1b5a295b9a98d3038833c71d9a5f00fb316482435e0b5974"], 0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000240)={r6, @in6={{0xa, 0x4e22, 0x8, @rand_addr="bd475e8aa336b9ca0b79df456e01ae18"}}, 0x0, 0x755, 0x0, 0xffffffff, 0x3}, &(0x7f00000000c0)=0x98) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) r7 = socket(0x2, 0x3, 0x67) ioctl(r7, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") getsockopt$CAN_RAW_FILTER(r7, 0x65, 0x1, &(0x7f00000000c0), &(0x7f00000001c0)) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r8 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$TCSETAW(r8, 0x5407, &(0x7f0000000080)={0x2d, 0x9, 0x1f, 0xe, 0x11, 0x5, 0x1, 0xe6, 0x5}) 07:18:51 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x4b47, 0x100000001) 07:18:51 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f4067d03b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489fdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e601c4dca4c6970a469beb625b67fca0bb1ef6d3c6958da4bddac602e0048bbb8de874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ed84c2be021a6c9da73f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714010d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc4852621ad19c854622f7c7d79ec3ab4494353ba2130be57f838b948cfcaebb109382cc4afc982f7e7d2dd39787fff621e3072ec94f6c73018974f63b45c87a7fdfea50c5bd945120da2fb5c646d3438c499194bfaafd3169039961fab0cd13000010e713b0c36228233e886850bd5920b6196a15d61d355c65347857d4330a03837de840b8bcb9cc17cb8ce2f00c7de343477ff2d6620379797961d06afbfa5265054a430f3d9570bdd8dae14be4fe8c8761f8ddcd7ca3bc452935f9083ab91d14ef7803292a2cbc5a9903392eed60629fb955"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x7, 0x0, &(0x7f00000006c0)="b9ff0300000d69", 0x0, 0x400}, 0x40) 07:18:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x6800, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:51 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) r2 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="1e", 0x1, 0xfffffffffffffffe) keyctl$revoke(0x3, r2) keyctl$get_security(0x11, r2, &(0x7f0000000240)=""/151, 0x97) r3 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000080)="1e", 0x1, 0xfffffffffffffffe) keyctl$revoke(0x3, r3) keyctl$setperm(0x5, r3, 0x10001000) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) setsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f00000001c0)={0x0, 0x7f}, 0x8) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x4a, &(0x7f0000000000), &(0x7f0000000080)=0x4) 07:18:51 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @multicast1}, 0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r1, 0x400455cb, 0x100000001) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x500, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4000, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f00000000c0)=[0x3, 0x3], 0x2) 07:18:51 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40", 0x0, 0x400}, 0x40) 07:18:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x4b49, 0x100000001) 07:18:51 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) [ 433.270537][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 433.276442][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:18:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x6c00, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x17) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="000021000000001000000000"], 0xc) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000000)={0x2}) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:18:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0x2, 0x3, 0x67) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000200)=0x2000fc, 0x3e7) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r4, 0x1000000) sendfile(r3, r4, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000200), 0xc) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x3, r5, 0x10, 0x1, @in6={0xa, 0x4e21, 0x80000000, @local, 0xbd}}}, 0xa0) 07:18:52 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40", 0x0, 0x400}, 0x40) 07:18:52 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x4c00, 0x100000001) 07:18:52 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) [ 433.670575][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 433.676438][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:18:52 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xb, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40", 0x0, 0x400}, 0x40) 07:18:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x4c01, 0x100000001) 07:18:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x7400, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:52 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:52 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02c", 0x0, 0x400}, 0x40) 07:18:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x4c07, 0x100000001) 07:18:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x4000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) epoll_pwait(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x1, 0x100, &(0x7f0000000080)={0x4ca0}, 0x8) 07:18:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x1001c0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x4c, r3, 0x2, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x200}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x69}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x20000080) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:53 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x7a00, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:53 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02c", 0x0, 0x400}, 0x40) 07:18:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5409, 0x100000001) 07:18:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$TIOCSERGETLSR(r0, 0x5459, &(0x7f0000000000)) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) [ 434.630577][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 434.636512][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 434.642405][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 434.648184][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:18:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x540b, 0x100000001) 07:18:53 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:53 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02c", 0x0, 0x400}, 0x40) 07:18:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, &(0x7f00000000c0)) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) r2 = socket(0x5, 0xa, 0x80) getsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:18:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x1000000, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) r2 = socket$inet(0x2, 0x1, 0xca) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r3, 0x0) setuid(r3) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFPFLAGS(r4, 0x8935, &(0x7f0000000080)={'veth1_to_bridge\x00', 0xfff}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r5 = socket(0x2, 0x3, 0x67) ioctl(r5, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") bind$llc(r5, &(0x7f0000000000)={0x1a, 0x7, 0x0, 0x81, 0x1f, 0x20, @local}, 0x10) 07:18:53 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f4067d03b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489fdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e601c4dca4c6970a469beb625b67fca0bb1ef6d3c6958da4bddac602e0048bbb8de874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ed84c2be021a6c9da73f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714010d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc4852621ad19c854622f7c7d79ec3ab4494353ba2130be57f838b948cfcaebb109382cc4afc982f7e7d2dd39787fff621e3072ec94f6c73018974f63b45c87a7fdfea50c5bd945120da2fb5c646d3438c499194bfaafd3169039961fab0cd13000010e713b0c36228233e886850bd5920b6196a15d61d355c65347857d4330a03837de840b8bcb9cc17cb8ce2f00c7de343477ff2d6620379797961d06afbfa5265054a430f3d9570bdd8dae14be4fe8c8761f8ddcd7ca3bc452935f9083ab91d14ef7803292a2cbc5a9903392eed60629fb955"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0}, 0x40) 07:18:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x540c, 0x100000001) 07:18:53 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f00000000c0)='selfvm\xcc\x94pnet1\x10\x8f\xb7\x19\xde\xf5\xc9\xcc\x81\xafr\xf0\xa4\xa4r\x8e\xce\xf9\x03?1\x98\xdc\xe7M\xc8\xddp\xea+:\xce,-\x89\x05\xee<\xa8\xcb\xdc\x9d\xbf\xf2\xd2\xa1ilI!\xe9\x1a\xac\xe5,\xb3\x90\xebEM\xd1\\\xdc\x8b\x05\xf8\x01{\xb9\x17e\xccf\xe6\x88\xff\xfe\x99\x8e\xf1&\xa00\xa2\x1b\xe5[\xa1x\xed2\xfe-\x89\xfa;\xd0a#\xcb\xd1\x05\xc3A\x1e,\x8c\x15\xd6~2\xb9\xa9\x05\xecb[D\x99\xe5_t\t \xe1I\xca\x9e\xa2\xe5\xeaW\xf6f\x03\x19\xca\xf7\x02\xed\x05r\x10(\xaed\x16\x8c\x01\x1b\xecd\xf4sz\xcdy\x99p\xfd\xac\xc0\x03\xe4=', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0e0000000000f1e27e6276b10000000000009704a4f62c90ff3d5150341012b30d1a11989977acd736363a3ad7148999bbcd16001354f782acddd67b436242324ab82bde917ce925428dc0fb90270e6d70b1181f79a1e1ca4d404a85589e3d0c83d6c32d927c1550b366504c3242b17025ba43523bb6047a59c4795da5d6f8e7f546940fcbeaa0be15a1f4273a465ca89b39ed3025ba0cec0b9e4cbf8fb6c0e339d9"], 0xc) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x49) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:18:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x2000000, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2}) r4 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) write(r4, &(0x7f0000002000)='/', 0x1) sendfile(r4, r4, &(0x7f0000000100), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r4, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x400454d1, &(0x7f00000000c0)) getsockopt(r2, 0xcfc1, 0xdb2, &(0x7f0000000000)=""/13, &(0x7f0000000080)=0xd) sendto$inet6(r0, 0x0, 0x0, 0x20004804, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:53 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0}, 0x40) 07:18:54 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:54 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x540d, 0x100000001) 07:18:54 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0}, 0x40) 07:18:54 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x3000000, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:54 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:54 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x540e, 0x100000001) 07:18:54 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 435.750539][ C1] protocol 88fb is buggy, dev hsr_slave_0 07:18:54 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:54 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x8) ioctl$TIOCMSET(r2, 0x5418, &(0x7f0000000100)=0x2) r3 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r1, r3, 0x0, 0xeefffdef) r4 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r5 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r5, 0x1000000) sendfile(r4, r5, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000200), 0xc) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000200)={0xe, 0xc}, 0xc) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000000)={0x6, 0x1, 0x40, 0x7}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r6, &(0x7f0000000200), 0xc) ioctl$VT_RESIZEX(r6, 0x560a, &(0x7f0000000140)={0x95d9, 0x0, 0x0, 0xff00, 0x800, 0x9}) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000180)) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:18:54 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x540f, 0x100000001) 07:18:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/47, 0x2f}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x4000000, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:55 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 07:18:55 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40) 07:18:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5410, 0x100000001) 07:18:55 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="b702000003070000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d64050000000000650404000100000004040000f4067d03b7030000000000006a0a00fe18000000850000002b000000b70000000000000095000000000000000d7a28073a4102e4aeb54f36633e27c279341bf489fdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8a34e601c4dca4c6970a469beb625b67fca0bb1ef6d3c6958da4bddac602e0048bbb8de874602f060000002af21b75fe26aa5e85ae281993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff9787dfd6e7608eb638e6fc4e0bc6bd5ff35928a5b5fa723028eb6ddd35ea79b92beeb52265a4b04ba50fd46a504116fb8ed84c2be021a6c9da73f24ad7b965af8f522371c9a43c80ee6b397bea247e2d714010d43fe66bbf4f4ffe410bd701d0350f8dde2a20a0aeffb9843947c3bced2e00463d9c039bfdd58709e898c7ebad73fc4852621ad19c854622f7c7d79ec3ab4494353ba2130be57f838b948cfcaebb109382cc4afc982f7e7d2dd39787fff621e3072ec94f6c73018974f63b45c87a7fdfea50c5bd945120da2fb5c646d3438c499194bfaafd3169039961fab0cd13000010e713b0c36228233e886850bd5920b6196a15d61d355c65347857d4330a03837de840b8bcb9cc17cb8ce2f00c7de343477ff2d6620379797961d06afbfa5265054a430f3d9570bdd8dae14be4fe8c8761f8ddcd7ca3bc452935f9083ab91d14ef7803292a2cbc5a9903392eed60629fb955"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0}, 0x40) 07:18:55 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 07:18:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5411, 0x100000001) 07:18:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x5000000, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000800)) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<', r2}}, {@fowner_lt={'fowner<', r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) [ 437.008959][T13189] XFS (loop0): unknown mount option [euid<00000000000000000000]. 07:18:55 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 07:18:55 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 07:18:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5412, 0x100000001) 07:18:55 executing program 1: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xf) r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r1, 0x1000000) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r3 = gettid() fcntl$setownex(r2, 0xf, &(0x7f0000000280)={0x2, r3}) fcntl$setlease(r2, 0x400, 0x1) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r4, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32=r5, @ANYBLOB="0000d604"], 0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r5, 0x8}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32=r5, @ANYBLOB="0100b5050900e94100000000d900d00c73bec50c9e55b55278359a3d9e979e63c7bd1c74cf0781cd474d6dc2bd99bd7d0b751a88db08bd73895d5ca5f8303f1abd6682a75d65fd0f3bc79a59555d51f05b65df2d33274b2588aeaf8609dbfe0c1b5a295b9a98d3038833c71d9a5f00fb316482435e0b5974"], 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000000c0)={r5, @in6={{0xa, 0x4e24, 0x6, @empty, 0x7fffffff}}, [0x3e, 0x800000, 0x91f, 0x3, 0x1ff, 0x3, 0x7871583a, 0x3, 0x7, 0x5, 0x476b, 0x80000001, 0x2, 0x7fffffff, 0xff]}, &(0x7f0000000240)=0x100) sendfile(r0, r1, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000200), 0xc) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) ioctl$KDADDIO(0xffffffffffffffff, 0x400455cb, 0x100000001) 07:18:55 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x6000000, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:55 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 07:18:55 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 07:18:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5413, 0x100000001) 07:18:56 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 07:18:56 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, &(0x7f00000000c0)) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x14e) 07:18:56 executing program 3: syz_genetlink_get_family_id$fou(0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x400, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x40) 07:18:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5414, 0x100000001) 07:18:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x7000000, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:56 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 07:18:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5415, 0x100000001) [ 437.830588][ C1] net_ratelimit: 1 callbacks suppressed [ 437.830631][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 437.842058][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:18:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000000c0)={'nlmon0\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x39}}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:18:56 executing program 3: 07:18:56 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0xa000000, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:56 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 07:18:56 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5416, 0x100000001) 07:18:56 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x2005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x18090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 07:18:57 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x2, @rand_addr="a164060743b1bb5fd40f720effe50c2a"}, 0x1c) 07:18:57 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 07:18:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5418, 0x100000001) 07:18:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x48000000, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x2) ftruncate(r2, 0x1000000) r3 = open$dir(&(0x7f0000000000)='./file0\x00', 0x20000, 0x4c) dup(r3) sendfile(r1, r2, 0x0, 0xeefffdef) r4 = socket$l2tp(0x18, 0x1, 0x1) r5 = accept(r4, 0x0, 0x0) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0xdfc) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) r6 = socket$pptp(0x18, 0x1, 0x2) connect$l2tp(r5, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x40, @remote}, 0x3, 0x0, 0x1, 0x2}}, 0x2e) dup3(r6, r5, 0x0) 07:18:57 executing program 3: semop(0x0, &(0x7f0000000240)=[{0x0, 0x68}], 0x1) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x8a, 0x0) semctl$GETNCNT(0x0, 0x0, 0xe, 0x0) 07:18:57 executing program 3: r0 = memfd_create(&(0x7f0000000200)='eth0\x00', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) semtimedop(0x0, &(0x7f0000000000)=[{}], 0x8a, 0x0) 07:18:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x541b, 0x100000001) 07:18:57 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) [ 438.790549][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 438.796445][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 438.802325][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 438.808116][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:18:57 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x4c000000, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x541d, 0x100000001) 07:18:57 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'vcan0\x00'}, 0x9d) ioctl$USBDEVFS_RELEASE_PORT(0xffffffffffffffff, 0x80045519, 0x0) fchdir(0xffffffffffffffff) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) [ 438.950546][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 438.956406][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000001ac0)=[{{&(0x7f0000000080)=@in={0x2, 0x0, @broadcast}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000240)=""/80, 0xfffffffffffffdf2}], 0x1, &(0x7f00000002c0)=""/254, 0xfe}, 0x5}, {{&(0x7f00000003c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @remote}}, 0x80, &(0x7f0000001900)=[{&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f0000000440)=""/210, 0xd2}, {&(0x7f0000000540)=""/240, 0xf0}, {&(0x7f0000000640)=""/182, 0xb6}, {&(0x7f0000000700)=""/44, 0x2c}, {&(0x7f0000000740)=""/159, 0xd}, {&(0x7f0000000800)}, {&(0x7f0000000840)=""/143, 0x8f}, {&(0x7f0000000900)=""/4096, 0x1000}], 0x9, &(0x7f00000019c0)=""/241, 0xf1}, 0x4}], 0x2, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x8, 0x440080) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000140)={'icmp\x00'}, &(0x7f0000000180)=0x1e) 07:18:58 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 07:18:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x541e, 0x100000001) 07:18:58 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8), 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'vcan0\x00'}, 0x9d) ioctl$USBDEVFS_RELEASE_PORT(0xffffffffffffffff, 0x80045519, 0x0) fstat(0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/4\x00') ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000002a40)={{0x1, 0x0, 0x7}}) 07:18:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x68000000, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:58 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 07:18:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x541f, 0x100000001) 07:18:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x6c000000, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:58 executing program 3: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f00000000c0)={'stack ', 'vcan0\x00'}, 0x9d) ioctl$USBDEVFS_RELEASE_PORT(0xffffffffffffffff, 0x80045519, 0x0) fstat(0xffffffffffffffff, 0x0) fchdir(0xffffffffffffffff) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/4\x00') ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000002a40)={{0x1, 0x1, 0x7, 0x2, 0xfffff663}}) 07:18:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180), 0x0, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000200), 0xc) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) r4 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r5 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r5, 0x1000000) sendfile(r4, r5, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000200), 0xc) ioctl$TCFLSH(r4, 0x540b, 0x9) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r6, &(0x7f0000000200), 0xc) write$FUSE_NOTIFY_POLL(r6, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x401}}, 0x18) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5420, 0x100000001) 07:18:58 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x74000000, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:58 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r2, r3, 0x0) 07:18:58 executing program 3: 07:18:58 executing program 3: 07:18:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5421, 0x100000001) 07:18:58 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:58 executing program 3: 07:18:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='\x00\x00\x00\x00\x00\x00 \x00', 0x202002, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x3ff) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000080)='.\x00', 0xfe) r4 = inotify_init() r5 = inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x80000000) inotify_rm_watch(r3, r5) inotify_rm_watch(r1, r5) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="1b71b34bf69dda06d3488c2f4dc419cdfd53bdef5381e539458bbdcdec968983f3de814c1653435c9b8bac7cf7c8c397f5b5899c4141ed10b599cc9852ee77ae2f681cdd5b4822f1806a09209730de029c05b3cc6457e0680abbbbd1ae51402664372d4d7a6b766dfcb65ac8244368d5a8a846"], 0xc) r6 = socket(0x2, 0x3, 0x67) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r7 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r7, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0x1c2, &(0x7f00000007c0)={&(0x7f0000000480)={0xffffffffffffff93, 0x0, 0x10, 0x0, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10ffff}]}, 0x1c}}, 0x0) sendmsg$IPVS_CMD_SET_INFO(r6, &(0x7f0000000780)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000740)={&(0x7f0000000640)={0xe4, r8, 0x300, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_team\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}]}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xff}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x0, 0xe, 0x4e24}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_INACT_CONNS={0x4, 0x8, 0x9}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1ff}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4f2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x5}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0xa}, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000100)={0x6, 0xcd54, 0xcb1, 0xfffffbfd, 0x1b, 0x9e, 0x80, 0x1, 0xc0000001, 0x1, 0x9, 0xffff}) r9 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r10 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r10, 0x1000000) sendfile(r9, r10, 0x0, 0xeefffdef) r11 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r12 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r12, 0x1000000) sendfile(r11, r12, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r11, &(0x7f0000000200)=ANY=[@ANYBLOB="0e0000000000001000000000"], 0xc) ioctl$KVM_GET_LAPIC(r11, 0x8400ae8e, &(0x7f0000000200)={"edc00999b8f4934b0c76bd552ec74b08fddf63df22fedb8a88a9f3629b96e9ea7d1cae714f843f499deb7f383bd60268e309722c23494ba1d5a719913b622ca28016cc82c06c3b228c2a6e02b5652b6db5782002e9cb99acfc85c7a81e005ec144dd70971af31d5eb5b75e1b32f1d417dd83fd3910c28abecb8f90da13f93ba47166416e459eb02c366417be2fffc2cab55cc24fb250cf218c00aef53c25622c0dea6c8b4b3cfc030cafee87d0c3ba4417262181c3163d41a50ecc1b31b6a1d3cfbefa6ee6b1b1b2e6ca1a5b05e8f4de18fe946541693e44ab51cd6098e16b7d35ab3605b22c48bce093b9ae6bde600995e846ccac72f8bcbf4e81382b67154791b8a83a78646f043a15057a3c5e3750474274e3e71d0c55be523189d7fcd8d21fd7647eaee66ac2ea105d6885a7d718f8f2273318513b6991fb4792b87e1f146c042d2a9388728398f768b7760851f571fbab8ba63354e283144ea84f6160c28cadcda1d957558edd05b9642fad43e8c308dd549bb92614eba56590b5a74b83727ff371bbda341d3ff6d75943c89f29006dbe208d0ab8425d43ce0bffd83d4bd1d0581aaa7003ccbe2f7b2782a64c80e0a9a858b477b63fb85d189f0848234b99d2a707296d6a1eec41c5ef9f95c292f94965672ed7fdf257581072efb3c1a04e68311c7064d1b566c0d9f9734bbdba57b48ba7ab7ee5605207424b4f2c76cc5593c1daa2b5822f4dddc55765d1ac59970379529cb908a8739ce762c0ef617756b6a3f966c24986b797be66b7954716422d0d6377412fa65cc7890531d9b18bb24e6ef60b7f6be15400de1a88cb9a021bc156258f74de997f3a7f629928a13fb67b95637f3a7f615841697d6f9b6a5ea2f08cefa0b5e1de37d16854fb1997c00471792dd8db03c3ff6bdda166b8102f8de5ab16ba077b0ac4598813bc6f6b2040cdef7e8cc92c446ccc4583702a46f2c3f2d241e5431cff5185d79927e167905e5040c34bd1d66bf617784a90dd6001cf970cb7cab42b35ad7d1bd8e9da3933f93ab8aa06de0433566e173f71b17e77fc11b7e46c3f855db515b5151ed577cba4c43fd6e4a881f10f418f130f09718ef3771484f1e0f6283d1af8f70e07a47b18917260034e6cee728ef8ec4ab4cd7a76ea1be563a406f4d784f7574722127cc27932c090c0fe10391575f4e391e34773f91a1b69033b2a2fd6390a829e122bbbc3fbce89ff7918af85b5bcc0d179e9812b5e7c808b8f3eb38aca4179486d8936066f3ad60b77ccef943aedfbd2328fb32ba5927f134594be46fe961f86cc7c33ba0f3f9f2d8b13022d11fe1b0d65dc1beb5896b2e0abb058bb7495e5d1edd29f9193ac993bd2fa040aea07476ac92b983ca4dc7c71e6c2115ca82ef2dc61d280c208c792fed16b2c85d75ea189043aa1b75b45b5be206177247a1618affc4f"}) write$UHID_SET_REPORT_REPLY(r9, &(0x7f0000000200)=ANY=[], 0x0) ioctl$PPPIOCGUNIT(r9, 0x80047456, &(0x7f00000000c0)) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:18:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x7a000000, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) [ 440.406179][ T26] audit: type=1400 audit(1573715939.029:78): avc: denied { watch_reads } for pid=13398 comm="syz-executor.1" path="/root/syzkaller-testdir177565378/syzkaller.Pv7XiD/162" dev="sda1" ino=16485 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=1 07:18:59 executing program 3: [ 440.870584][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 440.876474][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:18:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0x0}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:59 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:59 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x400, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, 0x0, &(0x7f00000000c0)) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f0000000300)={{0x2, 0x0, @identifier="587efd18a556ba81cac8c6fc3d754635"}}) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x24, 0x33, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x10, @ipv4=@multicast1=0x4000500}]}]}, 0x24}}, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') ioctl$TIOCSTI(r0, 0x5412, 0xd3cd) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x2c, r4, 0x8, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x80) sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r4, 0x10, 0x70bd28, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}}, 0x100) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r6, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) recvmmsg(r6, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x101000, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r5, 0x84, 0x6d, &(0x7f00000004c0)={0x0, 0x79, "a90420182ad1ec14c45f59b312c30901144e8730ee8119c3c448fd870807702e9765fca4b3157372a7f68646d92d70d40290dc00c661f2c32ed3381aaa04ebadd2a4df78a28908341c4bed22139f33e45552010d2be407ae6aaf2f4a62c54f177b779f5026af1e6d86871b9d9109e4b22618ba1b298406667a"}, &(0x7f0000000380)=0x81) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000580)={r7, @in={{0x2, 0x4e21, @remote}}, 0x0, 0x6}, &(0x7f0000000640)=0x90) sendto$inet6(r5, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:18:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5422, 0x100000001) 07:18:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40000, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r3 = gettid() fcntl$setownex(r2, 0xf, &(0x7f0000000280)={0x2, r3}) fcntl$setlease(r2, 0x400, 0x1) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r4, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32=r5, @ANYBLOB="0000d604"], 0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r5, 0x8}, &(0x7f0000000100)=0x8) r6 = socket(0x2, 0x3, 0x67) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r7 = socket(0x2, 0x3, 0x67) ioctl(r7, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000340)=ANY=[], 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r5, @in6={{0xa, 0x4e20, 0x8000, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x29}}, 0x2}}}, 0x84) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f00000000c0)={0x0, 0x0, 0x200, 0x3, [], [], [], 0x4, 0x2, 0xf9, 0x9, "55e0614a773d2bd938dd6fbf8610ed75"}) 07:18:59 executing program 3: 07:18:59 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:18:59 executing program 3: 07:18:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5423, 0x100000001) 07:18:59 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x0}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:18:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x10001) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:00 executing program 3: 07:19:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:00 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(0x0, 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:19:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5424, 0x100000001) 07:19:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x40, 0x0) ioctl$NS_GET_USERNS(r1, 0xb701, 0x0) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) [ 441.609996][ T26] audit: type=1326 audit(1573715940.219:79): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13459 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d05a code=0x0 07:19:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x2}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:00 executing program 3: 07:19:00 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(0x0, 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:19:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5425, 0x100000001) 07:19:00 executing program 3: 07:19:00 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(0x0, 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:19:00 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:00 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000200), 0xc) openat$cgroup_type(r0, &(0x7f0000000240)='cgroup.type\x00', 0x2, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="0e00"/12], 0xc) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000180)={0x10000, 0xb14, 0x9, 'queue1\x00', 0x5}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r4, 0x400455cb, 0x100000001) r5 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PIO_UNIMAP(r5, 0x4b67, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{0x9, 0xc9}, {0x1ff, 0x8000}, {0x9, 0x6379}]}) r6 = socket(0x2, 0x3, 0x67) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") ioctl$SIOCNRDECOBS(r6, 0x89e2) [ 442.412879][ T26] audit: type=1326 audit(1573715941.039:80): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13459 comm="syz-executor.0" exe="/root/syz-executor.0" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d05a code=0x0 07:19:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000000)=[{{0x0, 0xfffffffffffffe4b, &(0x7f0000000140), 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket(0x2, 0x3, 0x67) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r3 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r4 = gettid() fcntl$setownex(r3, 0xf, &(0x7f0000000280)={0x2, r4}) fcntl$setlease(r3, 0x400, 0x1) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r5, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32=r6, @ANYBLOB="0000d604"], 0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r6, 0x8}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32=r6, @ANYBLOB="0100b5050900e94100000000d900d00c73bec50c9e55b55278359a3d9e979e63c7bd1c74cf0781cd474d6dc2bd99bd7d0b751a88db08bd73895d5ca5f8303f1abd6682a75d65fd0f3bc79a59555d51f05b65df2d33274b2588aeaf8609dbfe0c1b5a295b9a98d3038833c71d9a5f00fb316482435e0b5974"], 0x2) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000080)={r6, 0x6e, "5951d2421c2011393820614a840c809a0aed097d5b9d5b0c6903c8f0a2b5c6c611fad58298ee0ef2d294725e6fde7fc9464b54b60c0f370c945ba83899265107c0cb4ddb88e5602689c6845e98e99d6e8e200726d201964b9eae091b0bac2e5ba6fdff4553a15af066312748a9a2"}, &(0x7f0000000100)=0x76) 07:19:01 executing program 3: 07:19:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5427, 0x100000001) 07:19:01 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(0x0, 0x0, 0x0) dup3(r3, r4, 0x0) 07:19:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x6}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:01 executing program 3: 07:19:01 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(0x0, 0x0, 0x0) dup3(r3, r4, 0x0) 07:19:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5428, 0x100000001) 07:19:01 executing program 3: 07:19:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) getsockopt$rose(0xffffffffffffffff, 0x104, 0x5, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2401, 0x0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000080)={0xfff9, 0x5, 0x4}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:01 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x400f) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:01 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(0x0, 0x0, 0x0) dup3(r3, r4, 0x0) 07:19:01 executing program 3: 07:19:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5429, 0x100000001) 07:19:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x8}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) r2 = socket(0x2, 0x3, 0x67) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48000160}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16=r3, @ANYBLOB="00022bbd7000fbdbdf25010000000000000007410000004c00180000008062726f6164636173742d6c696e6b00"/98], 0x68}, 0x1, 0x0, 0x0, 0x4890}, 0x1) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:01 executing program 3: 07:19:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x542e, 0x100000001) 07:19:01 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r3, 0x0) 07:19:02 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000200), 0xc) epoll_wait(r0, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], 0x6, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r2, 0x400455cb, 0x100000001) 07:19:02 executing program 3: 07:19:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$packet_int(r1, 0x107, 0x7, &(0x7f0000000000)=0x6, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0xf}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5437, 0x100000001) 07:19:02 executing program 3: 07:19:02 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r3, 0x0) [ 443.670554][ C0] net_ratelimit: 10 callbacks suppressed [ 443.670563][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 443.682444][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 443.750582][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 443.756751][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:19:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5441, 0x100000001) 07:19:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) write$cgroup_pid(r2, &(0x7f0000000100)=r4, 0x12) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) r5 = accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c) recvmmsg(r5, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)}}], 0x1, 0x0, 0x0) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, 0x0, &(0x7f00000000c0)) sendto$inet6(r6, 0x0, 0x50, 0x4050, &(0x7f0000000040)={0xa, 0x4e20, 0xfffffffb, @loopback}, 0x1c) 07:19:02 executing program 3: 07:19:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x79}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:02 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(0xffffffffffffffff, r3, 0x0) 07:19:02 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="b1651821cd80a57f38720e000000000000000000dbf9"], 0xc) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000000)={0x1f, 0x101, 0x7b, 0x101}) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:02 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) 07:19:02 executing program 3: 07:19:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5450, 0x100000001) 07:19:02 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:03 executing program 3: 07:19:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5451, 0x100000001) 07:19:03 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) 07:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) io_uring_enter(r2, 0x7, 0x401, 0x3, &(0x7f00000001c0)={0x1}, 0x8) sync_file_range(r2, 0x0, 0x0, 0x6) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, 0x0, &(0x7f00000000c0)) shutdown(r1, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000240)={{{@in=@multicast2, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) 07:19:03 executing program 3: 07:19:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x2]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5452, 0x100000001) 07:19:03 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev\b\x00\x00\x00x\x10', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x11) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:03 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, 0xffffffffffffffff, 0x0) 07:19:03 executing program 3: 07:19:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5456, 0x100000001) 07:19:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x3]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x800, 0x0) recvmmsg(r2, &(0x7f0000000180), 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:03 executing program 3: 07:19:03 executing program 5: 07:19:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x545d, 0x100000001) 07:19:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x100c2, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:04 executing program 3: 07:19:04 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) gettid() r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) fcntl$lock(0xffffffffffffffff, 0x28, &(0x7f0000000240)={0x3, 0x1, 0x26ee, 0x5, r2}) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, 0x0, &(0x7f00000000c0)) sendto$inet6(r3, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0xffff, @mcast1}, 0x1c) r4 = userfaultfd(0x1800) r5 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r6 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r6, 0x1000000) sendfile(r5, r6, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r5, &(0x7f0000000200), 0xc) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r5, 0x5386, &(0x7f0000000080)) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000000)={0x8, 0x4, 0x1}) 07:19:04 executing program 5: 07:19:04 executing program 3: 07:19:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x40, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000080)='cpuacct.\xdb\x17`\\+\xb6\\\xbcY$', 0x275a, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='?proc/self/net/pfkey\x00', 0x230200, 0x0) ioctl$SIOCX25GDTEFACILITIES(r3, 0x89ea, &(0x7f00000004c0)) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x2000402) fallocate(r2, 0x0, 0x0, 0x110001) ftruncate(r4, 0x3ff) r5 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x3, 0x2) ioctl$VIDIOC_G_MODULATOR(r5, 0xc0445636, &(0x7f0000000140)={0x3fb, "d363c7c678336fc45665499bd86ba100d44f63187811217816597cff60f7d32d", 0x1, 0x101, 0x10000, 0x4, 0x4958ce27c1b3e4f8}) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r4}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x75aeddb07664dfcb, 0x0) getsockopt$CAN_RAW_FD_FRAMES(r6, 0x65, 0x5, &(0x7f0000000200), &(0x7f0000000240)=0x4) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x404001, 0x0) 07:19:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x5460, 0x100000001) 07:19:04 executing program 5: [ 445.750578][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 445.756759][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:19:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x5]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) [ 445.830574][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 445.836579][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:19:04 executing program 3: 07:19:04 executing program 5: 07:19:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x6364, 0x100000001) 07:19:04 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r2 = socket(0x2, 0x3, 0x67) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x1000, 0x101, 0x8000}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000100)={r3, 0x81, 0x81, "16f2ea99710b5cccca23202fe4a084ac12d5be45787b2c38432ecc950eff6fa505f3500df9b2fe38aed115cbf8be893fed3c9c2019a1605cde41c333aa3919106d35bd442c432157f836f1f4d2304ab3921efd0bbc7f3b5499667fa582962649823b4aa39823b468f5c873cd4cdd58248e48d4a5edb08e2646d5f3411906b758d0"}, 0x89) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000800)) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<', r2}}, {@fowner_lt={'fowner<', r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) [ 446.150573][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 446.156672][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 446.317936][T13740] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:05 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000200), 0xc) ioctl$KVM_GET_FPU(r2, 0x81a0ae8c, &(0x7f0000000240)) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000800)) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<', r2}}, {@fowner_lt={'fowner<', r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:05 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x1000000, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x8912, 0x100000001) 07:19:05 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0xf7c38ddee58066da, 0x0) ioctl$KDADDIO(r0, 0x400455cb, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, 0x0, &(0x7f00000000c0)) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000100)=ANY=[@ANYRESDEC=r3], 0x1) ioctl$TIOCSPTLCK(r1, 0x40045431, &(0x7f00000000c0)) 07:19:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x8916, 0x100000001) [ 446.627231][T13762] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x8933, 0x100000001) 07:19:05 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x7]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:05 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000800)) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<', r2}}, {@fowner_lt={'fowner<', r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:05 executing program 5 (fault-call:8 fault-nth:0): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:19:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x8936, 0x100000001) [ 447.013249][T13793] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 07:19:06 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:19:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xae01, 0x100000001) 07:19:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0xa]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<', r2}}, {@fowner_lt={'fowner<', r3}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VFIO_SET_IOMMU(r1, 0x3b66, 0x6) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x40044590, 0x100000001) 07:19:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x111043, 0x0) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) [ 447.648614][T13820] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x48]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:06 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x4000) 07:19:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) lstat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<', r2}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x40045431, 0x100000001) 07:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:06 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) ioctl$VT_RELDISP(r1, 0x5605) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:06 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x40000000) 07:19:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x40045436, 0x100000001) [ 448.137591][T13858] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x4c]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r2, 0x4018620d, &(0x7f0000000080)={0x73622a85, 0x100, 0x1}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400454ca, 0x100000001) 07:19:07 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x68]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:07 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x4000000000000000) 07:19:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x40045565, 0x100000001) [ 448.675904][T13900] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = socket(0x2, 0x3, 0x67) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) write(r2, &(0x7f0000001640)="1bbcadf9e7e31900296598588ba1fe2833fcad01a29cd1744a8a07d818b6503c17bb742f3469f409482bd8d5ed3a972a525af7d460c1cf21ef7ab17e68004fe089950cdf429926102fa9738ce0348f0a989f2887577d2f4f38a2c9466630", 0x5e) r3 = socket$caif_stream(0x25, 0x1, 0x4) recvmmsg(r3, &(0x7f0000001580), 0x1, 0x0, 0x0) r4 = accept4$netrom(0xffffffffffffffff, &(0x7f00000015c0)={{0x3, @bcast}, [@remote, @null, @rose, @netrom, @null, @default, @null, @null]}, &(0x7f0000000100)=0x48, 0x0) setsockopt$netrom_NETROM_IDLE(r4, 0x103, 0x7, &(0x7f0000000180)=0x3, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback, 0x1}, 0x1c) 07:19:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x6c]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x208880, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:07 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, 0x0, &(0x7f00000000c0)) dup3(r3, r4, 0x80000) 07:19:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:07 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:07 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x74]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180), 0x0, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x410900, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:07 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$RDS_GET_MR(r3, 0x114, 0x2, &(0x7f0000000300)={{&(0x7f0000000240)=""/184, 0xb8}, &(0x7f0000000180), 0x8}, 0x20) r4 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="1e", 0x1, 0xfffffffffffffffe) r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r5, 0x111, 0x4, 0x0, 0x4) keyctl$revoke(0x3, r4) keyctl$assume_authority(0x10, r4) r6 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r6, 0x0) [ 449.157592][T13936] XFS (loop3): unknown mount option [euid<00000000000000000000]. [ 449.190583][ C0] net_ratelimit: 10 callbacks suppressed [ 449.190593][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 449.202384][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 449.208747][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 449.215136][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:19:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x40049409, 0x100000001) 07:19:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x4, 0x100) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f00000000c0)) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) [ 449.350611][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 449.356512][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:19:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x200) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) recvmsg(r1, &(0x7f0000001580)={&(0x7f0000000240)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/163, 0xa3}, {&(0x7f0000001380)=""/246, 0xf6}, {&(0x7f0000001480)=""/198, 0xc6}], 0x4, &(0x7f00000001c0)=""/31, 0x1f}, 0xc143) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x7e2, 0x2c1482) shutdown(r3, 0x0) 07:19:08 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x40086602, 0x100000001) 07:19:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x7a]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:08 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) r5 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r6 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r6, 0x1000000) sendfile(r5, r6, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r5, &(0x7f0000000200), 0xc) ioctl$EVIOCGRAB(r5, 0x40044590, &(0x7f0000000000)=0x80000001) [ 449.728342][T13969] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:08 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0xe630a8e5b15d3b9e, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/sockstat\x00') ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000100)=0x4) r2 = syz_open_dev$swradio(&(0x7f0000000400)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0x8000013) r3 = socket(0x2, 0x3, 0x67) r4 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r5 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r5, 0x1000000) sendfile(r4, r5, 0x0, 0xeefffdef) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, 0x0, &(0x7f00000000c0)) fsetxattr$security_smack_entry(r6, &(0x7f0000000440)='security.SMACK64\x00', &(0x7f0000000480)='net/sockstat\x00', 0xd, 0x1) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000200)=ANY=[@ANYBLOB="0e000000000000"], 0xc) ioctl$PPPIOCGIDLE(r4, 0x8010743f, &(0x7f0000000180)) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") fsync(r4) connect$caif(r3, &(0x7f0000000000)=@util={0x25, "296f76ff33f1980f1047a9bef9252891"}, 0x18) r7 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r8 = gettid() fcntl$setownex(r7, 0xf, &(0x7f0000000280)={0x2, r8}) fcntl$setlease(r7, 0x400, 0x1) r9 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r9, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32=r10, @ANYBLOB="0000d604"], 0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r10, 0x8}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32=r10, @ANYBLOB="0100b5050900e94100000000d900d00c73bec50c9e55b55278359a3d9e979e63c7bd1c74cf0781cd474d6dc2bd99bd7d0b751a88db08bd73895d5ca5f8303f1abd6682a75d65fd0f3bc79a59555d51f05b65df2d33274b2588aeaf8609dbfe0c1b5a295b9a98d3038833c71d9a5f00fb316482435e0b5974"], 0x2) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000240)={r10, 0x5a, "e048661ce6a9a27be3e5052d93be0e4df55b1330d6e343897933369170467fb21c97a19f780b8fcda8f54b3ae3a963ef2475426514f1632c1e3eb0493a15d6ff2c820d801ad895a034b233c6f140033743205750d3e01d5fef11"}, &(0x7f00000002c0)=0x62) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000300)={r11, 0x9, "829774842814d2044d"}, &(0x7f0000000340)=0x11) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000380)=""/100) 07:19:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x40087602, 0x100000001) 07:19:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) r3 = openat(r1, &(0x7f0000000180)='./file0\x00', 0x80000, 0x83) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0xd83b, 0x0, 0x0, 0x0, &(0x7f0000000340)={0x4, 0x5}, 0x0, 0x0, &(0x7f0000000380)={0x3, 0xc, 0x9, 0x4}, &(0x7f00000003c0)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x2d6a}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={r3, 0x10, &(0x7f0000000540)={&(0x7f0000000240)=""/151, 0x97, r4}}, 0x10) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r5, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000140)}}], 0x1, 0x40010021, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r6, &(0x7f00000000c0)=ANY=[@ANYBLOB="0e00000000000000c086cd2555531b8b2d7f4f7513b908831811e1abd36e5a6733487ab555c2ff1daef9a6be953c80693c1d22c2a08ae2908faba197bdc5d7f4f69db6c27c84fd01c07359c38b960f3eb575c1368fb159ac25754c545b4e822e06a755e92e348ec89b62f114cdd0b0143b070928fa7522cce261053efa0200000000000000dd1fca8cccb1d2478eb12189e91743cfd824b86f49e6c9008b43dbe96f8a8a37fa07f936e0fd85fb9c9d1422611f13"], 0xc) ioctl$EVIOCGBITSND(r6, 0x80404532, &(0x7f0000000080)=""/62) 07:19:08 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:08 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r1 = gettid() fcntl$setownex(r0, 0xf, &(0x7f0000000280)={0x2, r1}) lookup_dcookie(0xfffffffffffffff7, &(0x7f0000000380)=""/199, 0xc7) fcntl$setlease(r0, 0x400, 0x1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32=r3, @ANYBLOB="0000d604"], 0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r3, 0x8}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32=r3, @ANYBLOB="0100b5050900e94100000000d900d00c73bec50c9e55b55278359a3d9e979e63c7bd1c74cf0781cd474d6dc2bd99bd7d0b751a88db08bd73895d5ca5f8303f1abd6682a75d65fd0f3bc79a59555d51f05b65df2d33274b2588aeaf8609dbfe0c1b5a295b9a98d3038833c71d9a5f00fb316482435e0b5974"], 0x2) setsockopt$inet_sctp_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, &(0x7f0000000080)={r3, 0x1, 0x47, "4034eea80ee61bea458519cfcb0f098c85e828bc35a0c0fee732a25e50c774b8c2796b56dff074f5802c9d22554832191d3018267e4ad2a08fdcc8deca57b39f222ef8db352b85"}, 0x4f) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write$cgroup_int(r7, &(0x7f0000000180), 0x12) r8 = socket(0x2, 0x3, 0x67) ioctl(r8, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") setsockopt$inet6_udp_int(r8, 0x11, 0xb, &(0x7f0000000000)=0x9, 0x4) r9 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r7, r9, 0x0) 07:19:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x4020940d, 0x100000001) [ 450.163099][T14006] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:08 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:08 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x9, &(0x7f0000000040), 0x4) setsockopt$inet_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) dup3(r3, r4, 0x0) 07:19:08 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x2]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) [ 450.310561][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 450.316676][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:19:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x4020ae46, 0x100000001) [ 450.492138][T14029] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x3]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:09 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, 0x0, &(0x7f00000000c0)) fcntl$getown(r0, 0x9) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x8800, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7, 0x4000) ioctl$KDADDIO(r1, 0x400455cb, 0x100000001) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000040)={0x6, 0xffff, 0x8000, 0x84f6, 0x6, 0xfffffffffffffff7}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000140)='team_slave_0\x00') r4 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r4, 0x1000000) sendfile(r2, r4, 0x0, 0xeefffdef) r5 = socket(0x2, 0x3, 0x67) ioctl(r5, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") accept4$packet(r5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000240)=0x14, 0x800) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000200), 0xc) ioctl$EVIOCGKEYCODE(r2, 0x80084504, &(0x7f0000000100)=""/53) 07:19:09 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, 0x0, &(0x7f00000000c0)) dup3(r1, 0xffffffffffffffff, 0x140000) 07:19:09 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="0ea1a49d2bcfee020e160000"], 0xc) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f0000000080)=0x810e) 07:19:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80045430, 0x100000001) 07:19:09 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:09 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:09 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket(0x2, 0x3, 0x67) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, 0x0, &(0x7f00000000c0)) recvmsg(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000003540)=[{&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000000080)=""/79, 0x4f}, {&(0x7f0000000000)=""/30, 0x1e}, {&(0x7f0000000180)=""/53, 0x35}, {&(0x7f0000000240)=""/45, 0x2d}, {&(0x7f0000000280)}, {&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f0000002380)=""/163, 0xa3}, {&(0x7f0000002440)=""/4096, 0x1000}, {&(0x7f0000003440)=""/195, 0xc3}], 0xa, &(0x7f0000003600)=""/173, 0xad}, 0x100) r6 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r4, r6, 0x0) 07:19:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80045432, 0x100000001) [ 451.183734][T14070] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:09 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:09 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) r5 = getpid() rt_tgsigqueueinfo(0xffffffffffffffff, r5, 0x3f, &(0x7f0000000080)={0x28, 0x1, 0xfffffffe}) r6 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x101000, 0x0) connect$nfc_llcp(r6, &(0x7f0000000240)={0x27, 0x1, 0x1, 0x4, 0x7, 0x5, "579e455f6c918605c4b55e3e742f65ea79fe2e9ed5c77ac71f87b9dbfc25b04af49081bc520780dba08a2adb44919f446e26cf27f55fba18fc7663e5278572", 0xf}, 0x60) [ 451.270575][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 451.276726][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:19:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x5]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80045438, 0x100000001) 07:19:10 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) r3 = socket(0x2, 0x3, 0x67) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") connect$ax25(r3, &(0x7f0000000240)={{0x3, @bcast, 0x5}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @bcast]}, 0x48) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) write$P9_RREAD(r1, &(0x7f0000000140)={0xf0, 0x75, 0x2, {0xe5, "1b027c0b2c4ba042d22a69338dfc227438e99ce56a3f30c5ec1bdf98caf2f1379364123765c6dee03daec02e1ab8ece26f82d70bf5a5e778843c0c7b45b4687605b48bf72db5ba2cfe40ebb797b7d7037474f2fe13503f98aaa864cdf660376ddbd16bc94f3c19717cf74a44ea50c94f620e79c9d47ea481cbbb167f99a8a77367184378498f169c65c46461daea915e7701452aebc3ee89b62c833c3e34e43c8c397c9e19e79b08ddb7f0946a85bf2eff705a418f82902601a63921e786ae66103b6d614fbb53278a18cc5a7efbb6c5ba146df9911a2298316db0b29d1130a6280df0343d"}}, 0xf0) openat$md(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/md0\x00', 0x20104, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x440, 0x118) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r4, 0xc04c5349, &(0x7f00000000c0)={0xfffffffc, 0x9, 0x1}) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:10 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000005c0)='mqueue\x00', 0x10000a0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket(0x2, 0x3, 0x67) r3 = socket(0x2, 0x3, 0x67) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r4 = socket(0x2, 0x3, 0x67) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") getsockopt$inet6_tcp_buf(r4, 0x6, 0xe, &(0x7f0000000500)=""/143, &(0x7f0000000180)=0x8f) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0xac}, 0x1, 0x0, 0x0, 0x40004}, 0x10000) r5 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r7 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r6, r7, 0x0) 07:19:10 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80045439, 0x100000001) 07:19:10 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0xb0000, 0x0) sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80404000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x31a, 0x0, 0x10, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000c080}, 0x33) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_mtu(r4, 0x0, 0xa, &(0x7f0000000280), &(0x7f00000002c0)=0x4) r5 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r4, r5, 0x0) 07:19:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r2, &(0x7f0000000440)=""/46, 0x2e) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, 0x0, &(0x7f00000000c0)) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000017c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xfe06) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', r5}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00', r5}) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r6 = open(&(0x7f0000000000)='./file0\x00', 0x1c1000, 0x143) ioctl$KDDELIO(r2, 0x4b35, 0x3) write$cgroup_type(r6, &(0x7f0000000080)='threaded\x00', 0x9) 07:19:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80045440, 0x100000001) 07:19:10 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:10 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:19:10 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x7]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:11 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000040), 0x4) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0x4) prctl$PR_SVE_SET_VL(0x32, 0x11289) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) r3 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r4, 0x1000000) sendfile(r3, r4, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000200)=ANY=[@ANYBLOB], 0xc) r5 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r6 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r6, 0x1000000) sendfile(r5, r6, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="0e898b905c000000289ae8b838fd9ec51d54ac390000100000e7cf10748222be75cc895897607163dd50b28ec2ef9ff00d357a774cafa8"], 0xc) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) listen(0xffffffffffffffff, 0x200) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:11 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) socketpair(0x3, 0x8, 0x8, &(0x7f0000000140)={0xffffffffffffffff}) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000200), 0xc) ioctl$GIO_FONTX(r2, 0x4b6b, &(0x7f00000000c0)=""/37) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x4) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) socket$rds(0x15, 0x5, 0x0) 07:19:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x800454d2, 0x100000001) 07:19:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0xa]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', 0x0, 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:11 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x2, 0x3, 0x67) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r4 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r4, &(0x7f0000000440)=""/46, 0x2e) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f00000017c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', r5}) sendmsg$can_j1939(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x1d, r5, 0x0, {0x3}, 0xfd}, 0x18, &(0x7f0000000080)={&(0x7f0000000240)="58c3ad6108ba70e3682ec41c23378702d38be81c4db64e61fcce1312956b35427020908ed7237c4c975043d1bfd7976a5f19ddf97d7a7c772971323acff952f54432535ac9e20032f1fa6f204806bdde8dfd80cf2efe020a81f745dfef1faa93b7078b0cc7a4c5909c708d67164a0a4bcacde35da9aa670ebcd8a2af5824d4353880085bfa6158569eaeefb3b47becfc1ee80d", 0x93}, 0x1, 0x0, 0x0, 0x40805}, 0x10000000) r6 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r7 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r6, r7, 0x0) 07:19:11 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', 0x0, 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) [ 452.869609][T14175] raw_sendmsg: syz-executor.5 forgot to set AF_INET. Fix it! 07:19:11 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0xa2) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6_udp(0xa, 0x2, 0x0) r3 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x100) dup3(r3, 0xffffffffffffffff, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x401}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0)={r5, 0x9, 0x1000, 0x1}, &(0x7f0000000180)=0x10) 07:19:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x800455c9, 0x100000001) 07:19:11 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x48]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:11 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)='tmpfs\x00', 0x3111483, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r6 = socket(0x2, 0x3, 0x67) ioctl(r6, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") bind$isdn(r6, &(0x7f0000001440)={0x22, 0x0, 0x34, 0x0, 0x4}, 0x6) clone3(&(0x7f0000001380)={0x40000000, &(0x7f0000000080), &(0x7f0000000180)=0x0, &(0x7f0000000240), 0x8, 0x0, &(0x7f0000000280)=""/134, 0x86, &(0x7f0000000380)=""/4096}, 0x40) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f00000013c0)={[], 0x1, 0xffffffff, 0x200, 0x4, 0x4, r7}) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)) dup3(r4, r5, 0x0) 07:19:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x800455ca, 0x100000001) [ 453.371503][T14207] IPVS: ftp: loaded support on port[0] = 21 07:19:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', 0x0, 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:12 executing program 1: io_setup(0x3, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x1, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000100)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r2 = socket(0x2, 0x3, 0x67) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") setsockopt$netrom_NETROM_T2(r2, 0x103, 0x2, &(0x7f0000000140)=0x2, 0x4) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x800455cc, 0x100000001) 07:19:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x4c]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:12 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, &(0x7f00000000c0)) sendto$inet6(r1, 0x0, 0x0, 0x4c084, &(0x7f00000000c0)={0xa, 0x0, 0x2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x27c) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f0000000080)) 07:19:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:12 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) [ 453.908404][T14240] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:12 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r5 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1ff, 0x660680) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r5, 0xc4c85513, &(0x7f0000000380)={{0x5, 0x0, 0x7fff, 0x4, '\x00', 0x53}, 0x1, [0x8, 0x5, 0x400, 0x19d, 0x4, 0xdfa, 0xffff, 0x6, 0x0, 0x4, 0x81, 0x4, 0x4, 0x7f, 0x9, 0xfff, 0x5, 0xfffffffffffffffa, 0x9, 0x6, 0x0, 0x1, 0x8, 0x7, 0x81, 0x1f, 0x3ff, 0x9, 0x5, 0xdcf, 0x7, 0x7fffffff, 0x10, 0x6, 0x1ff, 0x1, 0x6, 0x4, 0x7f, 0x80, 0x9, 0x8, 0xfffffffffffffffc, 0x3f, 0x10000, 0x0, 0xffffffff, 0x5, 0x2, 0x6, 0x6, 0xa74a, 0x2, 0x6, 0xffff, 0x1, 0x0, 0x4f, 0x2, 0xc10, 0x80000000, 0x1, 0xffff, 0x2, 0x4, 0x0, 0x4, 0x1, 0x7f, 0x2, 0x0, 0x6, 0xe0c, 0x4, 0x10001, 0x0, 0xff, 0x0, 0x0, 0x8, 0x3, 0x100000000, 0x4, 0x0, 0xffffffff, 0x2, 0x8, 0x9, 0x924, 0x10001, 0x9920, 0x5, 0x1, 0x20000000, 0x5, 0x4, 0x2, 0x7, 0x5, 0x100000000, 0x1, 0x2, 0x4000000000000000, 0xfff, 0x2, 0x4, 0x4, 0x3, 0xae, 0x3, 0x7, 0x3f, 0x6, 0x5, 0x2, 0x5, 0xfffffffffffff6cf, 0x6, 0x2, 0x18b, 0x5, 0x10001, 0x100000c863, 0xf93, 0x81, 0x7a8, 0x8, 0x6], {r6, r7+30000000}}) dup3(r3, r4, 0x0) 07:19:12 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80086301, 0x100000001) 07:19:12 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x68]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:12 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x8000, 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f00000000c0)={0x47ff, 0x400, 0x8742, 0xb8b9, 0x9, 0x4}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='\x00\x00\x02\x00\x00\x00\x00\x00\x01\x00', 0x100800, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0xffe00000) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000200), 0xc) r4 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r5 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r5, 0x1000000) sendfile(r4, r5, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000200), 0xc) ioctl$SNDRV_TIMER_IOCTL_STATUS(r4, 0x80605414, &(0x7f0000000380)=""/23) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000016c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r9, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="850000002e000000d40000001000000095000000000000008420beb3a13dfec04846fc1a141976982793fa64f80f504c009d17305c0000000000000000e6f39241dbbf45c2f9c8c563c897c977e51522e7f94307ca4f1219f7b793ffe8427184798df3f06b3cae68432b1fead542cd2bb84936029a16560271b57f"], &(0x7f0000000240)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0x348, &(0x7f0000000480)=""/195, 0x0, 0x0, [0x42]}, 0x48) ioctl$KDADDIO(r1, 0x400455cb, 0x100000001) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000100)={0x73, @empty, 0x4e22, 0x3, 'wlc\x00', 0x14, 0x7, 0x2e}, 0x2c) 07:19:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) write$UHID_INPUT(r2, &(0x7f0000000240)={0x8, "a51967a72ed1a2b6c08feb42a3139fbd1f0d0884cdbfada3e4625dbab40605ade4647baa67227011f119dc4be78ce6c50b845a6bafc4793f5e302f6643a4e29724a3b15de11a9f97ba242e692f0cbc189ab4cd56ed295c0c650f1bc8597f6cbd706389db4f70fc9357bb7c5e7486f5ece90fb46e282d04b4f461ccea1580e8ebe594c66dfc2c44cbda83a6036e08d41f500f17020a9f79e3016f1d07e4aeb0f330b5d382cde32ff1ebca3b8a78119de3391e302c66337fe13c1eb33cc0291dae9f1cfdb44e4f807377b61ac696ac1e500d2f492bcbe3a576cab61edc5d66e8950aa6f044f6742991489dcd5f57ef5e9561c48d516d56877413c78c83f8295f9f5d92026107d17a1375e5b68abf478256e311487f187ff72b17da16d8ca2aa4539c034f0bc2cb628ce88e7bdd25d62776bda444f85607a88c0d5db5b8d26ef7e93cf114b1e6ff7b2036c60cef7c83df401fdb3bf4ceecb0e5df14f59f1f617654106e89b8ed87400e6021b6a4f93ee9d36aeacb0ed74a582d0083a05fe99846eae584113dbf6b94bb4224f445c869288dfc799ffa21b840dc2554faedbf72d63751a4b3fe01a85851d32cc179b0562716eeacfeb4b749297fc0c75be5279a8bddcdc2dd7bf953c4186e7e5365cb7704265ddd07bd932fbd6e5cd0763c2b208c4acddd5e8bdbcc5d0493c2a874eeac7a7932917e86a0824885f2976e62666ae30639573c62628370b532f4b649944d8b66c4af5eba87dd1be862781bdd76ae5ac1406e91dfbbfc23726a723940be32135de48fabdecf2ee05e5fa834e154ba216b05017399e39057f3b8e688a548a328560d670800f79269eaa3ca248d27758a845a87836ac671a37175ca5699b3be1f956218f257789b2a2570bedc6aaaffebcd38e5953230475b4946ddcf88eccf5e526e3fefc10238abf2ec718b38eaaa004c30add68115c150fa0053bd29f97c8a71eb1efaa0275eb4be61eff41af81c14987978884e24b4dc803a3d25d06c1d8675ed813105a8fd07b8793b6869e5b462e9bb244a04ead8fb97f203d4e545ff3fdd5ae4e0692b54b05f74b0ca8d239e9fab2f05134c6acf7434502e21e774044d1c256983a295e164add4e5307772b1fb2b82c163ad090750939e7c3eb18994ff68f1899a5dc26073ee29884e96a7a6c81d03d5d4a252f8c028fc2c078bd1b35082309353e0f06a056abb456980cea74385e910c810d171a5dfcf5954e3d4a9cc6d96a2079ce9bd9dba4b8ba221c45712bb99b123b522db2712b3eb9b0141d275a9727ddeec39d8d469a7fb95a1f6e3b99b4383f1d6c07d58e1b9f86108bbcaeb20286ca2a56ec6a62f0ef6f3dd8b70d19adf74d6e828686c15e01894ed58e1f07f8345865f987de1dd03db9c0f68b2076bf9febff0703db94add6e8130d20e415f635a1f6cbc2ab420ebecf094571c3690810de2e21184a6838b35297be44bb58e582ebacb96934f34fbac13498100e11ade02e57df55af9d32b274bfcef77d85808897ff7dcc676ad6415b96ad116dfcc4650147629206506b1d1fc3c422220faae825b74249b7eb3c06a8f6ef5b4ba89da6cf5b564601f375e718efdce5a0e073547cb50eded5a0758ea37ca912e6b0cdc2881c2990d2f072c84cc6053d7b4f64b458ff3e3033986bbe7cdf0bc623e7baae516c17c91cc8c4f30a1de441e3ac7024c84e8682a67fcacdd86887e454e45a8acd6681711371bfa6590a69bab0533b3d2cb4f83528ddcd4bd833fed44af29641977b7a7f4c728bad26489dec70576abe9bfc1281c30a6bb68a66bdbd35b720c39dc342d0c24b474a916ea10e18d21af7cae0a40c54207737f4f2297f9e32f06e07cde7f72138a72217c7f670775cf9c0f088e7bfd13730f939130b15261937d538d69cfd85e68b038faff6a11f339b126b940cbd980d9b77b5f1fdbe2cd50ffc2cec54499cfcee1e152047242d1dff35e0e8b97c90ef31c8fe900afc98590c998f4d4573d80f884979cc15f91975d95768544220cfb598f7b1b74071cf4b8cb20e7e2eca42c36b3c3739fa30ce56e0efec5062b81fb87d1b9b16f8687a424d7cb5c555a0d0a375600c15a324ab2e5e8af49c026b4cc83a79c8754fead669fe5d687ee2aab6541c86fbec41162ed21a64205b1907b5d6f2350745a6c976248f99dbf803e81fee99f1c716136c7f483dfafdf4afbd33c33ab6886a25ae17c6d968565d672addb231f076da803887867748c3f145c605017660e30e5326f736fcd5bff79cc3547f0e190c4633ff3b1c4ed9cbf4a9383f94955a1cc511ba0a175469408cac4715d0b0ee1f6446a9070257eb98d645894ceca7af42bd304545db0e1d8db04e5909c391b678bd87787228e194890d19bceebe40d3e016dd73e5dddadaaedaf658713ac2b8bb85d962716a33b27950c7e6a57eca1433169545d96bfdb04b429674bb95af960b77fc9948ed96ba31b4943b41562228dcb52899e568f0e6a71e2cd56bbf90873fddb2bb3a4b2e475ca6bf16431202996607b2750de9807bd0482425c08ad9fc52eb879a75f64957d8527aaa57daac725a5efa7840c9d30b618f65b32ef36983b0e224d60142f3f62d4e928008aafe0a2465bedb3b1dd80ec43e60824880aeaca980fac37e51f588d1d2895fcdb035987fca0379a65befec9d1ec56b7386ef36c8cdc33a9c250f2f59e49900779d08b5e038e3d4ec07606fb980cd76c1e40ecf77493db7923fabfe9675701f804accdac983c2ad91aa0e2a7b15faaf9379b1d083e6b7ecb780f0366eab888e560cb288aab9340637816650aecd9a54d3938cef347a4ac253c891de9904bf3763fd6eae26066494f25587260777387c4ad99f9be4e2be420fceb0693af93efc9af4a7423e704f7206c70d2cb57b60f1d9ae4e39d3503870cbfed97ccc42f043ee3da665034b5401dcb3630f1d3e034b4ddd3ab8880d7395a6af54d79763eaa28b596d3208f0dcfb3fffa06c751ff948d41531f9f6758bedbd45720859dd3616693ac5a5e2404a70f80dfbc170e5ba993e67b1fcae932672c1e446ddd14ccc093eae3d6790ee6beaf1659d657cb11f76c2b99d7f9070716b5b53403450ff56d2783844f1cdda6024ee9f156bf62338c49e9e63c9210d82fdb9d083ca1f144e2a3438c3dea59590c2040bfa30c31af2ae5f16eac1ecf1624b089f6cff36f456e7418b32df9c64bf90ad51e62f9ee75dc8faf5a3e75bbd8ed6bde3ea00232124172a9bbd8fa2c266a41fda996f343141b0275dad62d807e2c0ec4a79767d7d520670a3b28140689611ecc9af14bf62c7abd99dc3a1dd0fe49cff737da4b3a17954a17ff6076db09768fe97860be5b44956621be0ad0fbbbc07465e36fd0324363c6ae6be97f1a8ea99c73db152407e02f6913327289179dac0673155d423fb801273daea0c5b991b774c94efb86d370ffafca831ee59b5b47d3de56bbab41f412811b0b3b1e54f4bac7923620462c1819f6326e4fe72c8adee76e417f73e8f730684c426e39324872959a9bd20e8e48fc1b1136f9c9c68c03cf7032b44255c1b6a3b67dccb0ac0c64e4278ff1680046b18cb404aba28ca1c51d049507ca50ef6ee03b7d07d6b2e6b1070cc0e65262dc0c780ec6c31666aaf1e251011081abcbf97bce9d6581c0c0e2a4242ab184417d2359a0d82e6fb9b3af9da8ea848297e9a2ba9383bf9a83194e6e276a9751bfc2db43e410bdafa1bf2a727bef0c0f524b0d45b096e1f2d5f2db2de438afc6864261fdaa91081f83a29b68890ba8d9530b1f13447983a73e57bb773da3073122746ddefae937209df2eb216916c871c47e98b5469da3adf26b0f46cde41d0daad58254d43baba37713cf8f1fb2bbbe1a8e7faca38ccc73ecd3995fc72a598ecf918b16e36c0d576b997491da0778e6db4fdbe7fee8b007b0853c1a28478a80544c2de13c8e76d4b7c3c21a192ad5015d6e6e3511042188498ff0ae0f5a556afddd3858c7780f18afe2c14f104962d89744804f054cb01d7072cb31a1f40d4130d5b1eaea7abc3497e5716b9bf41d20c9aff13b0dced1f4bab2bd85bb0be472f873795115d1f97a7371852cadc86dca64003485febc0be9d50c01271c11e34f236d4e821f86c3627002009fd47b9f869ca7aa6b38d3a60ea9e4c068027b569f05cec9b8ef7e9753a58827b3ae17ef4248b8be85de5b5f122a1382d49ac9d524b55ae4ba73506e9f69b3df752a3cb550500e9b31bfbebbc53220af436a35d6c39f4af792de1516e41198d90c74246c9847d1b8c8c48431c7e8230e3ddfd58d4c56dafea56b1dcd4c63f7581a70e4f3cb7566ce49ed78accbc8728b55513a71011a7664a1a360ec4d1227765ef08fcd3d622d46859b35b1426021785ceae257f02094609285fe1577aa73413b6456376303e7796767b72a6841fcc998fb8c5c1e677a3ca640b9705e9680d0c11ac3d535616654b5cf1ca8ac60257891ed941acfa77079434cc2d27194c7ee52282c938e1b1de91c208508842352a625c985ffe103bf004a4367425fc25882685387fdee89a7885c3cae181b6cf4f74e1e4669ae0424fba2959c0b01d25486fdc4a7d9286fc29f95505443439244e0c4aed9033b93b10b46c2c7dd3e67cd89394e130e2acfbf5d3b0c62bc543ccd1017b07c568f0cb4b0b3b2fba5ceb9d4457854a84752caee9045430fcbbfb7733d25ff8ef19da0f8baa384981b24de9801aa080cf98c8f9923082d70d4d821ab873e89491d9dcfed442af1a88d1ddbd4b2536363c8333ffc7b5e7a3506c5fce68e6a83efd68bb030c9b5f5de8be22c0417e3c3d08eba8cd5b04eaa6141b9ed872edf1b702dd3139abe1b2ede34578f227489da4f6cb11427bf7e8ffde043e45ff98f47366ec364cc08d396dcbaa06994be4219e7a5c991f5fa0e18155cfd127fde3e7337f9f56103f99d2e35298c8cf221a5178b10cdaf39a9fa5ea185e10dd47ca20fa7f7fd96bd45bf1c14b6b34593e4b4404d5f9fe23d1c441969d6862328368cb5a5b214f998774dbaa4b562dd6380be2ea0be9f47ca398e0f110ecfe13ca9df412accfdadafa90396b1ae347397e96762b4df41ab3c297961405e4d458edc6cdfdfd098d6872c011d4454e671fab8fc63f6e1646e87b608ae226f7540ea129229f1b01f0d3ea2e77b47816abd5501fe4f76ba4cf17e79b62ea2aa5354b759681d35d2a931f17753ae96af54e164e51e6ee9ad8f01591f5950e0209579077e5f6b323f8c4574ba457da5748bb6269b5de67f9971abde34708ac145fb9d332db9cf76050c44cd9b3bc78973f37de240f802496c5b5cb6b8c8bad7e289b105830e39315bb83e287cf5bd31131aa8fc27a4cea236121a7fda65442498d905ecb8ae3a402f635ee3885fac5cc998dfa5918913b2933cbc82f5b4fbd3bf2256d4b29e05974fc2c4436dcf2a1a13e02367396d871b523cbf4c44f958d9f54078535c974065f072f3b783ec413e7ec61bcfc72a7fee099f5734c33964da9890b381116978b985ed191f3b680454f0294a8662673b70447b0e9e84e5f6460739ddfa7b008d40145b44ac22fe4f49c689ec5561617516c2624254f9a5c4836fd00068a36e678b877c7d45831102defdfc6a2c5be2c234657f89c1d3347b846a717145911f4cbd0a4aa17493294f15a371ffb416f18a5d3091e2f41b459c0942617aacc25c69301c7ff51bd1e7a7ef2f71ab268e5e5da5e36fdffea70cf29d74f77aa18c6fdb3d669bdf23537141fec4016ec42ed195df09c05859f1a1740859db17bde305c00c", 0x1000}, 0x1006) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, 0x0, &(0x7f00000000c0)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f00000000c0)={0x0, @aes128}) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'bcsh0\x00', {0x2, 0x4e23, @loopback}}) [ 454.189151][T14262] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80086601, 0x100000001) 07:19:12 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="3800000026d007cf15393b2865f3badb26fd594393f7730514e1ea4c61d1ee550b31d02ff86ecea6ef622aad3e71f7df8072b1ac88cb876c7fa6b4d4a6e5f6fa0658797df083647effa4723ee98850f5262e28f148759b4d179500311fb5fc0bce82a427821a13745a88453e3eda64a653fa68078e1bd62324d367b556ddfea7a1dbc6bb5c35cde85ea21027470073128013e645d1b3fc52a4b2a6ce27ddb1c7005f5fd1a8cc5498b8c4", @ANYRES16=r5, @ANYBLOB="000026bd7000fcdbdf2525000000080001007063690014000200303030303a30303a31302e300000000008008b0000000000"], 0x38}, 0x1, 0x0, 0x0, 0x5090}, 0x4808) [ 454.388391][T14277] Unknown ioctl 22026 07:19:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) [ 454.480682][ C1] net_ratelimit: 12 callbacks suppressed [ 454.480691][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 454.492600][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:19:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x80087601, 0x100000001) 07:19:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x6c]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:13 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) r4 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f0000000380), &(0x7f00000003c0)=0x4) r6 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r6, 0x1000000) sendfile(r4, r6, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000200), 0xc) setns(r4, 0xe000000) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="0e00005bb60f8694e80e11b9daa91e04ad9e000000000000000000"], 0xc) ioctl$TIOCLINUX5(r2, 0x541c, &(0x7f0000000240)={0x5, 0x81, 0x6, 0x1}) r7 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x3f3, 0x40000) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r8, 0x84, 0xb, 0x0, &(0x7f00000000c0)) fsetxattr$trusted_overlay_redirect(r8, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0xf, &(0x7f0000000280)={@loopback, 0x0}, &(0x7f00000002c0)=0x14) r10 = socket(0x2, 0x3, 0x67) ioctl(r10, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") bind$xdp(r7, &(0x7f0000000300)={0x2c, 0x4, r9, 0x15, r10}, 0x10) 07:19:13 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x10000, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r7, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r8 = getpid() sched_setscheduler(r8, 0x5, &(0x7f0000000380)) r9 = socket$inet(0x2, 0x1, 0xca) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r10, 0x0) r11 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r12 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r12, 0x0, 0x10, &(0x7f0000000140)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) r14 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r14, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r15) r16 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r16, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r16, 0x29, 0x23, &(0x7f0000002740)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8) r18 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r18, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r19) r20 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r21) r22 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x0, r23}, {0x8, 0x0, r23}], {0x10, 0x6}}, 0x34, 0x0) fsetxattr$system_posix_acl(r11, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000002840)=ANY=[@ANYBLOB="02000000010001000000000002009d5c", @ANYRES32=r13, @ANYBLOB="02000f00", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=r15, @ANYBLOB="000000f48b0d7c7e3d00000022010000001a00de3f668be8070e2de5cef441c1335ecba673c8647cde05bd3b380f711309e38205901bbf10c1e4e4dad109493a243662f7148414833f0000000000", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=r17, @ANYBLOB="02000500", @ANYRES32=r19, @ANYBLOB="02000400", @ANYRES32=r21, @ANYBLOB="040079c8eba3784ab0247dc5ce40020000000000080033e2", @ANYRES32=0x0, @ANYBLOB="08000600", @ANYRES32=r23, @ANYBLOB="10000000000000002000030000000000"], 0x6c, 0x2) r24 = socket$can_j1939(0x1d, 0x2, 0x7) sendmsg$unix(r4, &(0x7f0000002640)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000002540)=[{&(0x7f0000000180)="f2384353f9aec8583efe5dd8873894b57ce1d11135", 0x15}, {&(0x7f0000000380)="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", 0x1000}, {&(0x7f0000000240)="398c0f3be05fda36122904f6eead8f31ef7cbf0aa2998f30c10df67a3de67fdc913430e5e49853815dd6ead1e7f17b50f1933b42624c845c45cebf06e2b3990ab80e6082727d6c5f6fc155ab6be766ed7aea5aacde616e8f99852dc1d1970626df25c962ec58d5a36f0528de07600783eb1fdac423f7a91151cf61380068a48567fa22e3e03aff30bf5fac6f1487990fbb66d3618955144bfa5c89db226eed3df77ec574c7e5a70c3aa02cde461fa013365cd55bd0a13882c5f2ef08882866eee04270", 0xc3}, {&(0x7f0000001380)="4f867862ab44a1f8a2004c91f85828b5952b866adc52ac423ed19ddaea95a3bd67a65337e81ec521d9977d0bd14dd9d0e1527841ae6c82533a965d853de0756e6f2f27415fa3d2e30669b8fff3d81aab6f8a0c4d415a08ea9846fa42140d15fcd0eac1b5be10bcf7089d1832911e755de8d6ee4364cc88e0", 0x78}, {&(0x7f0000001400)="45dd332bed862f3289948724064d9022bb71c0cc16d1e3707e0d9b73e239aad897f912fc6798bf992c6588d0d12faa56672db3efa223035ad970a7efab0b5dcfea72b685eee9e849c1273e379575cf42fca612cb2b5de7982ff87b2033ecae406825af", 0x63}, {&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000002480)="ddcea221a79f7842b5da1e681adcb0d1f951f6ec54d754316213f2d942102901d8764cb16422f9cbafc6a1b62b5ee2bd21409b09bae3a3a42f73a226313b828e5b958af859a2690285fee5e0f632d84d9d8d27fc89c2b8f3cf21ddd2a0b9fe6fc054da622cabb41a3dea60e971497e377057978db250ed7de2f8634b1bac0de6278321c50b", 0x85}], 0x7, &(0x7f0000002680)=ANY=[@ANYBLOB="000000000000000000000000000000008de816fd6da5ac4224e14f780d3d2d66fa99c92db925ebf346fd1aefae79698c49511e698deb5ac34a2e40606a", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r0, @ANYRES32=r7, @ANYRES32=r1, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r10, @ANYRES32=r23, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r24], 0x68, 0x2004000}, 0x10) r25 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r26 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r25, r26, 0x0) [ 454.667454][T14291] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:13 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 07:19:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc0045878, 0x100000001) 07:19:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x74]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) [ 455.005246][T14316] XFS (loop3): Invalid superblock magic number 07:19:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) write$selinux_access(r1, &(0x7f00000000c0)={'system_u:object_r:traceroute_exec_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0x20}, 0x6a) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f0000000000)={0x3, 0xc72, [0x4, 0x8000, 0x8, 0x6, 0xfff0], 0x1}) 07:19:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc0045878, 0x100000001) 07:19:13 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = socket(0x2, 0x3, 0x67) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") getsockopt$bt_BT_FLUSHABLE(r4, 0x112, 0x8, &(0x7f0000000000)=0x7, &(0x7f0000000080)=0x4) r5 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r5, 0x0) 07:19:13 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x7a]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc0096616, 0x100000001) 07:19:14 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, 0x0, &(0x7f00000000c0)) syz_emit_ethernet(0xca, &(0x7f0000000200)={@random="56325981b76a", @random="ce7502b4fbd5", [{[], {0x8100, 0x0, 0x1, 0x2}}], {@x25={0x805, {0x1, 0x6, 0x46, "f50a37523b0b9d1f81ab829dd8d5b333ac705e26f1da8861cbeab3894957b77055820c15a13994820443173b0bcf2c98095b6d703cd6f062e503222f7c186399fea1b599a6de8ed6649a415fa20117c757fbcfa2e8bba5c7319204d2d6ec996d789948f1335b7808243ecc5f0b823111d7b9e43d792af4164d58c95c1128c6f0e4f32477434d9c757ba19d4b9ff11fa2b950859ab42047835aa418368a454f346226dc47bfe0624987ddb10f1376c0710ec5bd51fa"}}}}, &(0x7f0000000000)={0x1, 0x3, [0xec5, 0x1f, 0x5c7, 0x571]}) fcntl$setsig(r5, 0xa, 0x23) 07:19:14 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 455.430534][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 455.436719][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 455.442813][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 455.448688][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 455.590557][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 455.597171][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:19:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc0185500, 0x100000001) 07:19:14 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0xca) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) [ 455.771852][T14366] XFS (loop3): Invalid superblock magic number 07:19:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0xd, &(0x7f00000001c0)=0x0) connect$can_bcm(r2, &(0x7f0000000140), 0x10) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000200)="0500000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f000000000000ffffffff000000", 0x38}]) io_submit(r3, 0x2000019e, &(0x7f0000000080)) r4 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r5 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r6 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r6, 0x1000000) sendfile(r5, r6, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="0400000000"], 0xc) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x1) r9 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r10 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r10, 0x1000000) sendfile(r9, r10, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r9, &(0x7f0000001580)=ANY=[@ANYBLOB="0e00000000000000000200000c06678ebcf3832500dbdaaa84e5942eb2b766dda2837859bbf0"], 0xc) clock_gettime(0x0, &(0x7f0000001400)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000001440)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000001480)={0x0, 0x0}) write$evdev(r9, &(0x7f00000014c0)=[{{0x77359400}, 0x4, 0xd9b, 0x51aef4a1}, {{}, 0x3, 0x667e, 0x3ff}, {{r11, r12/1000+10000}, 0x1f, 0x9, 0x10001}, {{0x77359400}, 0x1f, 0x3, 0x80}, {{r13, r14/1000+10000}, 0xd17fc6dfa2d0fbed, 0x101}, {{r15, r16/1000+10000}, 0x12, 0xfc00, 0x4}], 0x90) ftruncate(r8, 0x1000000) sendfile(r7, r8, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r7, &(0x7f0000000200), 0xc) r17 = socket$inet6_sctp(0xa, 0x1, 0x84) prctl$PR_GET_CHILD_SUBREAPER(0x25) getsockopt$inet_sctp6_SCTP_EVENTS(r17, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r18 = eventfd2(0x0, 0x80000) io_submit(r3, 0x4, &(0x7f00000013c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0xfff7, 0xffffffffffffffff, &(0x7f0000000080)="7b218b57ce31c83e6f1ff1f2e0c369402f18ed1b5d5975d32001173ad8962775f3aa20a006912655f83dc69bad0d74068defff04f553c2bb737092f9a53c68493d75052b12e642e2d8a9a30078eabe86651ea66ab8e5d92a6167fd1369f37ef77f68dd565e88a0460dc29f09181e07a63ccd565d0d80024c89c520", 0x7b, 0x3, 0x0, 0x2, r4}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa40, 0xffffffffffffffff, &(0x7f0000000240)="c8d9b5bd0ecf0970af10cfafcd47f1c93a63a64e79b538156f5613c8cea8c340c8055aa3e3cbde616dd0", 0x2a, 0x3, 0x0, 0x2, r5}, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x2, 0x8, r1, &(0x7f00000002c0)="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", 0x1000, 0x59f56aa1, 0x0, 0x3, r7}, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x5, r17, &(0x7f0000001300)="d7b97583634968ef34c3104585ea9590786cec56ad1c21d9ce04beeb9733b5c6c6731544acdcf69d1a2cfb652132dc8c1badf47ad092953fb574a7ad66997f7be1bd6f43867fc5", 0x47, 0x39, 0x0, 0x2, r18}]) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:14 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x9, &(0x7f0000000040), 0x4) getsockopt$inet_tcp_buf(r3, 0x6, 0x3, &(0x7f0000000000)=""/36, &(0x7f0000000080)=0x24) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r4, r5, 0x0) 07:19:14 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, 0x0, 0xeefffdef) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x8000000000000000, 0x40bbfa35217d6f1f) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f00000000c0)=""/46) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000200), 0xc) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x3) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r3, 0x400455cb, 0x100000001) r4 = socket(0x2, 0x3, 0x67) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") ioctl$SIOCX25GSUBSCRIP(r4, 0x89e0, &(0x7f0000000240)={'veth0_to_team\x00', 0xffffffffffffffff, 0xfffff001}) 07:19:14 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x2]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc0189436, 0x100000001) 07:19:14 executing program 5: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_proto_private(r0, 0x89e9, &(0x7f0000000240)="e0722aa59573a000759c35eb6e76a24c25ee69bcb7fa6bcc3e2da892878d99893ad39e61d5a26c1710dc88c56a6b3117e9866bad817a07e4c0843210605d1ec9ecc65415beec8b163e1d25c3607c37577f6961648e351ee3ca222c19b7af16601dfaacbd04180ca753bd64a1647e0c4e6488f74273b41c4b8deef5d8ee5c93c8663a22a16087983a3ce9026f525ab262f6b26f2e5d8e5e1aa0130bb5c03e590749dd0c5ce97bfcf0d5a286bbeae3a08a2f9ebf322609ab87fdd86c9855ac08cbc71914b73b63867bb5a31f17c6dbdfa258552c284b9c549c0e9cf7f3ffa3185f96f511b659eb6dbd0e2d5a4ad1") mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x40000, 0x0) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000180)={0x1, 0x81, 0x100}) r5 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r6 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r7 = dup3(r5, r6, 0x0) fcntl$getflags(r7, 0x3) syz_mount_image$bfs(&(0x7f0000000380)='bfs\x00', &(0x7f00000003c0)='./file1\x00', 0x8406, 0x9, &(0x7f0000000940)=[{&(0x7f0000000400)="0b9b5f4cd3b9ad882bc9d5f8aec427e49517c7978fb64776210e335545ed0c697e080d08350e6cc85a0ee33a7d430961b6f04fe0c1a701630420e505edc626a89b75d84bcd2024560c083afbfbb1b75f83c885ab0c9072c1bb5fb3d452407f2af7542ef7aef8eb883e1e1c409c367f64b02a8ae68c262ca9a612b62acc34e63ba321f6ee55b419aeff20fc4cffdcf5297606824ea366dc5e67", 0x99, 0x918f}, {&(0x7f00000004c0)="06cda91837563a2f46870587b5f59edc3c65c3cfe463983df9134d66e317c865961f4fab61c2bcd08f3a88d6ebbc10b5027bb1ec7dcba9445efd8bfbe531ae50395490a5512115c4ec88453721e8f630f3bb4512e4283ff51a1e3d189a274ab4f86f62083a54f47a127f8910822fc96c1c16256c3f7ae9a41be4ff080605aad2695c5fde820c603b4dd521d4e874f5ee7a5fb3013bfb0e58d6b32e78d8583d75cf2b63b85e6fec24339659ae3535ff131e6c81f9f879204ad7837722cbb4e06f31783df33bc34473588451", 0xcb, 0x3500}, {&(0x7f00000005c0)="355b5dc2fadfe1e881094fee8abbdfc4f5814df84e9eebba8114e801711dc70bc74f09647e5aa88254e6d79ba94f1283824911ec3484f931ad6106296f099fcf91761948f757e26858958eac93215e437e385105c90ea43c1f1142a37b38275eb2927315f673ba8b463f54c1add8f62953a61cca96e0a7edfd756a4d0bcb09d89ccb680ba00c12018b4f861fe391ae39c54e9111113cbbb386e1aa0a25bcf3a81102a86cc95ae60dde61993b5a2b826dcf56117b4becdabb85583847bbfa318399060292199eb5bdc7", 0xc9, 0x2}, {&(0x7f00000006c0)="7276f1d32366bac84b8589e0c717b375f98f518b2f64499482d3cccbf4adc2ce72ce0efe680c39924c702678ee5e026f18896065eecfe7961d52282acb68b85804b29e6723b1d030c843b050528fdbc4c9e34773a0e914c3054f340c577d260106c300c1c30122", 0x67, 0x8}, {&(0x7f0000000740)="afc558d48a90172bd827295b5af1b1ad28bc102ead98aca7826c4ee4bbbb563a33146d4a6d38416d2f9b2b74c65c527a5823aab26e693e6c7a3cdae9a53120140fb24c4902b26734c5a2b80443136643224308e3536d935502b1ddc8b54aefc8f54676bf61", 0x65, 0x9}, {&(0x7f00000007c0)="00f9b6877eb079a03d3143b416f6c3e1dc4b27d8f72bb12e549c77311e", 0x1d, 0x2}, {&(0x7f0000000800)="1c4747868f48c93b86aceeba7c", 0xd, 0xfffffffffffffffd}, {&(0x7f0000000840)="2eecbe8e057c44f4ebe8026ba7ef0b0eda9cb29412019ee9f2383427ac728db30e076e11e465b6cc8556716a63aa665e8239d643dd8498b2db2b0664c7b1da65cddffc090da5976e1409b0ffc8e8fd79a121d61e13d724bbb50650f7464bde4777e38fb6029d5fdab43e9828f339b059dc6f9f41f541e75e689b27775d176df0a7778e8f04759dd3467635fe2996ba43bbd72c27", 0x94, 0x9}, {&(0x7f0000000900)="852073b316edc3e7efce22b2854f80329892fb5d3536366166", 0x19, 0x40}], 0x840, 0x0) r8 = syz_open_dev$vcsa(&(0x7f0000000a40)='/dev/vcsa#\x00', 0x9, 0x400) r9 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r10 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r10, 0x1000000) sendfile(r9, r10, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r9, &(0x7f0000000200), 0xc) setsockopt$TIPC_MCAST_BROADCAST(r6, 0x10f, 0x85) linkat(r8, &(0x7f0000000a80)='./file0\x00', r9, &(0x7f0000000ac0)='./file1\x00', 0x400) 07:19:14 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 456.150555][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 456.156544][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:19:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc020660b, 0x100000001) 07:19:15 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x40000, 0x0) dup3(r3, r4, 0x0) 07:19:15 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x3]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) [ 456.510717][T14419] XFS (loop3): Invalid superblock magic number 07:19:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc028660f, 0x100000001) 07:19:15 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:19:16 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x4]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:16 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f0000000000)={0x40000001, 0xc, 0xd}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket(0x2, 0x3, 0x67) ioctl(r5, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") setsockopt$bt_l2cap_L2CAP_OPTIONS(r5, 0x6, 0x1, &(0x7f0000000080)={0x400, 0x3, 0x101, 0x66, 0x50, 0x20, 0x1000}, 0xc) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, 0x0, &(0x7f00000000c0)) dup3(r3, r4, 0x0) 07:19:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc02c5625, 0x100000001) 07:19:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xeef, 0x100000) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000001c0)={0x8, [0x2, 0x2d9, 0x6, 0x6, 0xb2b, 0x6, 0x81, 0x81]}, &(0x7f0000000380)=0x14) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, 0x0, &(0x7f00000000c0)) pipe2(&(0x7f00000003c0), 0x2000) r4 = socket(0x2, 0x3, 0x67) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000000)=[@timestamp, @sack_perm, @sack_perm, @sack_perm, @window={0x3, 0x5, 0x8}, @mss={0x2, 0x6}, @timestamp], 0x7) r5 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r6 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r6, 0x1000000) sendfile(r5, r6, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r5, &(0x7f0000000200), 0xc) ioctl$KVM_GET_MP_STATE(r5, 0x8004ae98, &(0x7f0000000400)) write$binfmt_aout(r3, &(0x7f0000000240)={{0x3, 0xc4, 0x1f, 0x7d, 0x10c, 0x0, 0x6, 0x6}, "72f276d6b00110cc17741323ec6da5be01e05c5e205345f4660bad022ed2736d964a24631ef71f123e2336bae56edeeef3fb99175d76d42c4524e26156b514a22f7f7747b21efc54e0f173d8f50271d27f6284bf4c9ed69efa426616e7816d6ef3e1e073f6ea4f905be3f997987f1bcc69ce9a2db13bb51677944c1326cbee0fdfef5c7a5fec8122b7b693b5515b1d4a77cc9af0fe922c35e5b3139f51b5123b7d7b293962aa3fe5aaabcba9b8606779c9e92f4ae4712e0a4cfbc9b7cdeae3730f32461e56db7192b1556e2c27639760a0f82750f6d9bb16014069c5f2869164b73ea5d45358ed96be4d9a0e"}, 0x10c) [ 458.136093][T14465] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc0481273, 0x100000001) 07:19:16 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) io_setup(0x3d, &(0x7f0000000000)=0x0) io_destroy(r0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) clock_settime(0x2b38e136aa671c34, &(0x7f0000000080)={0x77359400}) r5 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r4, r5, 0x0) 07:19:16 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:16 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x5]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) mknod(&(0x7f0000000000)='./file0\x00', 0x5651e9e0325f5b27, 0x7ff) 07:19:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc0585609, 0x100000001) 07:19:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) r2 = socket(0x2, 0x3, 0x67) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") ioctl$VIDIOC_TRY_ENCODER_CMD(0xffffffffffffffff, 0xc028564e, &(0x7f0000000080)={0x4, 0x0, [0x80000001, 0x5, 0x2, 0x1, 0x6, 0x9, 0x3, 0x1]}) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x8000, 0x6, 0x1000}, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 458.497723][T14493] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:17 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="1e", 0x1, 0xfffffffffffffffe) keyctl$revoke(0x3, r1) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={r1, 0x99, 0x58}, &(0x7f00000000c0)={'enc=', 'raw', ' hash=', {'poly1305\x00'}}, &(0x7f0000000140)="ee5e98ca8bbb7bbb4e8c5fd353a8a563529fa09dd588e1e8c5812190bed3f350693c882ba22b22d78be9bd92a89f7be95b28070c574514e4496b5883c9bb0033833835f848196a244770af96b765b911c30291bd3e808625f51f38e715b35780c19642b3078367be50fcdf2440824a952142ec2682d8ecc60af04c29aaa10eb0d39800f6ce335d82f2df71078e3f3a919d50835f48dc9bb97b", &(0x7f0000000200)=""/88) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCSIG(r2, 0x40045436, 0x2) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) r3 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r4, 0x1000000) sendfile(r3, r4, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000200), 0xc) r5 = syz_open_dev$admmidi(&(0x7f00000002c0)='/dev/admmidi#\x00', 0x85b8, 0x200) ioctl$VHOST_SET_VRING_CALL(r3, 0x4008af21, &(0x7f0000000300)={0x3, r5}) r6 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="1e", 0x1, 0xfffffffffffffffe) keyctl$revoke(0x3, r6) keyctl$invalidate(0x15, r6) syz_extract_tcp_res(&(0x7f0000000340), 0x6, 0x3) 07:19:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0xc0d05604, 0x100000001) 07:19:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x6]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@prjquota='prjquota'}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:17 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000240)=""/216, 0xd8) r4 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r4, r5, 0x0) 07:19:17 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) ioctl$CAPI_NCCI_GETUNIT(r1, 0x80044327, &(0x7f0000000080)=0x6) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket(0x2, 0x3, 0x67) ioctl(r4, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") ioctl$SIOCRSGCAUSE(r4, 0x89e0, &(0x7f00000000c0)) r5 = fcntl$dupfd(r3, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r7 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r6, r7, 0x0) r8 = socket(0x2, 0x3, 0x67) ioctl(r8, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") setsockopt$bt_hci_HCI_FILTER(r8, 0x0, 0x2, &(0x7f0000000000)={0x8000, 0x4, 0x7, 0x2}, 0x10) [ 458.904414][T14527] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000002) 07:19:17 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}], 0x1, 0x0, 0x0) r1 = socket(0x10, 0x3, 0xac) sendto$inet6(r1, 0x0, 0x0, 0xbfab6b6adc776ef6, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x2d9) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0xd9, 0x6, 0x1f, 0x7f, 0xff, 0x3, 0x5c, 0x8, 0x1, 0x1, 0x9}, 0xb) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) setxattr$security_selinux(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)='security.selinux\x00', &(0x7f0000000480)='system_u:object_r:var_t:s0\x00', 0x1b, 0x1) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000200), 0xc) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000380), &(0x7f0000000300)=0xb6) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000080)=""/112) r4 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r5 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r5, 0x1000000) sendfile(r4, r5, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r4, &(0x7f0000000200), 0xc) write$vhci(r4, &(0x7f0000000240)=@HCI_ACLDATA_PKT={0x2, "21a7bdc556f20e726da52a6084b10d411af873969dc0bee0fb90cd40a219bbadccab52d9e8582d1f080460db0f84f80268d1e0bc9195a58fecb33a4b62303190daffa77f8dde1b761134b1bc1e7f4a01034f98dc1e760ffbf9467470f4d3ef1310cababbcdecc0dea7ebcdf3fcf8b63e054ec00fd1867a5ec31b4e6bd9102e8555788dc403ac4f5375406629b8c8c7f7f8"}, 0x92) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f00000003c0)=""/78) 07:19:17 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:17 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x7]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:17 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000003) [ 459.231135][T14548] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:18 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) [ 459.455845][T14562] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:18 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000000)=0x100) 07:19:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000004) 07:19:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0xa]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:18 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) [ 459.590550][ C0] net_ratelimit: 6 callbacks suppressed [ 459.590558][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 459.603039][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 459.609021][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 459.615227][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 459.709808][ T9573] Bluetooth: hci0: Frame reassembly failed (-84) [ 459.743760][T14575] XFS (loop3): unknown mount option [euid<00000000000000000000]. [ 459.750575][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 459.757546][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:19:18 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@prjquota='prjquota'}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}]}) 07:19:18 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) r5 = socket(0x2, 0x3, 0x67) ioctl(r5, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") setsockopt$inet_sctp_SCTP_RECVRCVINFO(r5, 0x84, 0x20, &(0x7f0000000000)=0x6, 0x4) 07:19:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x48]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) [ 459.966237][T14585] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:18 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@prjquota='prjquota'}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}]}) 07:19:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, 0x0, &(0x7f00000000c0)) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000240)={0x0, 0x0, 0x1, 0x0, [], [{0x7fffffff, 0xff, 0x8, 0x4, 0xd782, 0x3f}, {0x9, 0x80000001, 0x6, 0x8000, 0x3ff, 0x4}], [[]]}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x3a6, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x4c]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:18 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x224000, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='(\x13uB', 0x4, 0x1) r5 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r6 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r6, 0x1000000) sendfile(r5, r6, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r5, &(0x7f0000000200), 0xc) r7 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x200000, 0x0) ioctl$KVM_CREATE_DEVICE(r5, 0xc00caee0, &(0x7f0000000240)={0x2, r7, 0x2}) dup3(r3, r4, 0x0) [ 460.242888][T14604] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:19 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@prjquota='prjquota'}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}]}) [ 460.390553][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 460.526551][T14618] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:19 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x68]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) [ 461.750914][T11387] Bluetooth: hci0: command 0x1003 tx timeout [ 461.757381][T11049] Bluetooth: hci0: sending frame failed (-49) [ 463.830625][ T9424] Bluetooth: hci0: command 0x1001 tx timeout [ 463.836983][T11049] Bluetooth: hci0: sending frame failed (-49) [ 465.910760][T11387] Bluetooth: hci0: command 0x1009 tx timeout 07:19:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000005) 07:19:28 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x700, 0x81) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:19:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:28 executing program 1: r0 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r1, 0x1000000) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000180), &(0x7f0000000240)=0xc) sendfile(r0, r1, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000200), 0xc) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000200), 0xc) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e21, @local}, {0x0, @remote}, 0x10, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1c}}, 'hsr0\x00'}) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000000)=r2) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r4, 0x400455cb, 0x100000001) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000140), 0x4) 07:19:28 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@prjquota='prjquota'}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}]}) 07:19:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x6c]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) [ 470.213436][T14644] XFS (loop3): unknown mount option [euid<00000000000000000000]. 07:19:28 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x2000000, &(0x7f0000000240)={[{@mode={'mode'}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x200}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode', 0x3d, 0x8}}], [{@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r3 = open(&(0x7f0000000040)='./file0\x00', 0xa000, 0xb) r4 = dup(r3) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) r5 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r5, 0x0) 07:19:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_S_PARM(0xffffffffffffffff, 0xc0cc5616, &(0x7f0000000240)={0x9, @raw_data="6248a449745f5cc80d655cbb52b7f2b9751074f912f7d86622c863e0bff5314a78d7a94576b07aa0d03d841e9913ffebd78e8a696f3da7628e9e3922cac1315a1460af51879ef53e067f8fc76deecfc68db1a3898fcc604a5554e303fe59855d76ceebdfc5f1f8990402ff3a539ccc5374f44790b733185c0b7ed1e60cff9e83aa7f3046d52c01e659800962dbfc04e3e830ce1db04864bf6a6a05429ea02806c2c44d936703fb51f1ffb87b67721d54706c9acbfa8ccf28e20d4387d14024d40d5f0511ff7708f3"}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000001d40), 0x4000000000002d1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback, 0x3}, 0x1c) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, 0x0, &(0x7f00000000c0)) accept4$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, &(0x7f0000000140)=0x1c, 0x80000) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, &(0x7f00000000c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r2, 0x29, 0x44, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000080)=0x1e) 07:19:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x74]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:29 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@prjquota='prjquota'}], [{@euid_lt={'euid<'}}]}) 07:19:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000006) 07:19:29 executing program 5: r0 = socket(0x2, 0x3, 0x67) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r4, r5, 0x0) 07:19:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000200)=ANY=[@ANYBLOB='\x00'/12], 0xc) r4 = openat(r2, &(0x7f0000000000)='./file0\x00', 0x80000, 0x0) bind$llc(r4, &(0x7f0000000080)={0x1a, 0x200, 0xe8, 0x9, 0x5, 0xff, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000007) [ 470.608421][T14674] XFS (loop3): unknown mount option [euid<00000000000000000000]. [ 470.711096][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 470.716960][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:19:29 executing program 3: syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)={[{@prjquota='prjquota'}]}) [ 470.800575][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 470.806516][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 470.973787][T14696] XFS (loop3): Invalid superblock magic number 07:19:29 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x7a]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000004c0)='scalable\x00', 0xfffffffffffffeca) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000008) 07:19:29 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400000, 0x0) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, &(0x7f00000000c0)=0xfffffffffffffcf8) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, 0x0, &(0x7f00000000c0)) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000240)={0x7, &(0x7f0000000180)=[r2, r3, r4]}, 0x3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r5, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r8 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r7, r8, 0x0) r9 = open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) r10 = gettid() fcntl$setownex(r9, 0xf, &(0x7f0000000280)={0x2, r10}) fcntl$setlease(r9, 0x400, 0x1) r11 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r11, 0x84, 0x14, &(0x7f00000000c0)=ANY=[@ANYRES32=r12, @ANYBLOB="0000d604"], 0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000000c0)={r12, 0x8}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r9, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32=r12, @ANYBLOB="0100b5050900e94100000000d900d00c73bec50c9e55b55278359a3d9e979e63c7bd1c74cf0781cd474d6dc2bd99bd7d0b751a88db08bd73895d5ca5f8303f1abd6682a75d65fd0f3bc79a59555d51f05b65df2d33274b2588aeaf8609dbfe0c1b5a295b9a98d3038833c71d9a5f00fb316482435e0b5974"], 0x2) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={r12, @in6={{0xa, 0x4e23, 0x7, @mcast2, 0xd5}}, 0x5, 0x7f, 0xa3e, 0xff, 0x2}, 0x98) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f0000000380)={'IDLETIMER\x00'}, &(0x7f00000003c0)=0x1e) [ 471.110543][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 471.116439][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:19:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000009) 07:19:29 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x2100, 0x0) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000240)) ioctl$TCGETX(r1, 0x5432, &(0x7f0000000140)) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) r3 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r4, 0x1000000) sendfile(r3, r4, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="0e00000000000000000000001e7e5f6c0ee3bfcee1c267b39d1f32a56f96a593a5e909b82f05e3877328e47955"], 0xc) ioctl$VIDIOC_G_DV_TIMINGS(r3, 0xc0845658, &(0x7f0000000180)={0x0, @bt={0xe7e2, 0x4, 0x0, 0x2, 0x20, 0x70eed794, 0x3, 0x475d298d, 0x6, 0x3, 0xfffffc01, 0x4, 0x4b, 0x10000000, 0x3, 0x8}}) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, 0x0, &(0x7f00000000c0)) dup2(r1, r2) 07:19:29 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x400000, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, 0x0, &(0x7f00000000c0)) dup3(r2, r3, 0x100000) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r6 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r5, r6, 0x0) 07:19:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:30 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x2000000, &(0x7f0000000240)={[{@mode={'mode'}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x200}}, {@mode={'mode', 0x3d, 0x7fffffff}}, {@mode={'mode', 0x3d, 0x8}}], [{@fowner_gt={'fowner>', 0xffffffffffffffff}}]}) r3 = open(&(0x7f0000000040)='./file0\x00', 0xa000, 0xb) r4 = dup(r3) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f00000000c0)=0xe8) r5 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r5, 0x0) 07:19:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x10000000a) 07:19:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000080)=0x2000, 0x4) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) r3 = socket(0x2, 0x3, 0x67) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r4 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x8000, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r4, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x1c, r5, 0x100, 0x0, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffff}]}, 0x1c}}, 0x0) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x585ac2, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000340)) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000040}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x4, r5, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400400c4}, 0x8000) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x1a00) 07:19:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:30 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r5 = socket(0x2, 0x3, 0x67) ioctl(r5, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") ioctl$SIOCSIFMTU(r5, 0x8922, &(0x7f0000000000)={'\x00', 0xffff}) dup3(r3, r4, 0x0) 07:19:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x2]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x10000000b) 07:19:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x5, &(0x7f0000000000)=[{0x6, 0x84, 0x92, 0x5}, {0x7ff, 0x1f, 0x3f, 0x2}, {0x3, 0xff, 0x3, 0x7}, {0x101, 0x6, 0x5, 0x1}, {0x2, 0x1, 0x1f, 0x8}]}, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0xfffffffffffffcd8) 07:19:30 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) ioctl$KDADDIO(r1, 0x4b34, 0x6) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:30 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x3]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x10000000f) 07:19:30 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)='cgroup2\x00\xd6z#.JoS\x90p\x80,:\x06\xea1\x83\'\xf7\xb7\xebR\x9f\x8d\x14\xfd_\xeeY1\xa9\xe0k\xbf\x14\x81\x98\xaa\x02\xd9\xc2Oe\xf4Z(\x10X\x8c\x84q\xf4\xe5\xd1\x9eH\x8dD\x18\"\x05\xbfw\xdbN&\x8d', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x500200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x31443, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:19:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) [ 472.230584][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 472.236468][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:19:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000010) 07:19:31 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:19:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x4]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000025) 07:19:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) [ 472.790547][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 472.796471][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:19:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}, 0x400000}], 0x1, 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000200), 0xc) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:31 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f00000000c0)={0x2, 'rose0\x00', 0x3}, 0x18) 07:19:31 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000300) 07:19:31 executing program 5: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000080), 0x4) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r4, r5, 0x0) 07:19:31 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x5]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:31 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:31 executing program 3: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(0xffffffffffffffff, 0x400455cb, 0x100000001) 07:19:31 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r2 = fcntl$dupfd(r1, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:19:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000394) 07:19:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x6]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:32 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) ioctl$VFIO_CHECK_EXTENSION(r1, 0x3b65, 0x5) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:32 executing program 3: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(0xffffffffffffffff, 0x400455cb, 0x100000001) 07:19:32 executing program 3: ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(0xffffffffffffffff, 0x400455cb, 0x100000001) 07:19:32 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x9, &(0x7f0000000040), 0x4) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, 0x0, &(0x7f00000000c0)) accept4(r4, 0x0, &(0x7f0000000000), 0x80000) r5 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r6 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x6, 0x20, 0x7}) dup3(r5, r6, 0x0) 07:19:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x7]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000398) 07:19:32 executing program 0: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x1, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x8, 0x0, &(0x7f0000000000)=0x6279c9956e7b21bd) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) r3 = semget$private(0x0, 0x20000000107, 0x0) semtimedop(r3, &(0x7f0000000080)=[{}, {0x7, 0xffffffffffffffff}], 0x2, 0x0) semtimedop(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x3f00}], 0x1, 0x0) semctl$SEM_INFO(r3, 0x3, 0x13, &(0x7f0000000080)=""/97) recvmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x10000ff00) 07:19:32 executing program 5: ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_disconnect={0x345}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = getpid() rt_sigqueueinfo(r4, 0x37, &(0x7f0000000080)={0x6, 0xdd, 0x7}) r5 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r5, 0x0) 07:19:32 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xa]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:32 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x17) ioctl$KDADDIO(r0, 0x400455cb, 0x4) 07:19:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146ea) 07:19:33 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000180)) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:19:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x48]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000200)=0x40, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:33 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, 0x0, &(0x7f00000000c0)) fcntl$dupfd(r5, 0x0, r2) dup3(r3, r4, 0x0) 07:19:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146eb) 07:19:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x4c]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000000c0)=""/65) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:33 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x1b) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:33 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x2, 0x3, 0x67) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFBRDADDR(r4, 0x8919, &(0x7f00000002c0)={'bcsf0\x00', {0x2, 0x4e20, @rand_addr=0x1}}) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000000)={0x0, 0x100, 0x8000, 0x7f, 0x2, 0x6}, &(0x7f0000000080)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f00000000c0)={r5, 0x78, &(0x7f0000000240)=[@in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x3, @multicast1}, @in6={0xa, 0x4e22, 0x5ab, @empty, 0x9}, @in6={0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x400}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e20, @empty}]}, &(0x7f0000000180)=0x10) r6 = open(&(0x7f0000000040)='./file0\x00', 0x8200, 0x100) r7 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r6, r7, 0x0) 07:19:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x8, 0x3f, 0x7, 0x0, 0x3f, 0x2000, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x5, 0x5, @perf_bp={&(0x7f0000000000), 0x4}, 0x20, 0xd05, 0x10000, 0x2, 0x5, 0x6}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:33 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x68]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146ec) 07:19:33 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:34 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x41, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x808000, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r5 = semget(0x0, 0x0, 0x0) semctl$GETPID(r5, 0x3, 0xb, &(0x7f0000000240)=""/184) dup3(r3, r4, 0x0) 07:19:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146ed) 07:19:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x6, 0x80000) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000240)={0xffffffff, 0x7, 0x7f, 0x9, 0x8003d, 0x9, 0x81ee, 0x1, 0x7, 0x0, 0xfe, 0x4, 0x7d, 0x0, &(0x7f0000000080)=""/85, 0x2, 0x8, 0x3}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8, 0x80880) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f00000002c0)={@null=' \x00', 0x3, 'ip6_vti0\x00'}) 07:19:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x6c]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146ee) 07:19:34 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='nilfs2\x00', 0x2f050, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000240)=0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, 0x0, &(0x7f00000000c0)) kcmp(0x0, r2, 0x0, 0xffffffffffffffff, r3) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x121) ioctl$VIDIOC_G_SELECTION(r4, 0xc040565e, &(0x7f0000000000)={0x2, 0x2, 0x4, {0x8, 0x0, 0x4, 0x7fff}}) r6 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r7 = socket(0x2, 0x3, 0x67) ioctl(r7, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") setsockopt$RXRPC_SECURITY_KEYRING(r7, 0x110, 0x2, &(0x7f0000000200)='#-\x00', 0x3) r8 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x1000, 0x200040) ioctl$USBDEVFS_RELEASEINTERFACE(r8, 0x80045510, &(0x7f0000000180)=0x3) dup3(r5, r6, 0x0) 07:19:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200), 0x4) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7, 0x20000) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000240)={0x0, @reserved}) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146ef) 07:19:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x74]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:34 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) pipe(&(0x7f0000000580)) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r3, &(0x7f0000000440)=""/46, 0x2e) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000017c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', r4}) sendmsg$inet(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="90947c98527fd5927ff0aef87c6998db6901789eef13bcefae30173c7526222af563d55a094457caab543f7577257d80db04be631f1ad07f9bc15d61", 0x1b}, {&(0x7f00000005c0)="25473cc2e26877b8d8e6e11e07263dac0355f837ce4c358c74c06f30901907cd41c11c7d40edec5bf4f9e8552bd9bd6d37d72a1270e037b78accc8dbc3011891b48d49a1d756f2897b529ab940df0bc2ac679fc84b4c6b575c9298ca3e527652f55aff31b9328f69ad4bd0ab1d3c2d55766a7cdd30a4fa65056803727cdcf8100bdbb8c861f0067f5ec58618184575ae60b48c2497119cdfb44497cf417b0a2e6bde2cd654", 0xa5}, {&(0x7f0000000140)="46be187753b3caf747a59072c92f8476c95ef686b1e7244b229908a7042a8c7858da70ee4988830a45f1dba00938c0e9b7c8201bbfd260550f0756323d415a2125f9b8", 0x43}, {&(0x7f0000000300)="7f3fe4821c03398bc27137f31b1539353e7d5616309eda1cf8a5bf2b556c8c38deec957f57a3a8a9fa86cff705b4a5a69b38e2a53bb69fc817329f58da", 0x3d}, {&(0x7f0000000340)="af9f3ef628afc403ddea7cdcc0bbe166066b457abbc056699bf39880cd0fa12931dfd62064974a20689ce029579b411fa723ca529515d74f96c735490b5d2437e3b1db88202b91087cd01feeea76c3a5e427e50f895bd30ef40b455ab8d791527616b8b9c2bb752fe464d9fc2c4b31000940c42d3eba7e071ae8558f64bfc8f844ee44dde44137581865f05e0dc4252370bde1e8b24adb2919847cb4debf16525da9e6", 0xa3}], 0x6, &(0x7f0000000480)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x40}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0xef3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @remote}}}], 0x98}, 0x60048010) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000080)='./bus/file0\x00', &(0x7f0000000140)='./bus/file1\x00') ioctl$TIOCSETD(r1, 0x5423, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:34 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='security.SMACK64IPOUT\x00', &(0x7f00000000c0)='cgroup2\x00', 0x8, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r4, 0x0) 07:19:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146f0) 07:19:34 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, &(0x7f00000000c0)) fcntl$dupfd(r1, 0x0, r0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:34 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x7a]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:35 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(r2, 0x4008af10, &(0x7f0000000000)={0x2, 0x1}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r4, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, 0x0, &(0x7f00000000c0)) dup3(r3, r5, 0x0) 07:19:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146f1) 07:19:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:35 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) r5 = syz_open_procfs(r4, &(0x7f0000000000)='stack\x00') openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x800, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000000240)={{0x8f, 0x1b}, 'port1\x00', 0x91, 0x50000, 0x6977, 0x8000, 0x5, 0x8, 0x4, 0x0, 0x0, 0x9}) r6 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r3, r6, 0x0) [ 476.939047][T15057] overlayfs: missing 'lowerdir' 07:19:35 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000002400)={'nr0\x00', 0xffff}) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:35 executing program 0: prctl$PR_CAP_AMBIENT(0x2f, 0x2, 0x13) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket(0x2, 0x3, 0x67) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") socket$bt_cmtp(0x1f, 0x3, 0x5) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, 0x0, &(0x7f00000000c0)) ioctl$int_out(r3, 0x5465, &(0x7f0000000240)) r4 = semget$private(0x0, 0x20000000107, 0x0) semtimedop(r4, &(0x7f0000000080)=[{}, {0x7, 0xffffffffffffffff}], 0x2, 0x0) semtimedop(r4, &(0x7f0000000000)=[{0x0, 0x0, 0x3f00}], 0x1, 0x0) semctl$IPC_RMID(r4, 0x0, 0x0) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4f) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0xfffffe52, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x4, 0x8, 0x8, {0x77359400}, {}, {0x0, 0x0, 0x1, 0x1}, 0x1, @canfd={{0x3, 0x0, 0x1}, 0x39, 0x237a2ddd1d80daca, 0x0, 0x0, "bdc7e9e53fdd65080adaf514de426825ca62964a66a7acf8963da4641bd747986c8ca9ff885912cac9464c9cbdd85b49bf2056ee06733376cefd1d6e12f571ba"}}, 0x80}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) 07:19:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146f2) 07:19:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(0xffffffffffffffff, 0x400455cb, 0x100000001) 07:19:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x2]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, 0x0, &(0x7f00000000c0)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) sched_getattr(r1, &(0x7f0000000180)={0x30}, 0x30, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = fcntl$dupfd(r3, 0x0, r2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x30000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r6 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r7 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r7, 0x1000000) sendfile(r6, r7, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r6, &(0x7f0000000200), 0xc) modify_ldt$write2(0x11, &(0x7f0000000240)={0xffffffdd, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x1}, 0x10) mkdirat(r6, &(0x7f0000000080)='./file0\x00', 0x20) r8 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r5, r8, 0x0) 07:19:35 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(0xffffffffffffffff, 0x400455cb, 0x100000001) 07:19:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146f3) 07:19:35 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x3]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x18) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="ffadabfa5074f892b3e3", 0xa, 0xfffffffffffffffb) r2 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="1e", 0x1, 0xfffffffffffffffe) keyctl$revoke(0x3, r2) keyctl$unlink(0x9, r1, r2) r3 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r4 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r4, 0x1000000) sendfile(r3, r4, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000200), 0xc) ioctl$TIOCSISO7816(r3, 0xc0285443, &(0x7f0000000140)={0x0, 0x2, 0x7, 0xffff, 0x1}) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0xc) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r5 = dup3(r3, r4, 0x0) write$P9_RUNLINKAT(r5, &(0x7f0000000080)={0x7, 0x4d, 0x2}, 0x7) 07:19:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x41c92f41ae84c227, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f0000000080)={{0x3a, @multicast2, 0x4e20, 0x3, 'dh\x00', 0x10, 0x3, 0x16}, {@multicast1, 0x4e21, 0x10000, 0xff50, 0x7, 0x7}}, 0x44) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(0xffffffffffffffff, 0x400455cb, 0x100000001) 07:19:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146f4) 07:19:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x400455cb, 0x0) 07:19:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x4]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146f5) 07:19:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) timer_create(0x6, &(0x7f0000000000)={0x0, 0x6, 0x4, @thr={&(0x7f0000000240)="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", &(0x7f0000001240)="1ef6f064361dd810516eaae2a6ee935c5d4bdfcf7556bee8112004a8dbab24338d1faa96efc60f8b586a7dd43293c8c5f0aba86d0b4975767663dd19c3af01f98d4767f80a74eb28ab2d27604abf81ce52b7bbe024ad6b80e002ae76737c0f06e781c06430352b150da21d72033b98f74b97cc1d5ed588d42d99569b1adce6ac9cc61545b3143b87245a23882315d3b77bcb484f530ef7fe068adf021554525cb2ca7c4a2cac351aba701099a8074bee5691f6f0433e5e2af83e4533d676aaa55c4370b59e361ae0d15ce73f9c090ecafe99d2aa640735ce30205f06a67845340a563d58ad01451c416b45d0c7ed"}}, &(0x7f0000000080)) 07:19:36 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) pipe(&(0x7f0000000580)) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r3, &(0x7f0000000440)=""/46, 0x2e) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000017c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f00000003c0)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'lo\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xed\x1f', r4}) sendmsg$inet(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="90947c98527fd5927ff0aef87c6998db6901789eef13bcefae30173c7526222af563d55a094457caab543f7577257d80db04be631f1ad07f9bc15d61", 0x1b}, {&(0x7f00000005c0)="25473cc2e26877b8d8e6e11e07263dac0355f837ce4c358c74c06f30901907cd41c11c7d40edec5bf4f9e8552bd9bd6d37d72a1270e037b78accc8dbc3011891b48d49a1d756f2897b529ab940df0bc2ac679fc84b4c6b575c9298ca3e527652f55aff31b9328f69ad4bd0ab1d3c2d55766a7cdd30a4fa65056803727cdcf8100bdbb8c861f0067f5ec58618184575ae60b48c2497119cdfb44497cf417b0a2e6bde2cd654", 0xa5}, {&(0x7f0000000140)="46be187753b3caf747a59072c92f8476c95ef686b1e7244b229908a7042a8c7858da70ee4988830a45f1dba00938c0e9b7c8201bbfd260550f0756323d415a2125f9b8", 0x43}, {&(0x7f0000000300)="7f3fe4821c03398bc27137f31b1539353e7d5616309eda1cf8a5bf2b556c8c38deec957f57a3a8a9fa86cff705b4a5a69b38e2a53bb69fc817329f58da", 0x3d}, {&(0x7f0000000340)="af9f3ef628afc403ddea7cdcc0bbe166066b457abbc056699bf39880cd0fa12931dfd62064974a20689ce029579b411fa723ca529515d74f96c735490b5d2437e3b1db88202b91087cd01feeea76c3a5e427e50f895bd30ef40b455ab8d791527616b8b9c2bb752fe464d9fc2c4b31000940c42d3eba7e071ae8558f64bfc8f844ee44dde44137581865f05e0dc4252370bde1e8b24adb2919847cb4debf16525da9e6", 0xa3}], 0x6, &(0x7f0000000480)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x40}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}, @ip_ttl={{0x14, 0x0, 0x2, 0xef3}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @remote}}}], 0x98}, 0x60048010) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./bus\x00', 0x0) creat(&(0x7f0000000040)='./bus/file0\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000001c0)={[{@lowerdir={'lowerdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000080)='./bus/file0\x00', &(0x7f0000000140)='./bus/file1\x00') ioctl$TIOCSETD(r1, 0x5423, 0xfffffffffffffffe) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146f6) 07:19:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x5]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:36 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x15) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) r2 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r3 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r3, 0x1000000) sendfile(r2, r3, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r2, &(0x7f0000000200), 0xc) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000240)=""/134) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146f7) 07:19:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x6]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146f8) [ 478.480534][ C0] net_ratelimit: 8 callbacks suppressed [ 478.480542][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 478.491958][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:19:37 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000000)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x7]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146f9) 07:19:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$can_bcm(0x1d, 0x2, 0x2) io_setup(0xd, &(0x7f00000001c0)=0x0) connect$can_bcm(r2, &(0x7f0000000140), 0x10) io_submit(r3, 0x1, &(0x7f0000000080)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000200)="0500000093c21faf16da39de706f646800580f02000000003f420f000000000000580f02000000003f420f000000000000ffffffff000000", 0x38}]) io_submit(r3, 0x2000019e, &(0x7f0000000080)) r4 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) r5 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r6 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r6, 0x1000000) sendfile(r5, r6, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="0400000000"], 0xc) r7 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r8 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x1) r9 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r10 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r10, 0x1000000) sendfile(r9, r10, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r9, &(0x7f0000001580)=ANY=[@ANYBLOB="0e00000000000000000200000c06678ebcf3832500dbdaaa84e5942eb2b766dda2837859bbf0"], 0xc) clock_gettime(0x0, &(0x7f0000001400)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000001440)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000001480)={0x0, 0x0}) write$evdev(r9, &(0x7f00000014c0)=[{{0x77359400}, 0x4, 0xd9b, 0x51aef4a1}, {{}, 0x3, 0x667e, 0x3ff}, {{r11, r12/1000+10000}, 0x1f, 0x9, 0x10001}, {{0x77359400}, 0x1f, 0x3, 0x80}, {{r13, r14/1000+10000}, 0xd17fc6dfa2d0fbed, 0x101}, {{r15, r16/1000+10000}, 0x12, 0xfc00, 0x4}], 0x90) ftruncate(r8, 0x1000000) sendfile(r7, r8, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r7, &(0x7f0000000200), 0xc) r17 = socket$inet6_sctp(0xa, 0x1, 0x84) prctl$PR_GET_CHILD_SUBREAPER(0x25) getsockopt$inet_sctp6_SCTP_EVENTS(r17, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r18 = eventfd2(0x0, 0x80000) io_submit(r3, 0x4, &(0x7f00000013c0)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x7, 0xfff7, 0xffffffffffffffff, &(0x7f0000000080)="7b218b57ce31c83e6f1ff1f2e0c369402f18ed1b5d5975d32001173ad8962775f3aa20a006912655f83dc69bad0d74068defff04f553c2bb737092f9a53c68493d75052b12e642e2d8a9a30078eabe86651ea66ab8e5d92a6167fd1369f37ef77f68dd565e88a0460dc29f09181e07a63ccd565d0d80024c89c520", 0x7b, 0x3, 0x0, 0x2, r4}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa40, 0xffffffffffffffff, &(0x7f0000000240)="c8d9b5bd0ecf0970af10cfafcd47f1c93a63a64e79b538156f5613c8cea8c340c8055aa3e3cbde616dd0", 0x2a, 0x3, 0x0, 0x2, r5}, &(0x7f00000012c0)={0x0, 0x0, 0x0, 0x2, 0x8, r1, &(0x7f00000002c0)="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", 0x1000, 0x59f56aa1, 0x0, 0x3, r7}, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, 0x5, r17, &(0x7f0000001300)="d7b97583634968ef34c3104585ea9590786cec56ad1c21d9ce04beeb9733b5c6c6731544acdcf69d1a2cfb652132dc8c1badf47ad092953fb574a7ad66997f7be1bd6f43867fc5", 0x47, 0x39, 0x0, 0x2, r18}]) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146fa) 07:19:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0xa]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) [ 479.030519][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 479.036406][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:19:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146fb) [ 479.110561][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 479.116533][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:19:37 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x48]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) r2 = accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) sendto$inet6(r2, 0x0, 0x110, 0x20004004, &(0x7f0000000040)={0xa, 0x4e20, 0x4, @loopback}, 0x1c) 07:19:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146fc) 07:19:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) [ 479.430599][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 479.436495][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:19:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146fd) 07:19:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x68]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000180)=0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000000c0)=""/138) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000001c0)) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000200)={{{@in=@local, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000300)=0xe8) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000680)) 07:19:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146fe) 07:19:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='\x00\x000\xae\xe5\"?\xc0[j', 0x682400, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, 0x0, &(0x7f0000000040)) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) ioctl$KDADDIO(r1, 0x400455cb, 0x100000002) 07:19:38 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x1000146ff) 07:19:38 executing program 3: syz_mount_image$xfs(0x0, &(0x7f0000000080)='./file0\x00', 0x1, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0)="9623f051e0c05947dfc9adf87c34b638d542e13fa9853a40a8e5d33c14f5922997fe8fb1ff9a0005b68284a572d54587223407f990f35a7ad3a73464f7d8a7be", 0x40, 0x200}, {&(0x7f0000000240)="2c34a811c92407ad5928329c490f5c6f257e3234d25cf5ad1e558b88d3c2dc49998a94208bf58731907582283ce2c5c2063397afa890f8b648da9fe16ba3c3cbd93cd8af953e84f71ebe318bafab5b79caf95adac039236271468fac8237d3c97e71a41c080407f26a89ab559bbc834bc45ca0f06a3238a7a2fe1413be493b96f9063ed28898645eedeec3d2b52ab7bd6cbe86b4cfaac2a0c0811e9262795f39e77fe35d46408dffa8f1623372e7a84210b8b851fd57e183855850ec10dfc59679c067ed94dd8328d0de376519878369909ebf763cf07b02c7097aec446e622089", 0xe1, 0x3}, {&(0x7f0000000340)="596e871bdadc90b607fd8334098255618a5189b64fa1016e2803eb1bd4e5fb2f5156011e6dfb338c24d5d79ee7e89ccf2096e327a5a25389a560b39d5a6ad22261e0f5a3cef5bb42abc01bf17e5c1bc995f775f50d0dd1bc3966a7f8bb6d84e33bb4829107ee3808c2b0471d253b9069d20f65227ff6b1f6438ccf4d095b2126d260f7d7a208569de2f6b27c9a7a174670d4b38e00d6b176276059e737889d2598809b8276590430a2d355f4de5f1b129795f3c429c5f71c8e535419b9a6ea3de05e35d221c2236a7fe7903b06fcc6cb65178e27f73aa6cdd63fd08c86331bb6a3623c7506f453af9e20c7b71c582c", 0xef, 0x1f}, {&(0x7f0000000440)="9ec32fcd400df1cd007b0880672b6f808d33cfef1155600045cfab4d33a436e9a8a21b7e63090bd60c35cc1e1c6ead737b61c8928a147b1e1fa236c178b4dbfd3a1c510c541fbddfb05f3f6962e54b385ce175a9308402d1b213e090a3d4ab3dc65132f037057f4fd18e88684f88e178f19d5e809f7ae31399492114917ed0653c6ac110412de8ea9105abae32dc65d77576c1a2a9ff093f7c5ee8cb997e52ef2877173e7221aca8bcf2fcef71c599b7aabe0f0177303ee6ff376107253a25de6d7b82eb3363573ad0c920a36f853fc215e82e1452dd085c83700bb70af4", 0xde, 0x7}, {&(0x7f00000001c0)="0eef3055106d2ae47b856a2a772f3abfbedabeb5b775fabe428b4cb5dcf2504f80b71997a9cb4aca955ea09d2578fe7702adb24f1f0d6bfac76456007191162f", 0x40}, {&(0x7f0000000540)="dbe746a161f318d6458d902f5d21dcfde2052634e24e5c6f0e3c4bfc56085049fb1e6b9cfa928efdd02184e82b4c84d8c406d5a91f", 0x35, 0x80000001}], 0x40, &(0x7f0000000700)={[{@prjquota='prjquota'}, {@uquota='uquota'}, {@sysvgroups='sysvgroups'}, {@logbufs={'logbufs', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@fowner_lt={'fowner<'}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x37, 0x64, 0x53, 0x30, 0x61, 0x66, 0x64], 0x2d, [0x32, 0xaf, 0x38, 0x35], 0x2d, [0x62, 0x67, 0x30, 0xb16010a12caa312a], 0x2d, [0x34, 0x30, 0x61], 0x2d, [0x31, 0x33, 0x57, 0xc9, 0x64, 0x39, 0x31, 0x37]}}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'GPL'}}, {@fsmagic={'fsmagic', 0x3d, 0xfffffffffffffe01}}, {@permit_directio='permit_directio'}]}) 07:19:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100014700) 07:19:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000140)}, 0x800}], 0x250, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:39 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x68]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x74]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100014701) 07:19:39 executing program 3 (fault-call:2 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x400455cb, 0x0) 07:19:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x7a]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) [ 480.746580][T15323] FAULT_INJECTION: forcing a failure. [ 480.746580][T15323] name failslab, interval 1, probability 0, space 0, times 0 [ 480.814716][T15323] CPU: 1 PID: 15323 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 480.822665][T15323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 480.832723][T15323] Call Trace: [ 480.832752][T15323] dump_stack+0x197/0x210 [ 480.832783][T15323] should_fail.cold+0xa/0x15 [ 480.832805][T15323] ? fault_create_debugfs_attr+0x180/0x180 [ 480.840525][T15323] ? ___might_sleep+0x163/0x2c0 [ 480.840549][T15323] __should_failslab+0x121/0x190 [ 480.840569][T15323] should_failslab+0x9/0x14 [ 480.840581][T15323] __kmalloc+0x2e0/0x770 [ 480.840599][T15323] ? mark_held_locks+0xf0/0xf0 [ 480.874244][T15323] ? _parse_integer+0x190/0x190 [ 480.879116][T15323] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 480.885028][T15323] tomoyo_realpath_from_path+0xcd/0x7b0 [ 480.890590][T15323] ? tomoyo_path_number_perm+0x193/0x520 [ 480.896247][T15323] tomoyo_path_number_perm+0x1dd/0x520 [ 480.901721][T15323] ? tomoyo_path_number_perm+0x193/0x520 [ 480.907376][T15323] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 480.913557][T15323] ? __f_unlock_pos+0x19/0x20 [ 480.918257][T15323] ? ___might_sleep+0x163/0x2c0 [ 480.923140][T15323] ? selinux_file_mprotect+0x620/0x620 [ 480.928619][T15323] ? __fget+0x384/0x560 [ 480.932795][T15323] ? ksys_dup3+0x3e0/0x3e0 [ 480.937224][T15323] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 480.943486][T15323] ? fput_many+0x12c/0x1a0 [ 480.947951][T15323] tomoyo_file_ioctl+0x23/0x30 [ 480.952733][T15323] security_file_ioctl+0x77/0xc0 [ 480.957695][T15323] ksys_ioctl+0x57/0xd0 [ 480.961889][T15323] __x64_sys_ioctl+0x73/0xb0 [ 480.966585][T15323] do_syscall_64+0xfa/0x760 [ 480.971110][T15323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 480.977012][T15323] RIP: 0033:0x45a219 [ 480.980927][T15323] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 481.000763][T15323] RSP: 002b:00007f3b9e19cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 07:19:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100014702) [ 481.009179][T15323] RAX: ffffffffffffffda RBX: 00007f3b9e19cc90 RCX: 000000000045a219 [ 481.017244][T15323] RDX: 0000000000000000 RSI: 00000000400455cb RDI: 0000000000000003 [ 481.017251][T15323] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 481.017258][T15323] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b9e19d6d4 [ 481.017266][T15323] R13: 00000000004c3209 R14: 00000000004d73a8 R15: 0000000000000004 07:19:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100014703) 07:19:39 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0xffffffffffffff7f) [ 481.100793][T15323] ERROR: Out of memory at tomoyo_realpath_from_path. 07:19:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = semget$private(0x0, 0x20000000107, 0x0) semtimedop(r1, &(0x7f0000000080)=[{}, {0x7, 0xffffffffffffffff}], 0x2, 0x0) semtimedop(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x3f00}], 0x1, 0x0) semctl$SEM_INFO(r1, 0x3, 0x13, &(0x7f0000000240)=""/223) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x400200, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000340)=0x18) recvmmsg(r2, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x37d, 0x4, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @loopback, 0xb0}, 0x1c) 07:19:39 executing program 3 (fault-call:2 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x400455cb, 0x0) 07:19:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100014704) [ 481.358413][T15346] FAULT_INJECTION: forcing a failure. [ 481.358413][T15346] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 481.371832][T15346] CPU: 0 PID: 15346 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 481.379742][T15346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.389810][T15346] Call Trace: [ 481.393122][T15346] dump_stack+0x197/0x210 [ 481.397474][T15346] should_fail.cold+0xa/0x15 [ 481.402288][T15346] ? fault_create_debugfs_attr+0x180/0x180 [ 481.408172][T15346] ? __kasan_check_read+0x11/0x20 [ 481.413374][T15346] should_fail_alloc_page+0x50/0x60 [ 481.418595][T15346] __alloc_pages_nodemask+0x1a1/0x900 [ 481.423981][T15346] ? avc_has_extended_perms+0x8e4/0x1100 [ 481.429609][T15346] ? __alloc_pages_slowpath+0x2920/0x2920 [ 481.435324][T15346] ? __kasan_check_read+0x11/0x20 [ 481.440348][T15346] ? fault_create_debugfs_attr+0x180/0x180 [ 481.446154][T15346] cache_grow_begin+0x90/0xd20 [ 481.450910][T15346] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 481.456966][T15346] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 481.463202][T15346] __kmalloc+0x6b2/0x770 [ 481.467446][T15346] ? mark_held_locks+0xf0/0xf0 [ 481.472207][T15346] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 481.477922][T15346] tomoyo_realpath_from_path+0xcd/0x7b0 [ 481.483455][T15346] ? tomoyo_path_number_perm+0x193/0x520 [ 481.489084][T15346] tomoyo_path_number_perm+0x1dd/0x520 [ 481.494533][T15346] ? tomoyo_path_number_perm+0x193/0x520 [ 481.500156][T15346] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 481.506036][T15346] ? __f_unlock_pos+0x19/0x20 [ 481.510724][T15346] ? ___might_sleep+0x163/0x2c0 [ 481.515589][T15346] ? selinux_file_mprotect+0x620/0x620 [ 481.521032][T15346] ? __fget+0x384/0x560 [ 481.525199][T15346] ? ksys_dup3+0x3e0/0x3e0 [ 481.529632][T15346] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 481.535865][T15346] ? fput_many+0x12c/0x1a0 [ 481.540279][T15346] tomoyo_file_ioctl+0x23/0x30 [ 481.545072][T15346] security_file_ioctl+0x77/0xc0 [ 481.550002][T15346] ksys_ioctl+0x57/0xd0 [ 481.554178][T15346] __x64_sys_ioctl+0x73/0xb0 [ 481.558763][T15346] do_syscall_64+0xfa/0x760 [ 481.563260][T15346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 481.569310][T15346] RIP: 0033:0x45a219 [ 481.573215][T15346] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 481.592922][T15346] RSP: 002b:00007f3b9e19cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 481.601353][T15346] RAX: ffffffffffffffda RBX: 00007f3b9e19cc90 RCX: 000000000045a219 [ 481.609318][T15346] RDX: 0000000000000000 RSI: 00000000400455cb RDI: 0000000000000003 [ 481.617366][T15346] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 481.625326][T15346] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b9e19d6d4 [ 481.633288][T15346] R13: 00000000004c3209 R14: 00000000004d73a8 R15: 0000000000000004 07:19:40 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) r3 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r3, 0x1000000) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) sendfile(0xffffffffffffffff, r3, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000200)=ANY=[], 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$FS_IOC_GETFLAGS(r4, 0x80086601, &(0x7f0000001540)) r6 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_EVENTS(r6, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r7, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r8 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r8, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r9 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r9, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r10 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r10, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r11 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r11, 0x84, 0xb, 0x0, &(0x7f00000000c0)) r12 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r12, 0x84, 0xb, 0x0, &(0x7f00000000c0)) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000001640)=ANY=[@ANYPTR=&(0x7f0000001740)=ANY=[@ANYPTR=&(0x7f00000013c0)=ANY=[@ANYRES16=0x0, @ANYPTR64, @ANYRES16=r8, @ANYRESDEC=0x0, @ANYRESHEX=r9, @ANYRES16=r2, @ANYRES32, @ANYRES64=r5], @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYRES32=r8, @ANYPTR64, @ANYBLOB="e62c9fdb584bf4a34979aca54f0458fa23f2dd8799d07e7307796eb0f19d793043caa26254b1094af4c77069d4f3d5c3bd86fd008d5b83e40efa357138d404667d4d742825f3dfbb9218e9dce293508384f9019f2544e0449ed69c56ec06f0c2b0cdbc1c2942a0", @ANYRESDEC, @ANYRES64=r12], @ANYPTR64=&(0x7f0000001600)=ANY=[@ANYRES32=r0, @ANYBLOB="405f0aaff0837a625f1db3", @ANYRES32, @ANYRES64=0x0], @ANYBLOB="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"], @ANYRES64=r11, @ANYPTR=&(0x7f00000012c0)=ANY=[], @ANYBLOB="a856c89ffc5cd34f01e75548852ac4331f41c63b7af5cb0e8943e6df389b7c439e2cd2dcfc8b45b0c70878cbc370e969cefa2a92b3dc704b25025764e8696b7176af38ac3092093215ad343d2280230cf3be6f502a6772f28fe0756000c10973c7c1798d6aecc935d50d549a9c02f1c11fe17e29301da523c54e7fd43da8bd88dea640d04d870d0a4e319cc7a5bedf147a4f76c30793d23c4ed341ed521de62da5b1d582914e93dd2b1f9b", @ANYPTR64=&(0x7f0000001340)=ANY=[@ANYRES64=r1, @ANYRES16=r4]], 0x5) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000100)={0x2}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000000)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x200, 0x0) r13 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r14 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r14, 0x1000000) sendfile(r13, r14, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r13, &(0x7f0000000400)=ANY=[@ANYBLOB="0e000000f2ffe3ffffff000085269f9f0b532f52a8a0355812384d1df5663492c14d20c4df8a1e8ce1df0e718a4a52f4d41cf22195984d94addea7c314e2de70b3b703e290ee68cd0b6f9ffb8630350b03a713e8e9f19d41238ffc148b527a16c6db2c72c1e7a24d1542a840a6515377d5eb0a88a3a12b06e9180edcbb"], 0xc) ioctl$VHOST_GET_VRING_BASE(r13, 0xc008af12, &(0x7f0000001580)) write$P9_RLOPEN(r13, &(0x7f0000000180)={0x2, 0xd, 0x2, {{0x5, 0x404, 0x8}, 0x243}}, 0x18) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000200)={r3, 0x1, 0x10000, 0x4000}) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f00000012c0)={0x9, &(0x7f00000014c0)=[{0x8, 0x6, 0x1, 0x1ae9}, {0x2, 0x1f, 0x81, 0x10000}, {0x40, 0x7f, 0x9, 0xba4e}, {0xfff, 0x7f, 0x80, 0xffff33f2}, {0x7, 0x6, 0x2b, 0x9}, {0x0, 0x7f, 0x5, 0x595a}, {0x3, 0x5, 0x5, 0x5}, {0x2, 0x1, 0x4, 0x9}, {0x2, 0x9, 0x5, 0x7741}]}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x400455cb, 0x100000000) 07:19:40 executing program 0: r0 = socket(0x2, 0x3, 0x67) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, r2, 0x1}, 0x14}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2902}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x38, r2, 0x8, 0x70bd27, 0x25dfdbfb, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x42000095}, 0x4000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r4, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect$inet(r5, &(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x10000, 0x0) recvmmsg(r4, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x1, &(0x7f0000000040)={0xa, 0x0, 0x7, @loopback}, 0x1c) shutdown(r4, 0x1) 07:19:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100014705) 07:19:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) openat$cgroup_int(r2, &(0x7f0000000080)='rdma.max\x00', 0x2, 0x0) 07:19:40 executing program 3 (fault-call:2 fault-nth:2): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x400455cb, 0x0) 07:19:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100014706) 07:19:40 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) [ 482.193460][T15375] FAULT_INJECTION: forcing a failure. [ 482.193460][T15375] name failslab, interval 1, probability 0, space 0, times 0 [ 482.296571][T15375] CPU: 1 PID: 15375 Comm: syz-executor.3 Not tainted 5.4.0-rc7+ #0 [ 482.304562][T15375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 482.316110][T15375] Call Trace: [ 482.319434][T15375] dump_stack+0x197/0x210 [ 482.323804][T15375] should_fail.cold+0xa/0x15 [ 482.328435][T15375] ? fault_create_debugfs_attr+0x180/0x180 [ 482.334290][T15375] ? ___might_sleep+0x163/0x2c0 [ 482.339182][T15375] __should_failslab+0x121/0x190 [ 482.344157][T15375] should_failslab+0x9/0x14 [ 482.348684][T15375] __kmalloc+0x2e0/0x770 [ 482.352950][T15375] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 482.359214][T15375] ? d_absolute_path+0x11b/0x170 [ 482.364186][T15375] ? __d_path+0x140/0x140 [ 482.368543][T15375] ? tomoyo_encode2.part.0+0xf5/0x400 [ 482.373952][T15375] tomoyo_encode2.part.0+0xf5/0x400 [ 482.379177][T15375] tomoyo_encode+0x2b/0x50 [ 482.383622][T15375] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 482.389285][T15375] tomoyo_path_number_perm+0x1dd/0x520 [ 482.394757][T15375] ? tomoyo_path_number_perm+0x193/0x520 [ 482.400612][T15375] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 482.406436][T15375] ? __f_unlock_pos+0x19/0x20 [ 482.411167][T15375] ? ___might_sleep+0x163/0x2c0 [ 482.416149][T15375] ? selinux_file_mprotect+0x620/0x620 [ 482.421623][T15375] ? __fget+0x384/0x560 [ 482.425799][T15375] ? ksys_dup3+0x3e0/0x3e0 [ 482.430414][T15375] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 482.437198][T15375] ? fput_many+0x12c/0x1a0 [ 482.441639][T15375] tomoyo_file_ioctl+0x23/0x30 [ 482.446451][T15375] security_file_ioctl+0x77/0xc0 [ 482.451408][T15375] ksys_ioctl+0x57/0xd0 [ 482.455574][T15375] __x64_sys_ioctl+0x73/0xb0 [ 482.460189][T15375] do_syscall_64+0xfa/0x760 [ 482.464718][T15375] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 482.470621][T15375] RIP: 0033:0x45a219 [ 482.474658][T15375] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:19:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x12, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/29}, {&(0x7f0000000240)=""/199}], 0x0, &(0x7f0000000340)=""/130}, 0x9}, {{&(0x7f0000000400)=@in={0x2, 0x0, @multicast2}, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000480)=""/20}, {&(0x7f00000004c0)=""/36}, {&(0x7f0000000500)=""/135}], 0x0, &(0x7f0000000600)=""/237}, 0x6}, {{&(0x7f0000000700)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000780)=""/56}, {&(0x7f00000007c0)=""/146}, {&(0x7f0000000880)=""/69}, {&(0x7f0000000900)=""/246}, {&(0x7f0000000a00)=""/155}], 0x0, &(0x7f0000000b40)=""/247}, 0x6}], 0x40000000000006a, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x4080, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xa5}, &(0x7f0000000100)=0x8) [ 482.494384][T15375] RSP: 002b:00007f3b9e19cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 482.502831][T15375] RAX: ffffffffffffffda RBX: 00007f3b9e19cc90 RCX: 000000000045a219 [ 482.510827][T15375] RDX: 0000000000000000 RSI: 00000000400455cb RDI: 0000000000000003 [ 482.518820][T15375] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 482.526814][T15375] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3b9e19d6d4 [ 482.534808][T15375] R13: 00000000004c3209 R14: 00000000004d73a8 R15: 0000000000000004 07:19:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x17ffffffc) [ 482.561263][T15375] ERROR: Out of memory at tomoyo_realpath_from_path. 07:19:41 executing program 3 (fault-call:2 fault-nth:3): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x400455cb, 0x0) [ 482.640545][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 482.646485][ C0] protocol 88fb is buggy, dev hsr_slave_1 07:19:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/tmx\x00', 0x12000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) ioctl$VIDIOC_G_EDID(0xffffffffffffffff, 0xc0285628, &(0x7f00000000c0)={0x0, 0x14a171d2, 0x80, [], &(0x7f0000000000)=0x1}) 07:19:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x38) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000000c0)={0xb3}, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000), &(0x7f00000000c0)=0x4) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) 07:19:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000000)={0x5, 0x80, 0x28, 0x0, 0x9}) ftruncate(0xffffffffffffffff, 0x1000000) sendfile(r1, 0xffffffffffffffff, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="0e000000000000ac77000000"], 0xc) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x100, 0x0) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000280)="437dba2018e888f758a757b4cbc842a369672c3747377b2b7efac612fa0d2baff0d9e0d97eb1cabe5fc45348c4b45004a516a6045a55a98d7fea29149ceb5cfdc2ee248b4d5c7bd7b609c75c5be4532344ef3d85f1a223d403226d3bef5bfd016faed6cc5b5375e63550d591f40d648b2fc5666428fbb16d9b0550c36317ecc9028e472a526e4a3d3f9a1b3be919e947a43d42164d5ccfa4ffe5077aa67cbcdfd4a2cbfc0b95a510b95b0cf17073") ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f00000000c0)="5f470bded981492bd93b36a6d4fad5763c7cc5016f2283af03142a0d8b370b436930a7addfbba05045dd6a6d591a44244a26478f71b25d638733f39fb453ef6cc8280abeb65386865810a06059341e9d86d4c644b79e37b28b05d4cfc8c012509ab6f1fa1342625d5f28c0173498898628c98c1cce96716462bfa5ab1483394960aafac5190202b81dd0f6e6918d1dc77685d8876b4f8a7db7e798eb60800a603a3cf80089ce6a929c187ff55cd5d0867e0c3523e6649a40c26aecfad65275b98f4b84640aa45dd94fe479b77bc2bab12ca62c76cb31401e2e208df6de4c34c5b3d6faef") 07:19:41 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:41 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x400455cb, 0x0) 07:19:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x2, 0x0) 07:19:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x10, 0x0) 07:19:42 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x127d, 0x0) 07:19:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) r2 = socket(0x2, 0x3, 0x67) r3 = socket(0x2, 0x3, 0x67) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") ioctl$sock_x25_SIOCDELRT(r3, 0x890c, &(0x7f0000000240)={@remote={[], 0x3}, 0x0, 'bond0\x00'}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc0a85352, &(0x7f0000000340)={{0xfd, 0x2}, 'port0\x00', 0x3d, 0x11000, 0x10000, 0xffffffff, 0x20, 0x2, 0x647, 0x0, 0x1, 0x3}) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x9, &(0x7f0000000040), 0x4) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f00000001c0)=0x10) 07:19:42 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x4b47, 0x0) [ 485.110555][ T9424] Bluetooth: hci0: command 0x1003 tx timeout [ 485.116705][T11049] Bluetooth: hci0: sending frame failed (-49) [ 487.190649][ T9424] Bluetooth: hci0: command 0x1001 tx timeout [ 487.196893][T11049] Bluetooth: hci0: sending frame failed (-49) [ 489.270659][ T2859] Bluetooth: hci0: command 0x1009 tx timeout 07:19:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$packet_int(r1, 0x107, 0x10, &(0x7f0000000000)=0x80000000, 0x4) 07:19:51 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x4b49, 0x0) 07:19:51 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x7fffffff, 0x40400) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000280)={0x0, 0x80000, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x1, 0xca) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r3, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x80900a, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_none='cache=none'}, {@mmap='mmap'}, {@access_user='access=user'}, {@aname={'aname', 0x3d, '/dev/audio\x00'}}, {@version_L='version=9p2000.L'}], [{@uid_lt={'uid<', r3}}, {@subj_user={'subj_user'}}]}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r8 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r7, r8, 0x0) r9 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x406001, 0x0) ioctl$CAPI_REGISTER(r9, 0x400c4301, &(0x7f0000000080)={0x8, 0x26a3, 0x97}) 07:19:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="1819712f3b6123a58546edba2c760589f9552e492f62"], 0xc) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f00000000c0)=0x20) socket$isdn_base(0x22, 0x3, 0x0) r3 = socket(0x2, 0x3, 0x67) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0800b5055e0bcfe87b0071") r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000200)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r4, 0x1, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r5 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r6 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r6, 0x1000000) sendfile(r5, r6, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r5, &(0x7f0000000200), 0xc) ioctl$TIOCSTI(r5, 0x5412, 0x7f) r7 = open(&(0x7f0000000000)='./file0\x00', 0x80, 0x1) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455cb, 0x100000001) 07:19:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x7a7d13d51d11d809, 0x0) r1 = getgid() r2 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000140)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) r5 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r6) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r7, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xfffffffffffffeb3) r9 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r10) r11 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r12) r13 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x0, r14}, {0x8, 0x0, r14}], {0x10, 0x6}}, 0x34, 0x0) r15 = socket$inet(0x2, 0x1, 0xca) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r16, 0x0) fsetxattr$system_posix_acl(r2, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000540)={{}, {0x1, 0x1}, [{0x2, 0x67aa0e1dbddc5c9d, r4}, {0x2, 0xf, r16}, {0x2, 0x5, r6}, {0x2, 0x1}, {0x2, 0x1, r8}, {0x2, 0x6, r10}, {0x2, 0x4, r12}], {0x4, 0x2}, [{0x8, 0xda0610c6b32be233}, {0x8, 0x6, r14}], {}, {0x20, 0x3}}, 0x6c, 0x0) r17 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r17, 0x84, 0xb, 0x0, &(0x7f00000000c0)) fstat(r17, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r19 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r20 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r20, 0x0, 0x10, &(0x7f0000000140)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0x5a2163f5f7c5c946) r22 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r23) r24 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r24, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r24, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000019c0)=0xffffffffffffff49) r26 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r27) r28 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r28, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r29) r30 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r30, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x0, r31}, {0x8, 0x0, r31}], {0x10, 0x6}}, 0x34, 0x0) fsetxattr$system_posix_acl(r19, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="02000000010001000000000002009d5c", @ANYRES32=r21, @ANYBLOB="02000f00", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=r23, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB="02000100", @ANYRES32=r25, @ANYBLOB="02000500", @ANYRES32=r27, @ANYBLOB="02000400", @ANYRES32=r29, @ANYBLOB="0400020000000000080033e2", @ANYRES32=0x0, @ANYBLOB="0859fbac", @ANYRES32=r31, @ANYBLOB="10000000000000002000030000000000"], 0x6c, 0x2) r32 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r33 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r33, 0x0, 0x10, &(0x7f0000000140)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) r35 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r35, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r36) r37 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r37, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r37, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xfffffffffffffeb3) r39 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r39, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r40) r41 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r41, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r42) r43 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r43, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x0, r44}, {0x8, 0x0, r44}], {0x10, 0x6}}, 0x34, 0x0) fsetxattr$system_posix_acl(r32, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000540)={{}, {0x1, 0x1}, [{0x2, 0x67aa0e1dbddc5c9d, r34}, {0x2, 0xf}, {0x2, 0x0, r36}, {0x2, 0x1}, {0x2, 0x1, r38}, {0x2, 0x5, r40}, {0x2, 0x4, r42}], {0x4, 0x2}, [{0x8, 0xda0610c6b32be233}, {0x8, 0x6, r44}], {}, {0x20, 0x3}}, 0x6c, 0x2) getgroups(0x3, &(0x7f0000000140)=[r31, r44, 0x0]) r46 = getegid() setgroups(0x6, &(0x7f0000000180)=[0x0, r1, r14, r18, r45, r46]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) r47 = syz_open_dev$vbi(&(0x7f00000001c0)='/dev/vbi#\x00', 0x1, 0x2) r48 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r48, 0x1000000) sendfile(r47, r48, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r47, &(0x7f0000000200), 0xc) ioctl$FIONREAD(r47, 0x541b, &(0x7f0000000000)) 07:19:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x4c00, 0x0) 07:19:52 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, 0x0, &(0x7f00000000c0)) recvmmsg(r0, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000080)=""/102, 0x66}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000000240)=""/253, 0xfd}, {&(0x7f0000001380)=""/159, 0x9f}, {&(0x7f0000000000)=""/50, 0x32}, {&(0x7f0000000180)=""/3, 0x3}], 0x6, &(0x7f00000014c0)=""/234, 0xea}}, {{0x0, 0x0, &(0x7f0000001880)=[{&(0x7f00000015c0)=""/241, 0xf1}, {&(0x7f00000016c0)=""/115, 0x73}, {&(0x7f0000001740)=""/239, 0xef}, {&(0x7f0000001840)=""/64, 0x40}], 0x4, &(0x7f00000018c0)=""/120, 0x78}, 0xff795f65}, {{&(0x7f0000001940)=@caif, 0x80, &(0x7f00000029c0)=[{&(0x7f00000019c0)=""/4096, 0x1000}], 0x1}, 0xb9}, {{0x0, 0x0, &(0x7f0000003b40)=[{&(0x7f0000002a00)=""/143, 0x8f}, {&(0x7f0000002ac0)}, {&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f0000003b00)=""/49, 0x31}], 0x4, &(0x7f0000003b80)=""/29, 0x1d}, 0x200}, {{&(0x7f0000003bc0)=@nfc, 0x80, &(0x7f0000004cc0)=[{&(0x7f0000003c40)=""/12, 0xc}, {&(0x7f0000003c80)=""/4096, 0x1000}, {&(0x7f0000004c80)=""/34, 0x22}], 0x3, &(0x7f0000004d00)=""/217, 0xd9}, 0x100}, {{&(0x7f0000004e00)=@caif=@util, 0x80, &(0x7f0000005040)=[{&(0x7f0000004e80)=""/185, 0xb9}, {&(0x7f0000004f40)=""/230, 0xe6}], 0x2, &(0x7f0000005080)=""/67, 0x43}, 0x7}, {{&(0x7f0000005100)=@nfc, 0x80, &(0x7f0000005480)=[{&(0x7f0000005180)=""/142, 0x8e}, {&(0x7f0000005240)=""/160, 0xa0}, {&(0x7f0000005300)=""/88, 0x58}, {&(0x7f0000005380)=""/157, 0x9d}, {&(0x7f0000005440)=""/57, 0x39}], 0x5}, 0x200}, {{&(0x7f0000005500)=@pptp, 0x80, &(0x7f0000007600)=[{&(0x7f0000005580)=""/4096, 0x1000}, {&(0x7f0000006580)=""/4096, 0x1000}, {&(0x7f0000007580)=""/99, 0x63}], 0x3, &(0x7f0000007640)=""/4096, 0x1000}, 0x3ff}, {{0x0, 0x0, &(0x7f0000008740)=[{&(0x7f0000008640)=""/136, 0x88}, {&(0x7f0000008700)=""/44, 0x13}], 0x2, &(0x7f0000008780)=""/201, 0xc9}, 0x6}], 0x9, 0x100, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r5 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r4, r5, 0x0) 07:19:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) write$P9_RCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0x73, 0x1, {{0x11, 0x2, 0x8}, 0x81}}, 0x18) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000080)=r2) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) 07:19:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x4c01, 0x0) 07:19:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x100000001) r1 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) r2 = memfd_create(&(0x7f0000000080)='selfvmnet1\x00', 0x0) ftruncate(r2, 0x1000000) sendfile(r1, r2, 0x0, 0xeefffdef) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000200), 0xc) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0x20, 0x7, 0x7, 0x9, 0x1a, 0x6, 0x80, 0x7f, 0x2, 0x80}) [ 493.590540][ C0] net_ratelimit: 4 callbacks suppressed [ 493.590549][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 493.602019][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 493.670531][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 493.676430][ C1] protocol 88fb is buggy, dev hsr_slave_1 07:19:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x5401, 0x0) 07:19:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x41800, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x5, 0x8000) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x404, 0x252) recvmmsg(0xffffffffffffffff, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140), 0x53}}], 0x3a7, 0x2000, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004014, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x4) 07:19:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:52 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = socket$inet(0x2, 0x1, 0xca) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r2, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet(0x2, 0x1, 0xca) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@dev}}, &(0x7f00000000c0)=0xe8) r7 = socket$inet(0x2, 0x1, 0xca) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r8, 0x0) r9 = socket$inet(0x2, 0x1, 0xca) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r10, 0x0) r11 = socket$inet(0x2, 0x1, 0xca) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r12, 0x0) r13 = getgid() r14 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r15 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f0000000140)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) r17 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000300)=0x3c6) setreuid(0x0, r18) r19 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r19, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r19, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xfffffffffffffeb3) r21 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r21, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r22) r23 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r24) r25 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r25, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x0, r26}, {0x8, 0x0, r26}], {0x10, 0x6}}, 0x34, 0x0) fsetxattr$system_posix_acl(r14, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000540)={{}, {0x1, 0x1}, [{0x2, 0x67aa0e1dbddc5c9d, r16}, {0x2, 0xf}, {0x2, 0x0, r18}, {0x2, 0x1}, {0x2, 0x1, r20}, {0x2, 0x5, r22}, {0x2, 0x4, r24}], {0x4, 0x2}, [{0x8, 0xda0610c6b32be233}, {0x8, 0x6, r26}], {}, {0x20, 0x3}}, 0x6c, 0x2) r27 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r28 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r28, 0x0, 0x10, &(0x7f0000000140)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) r30 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r30, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r31) r32 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r32, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r32, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xfffffffffffffeb3) r34 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r34, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r35) r36 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r36, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r37) r38 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r38, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x0, r39}, {0x8, 0x0, r39}], {0x10, 0x6}}, 0x34, 0x0) fsetxattr$system_posix_acl(r27, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000540)={{}, {0x1, 0x1}, [{0x2, 0x67aa0e1dbddc5c9d, r29}, {0x2, 0xf}, {0x2, 0x0, r31}, {0x2, 0x1}, {0x2, 0x1, r33}, {0x2, 0x5, r35}, {0x2, 0x4, r37}], {0x4, 0x2}, [{0x8, 0xda0610c6b32be233}, {0x8, 0x6, r39}], {}, {0x20, 0x3}}, 0x6c, 0x2) r40 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r41 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f0000000140)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) r43 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r43, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r44) r45 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r45, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r45, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xfffffffffffffeb3) r47 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r47, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r48) r49 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r49, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r50) r51 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r51, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x0, r52}, {0x8, 0x0, r52}], {0x10, 0x6}}, 0x34, 0x0) fsetxattr$system_posix_acl(r40, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000540)={{}, {0x1, 0x1}, [{0x2, 0x67aa0e1dbddc5c9d, r42}, {0x2, 0xf}, {0x2, 0x0, r44}, {0x2, 0x1}, {0x2, 0x1, r46}, {0x2, 0x5, r48}, {0x2, 0x4, r50}], {0x4, 0x2}, [{0x8, 0xda0610c6b32be233}, {0x8, 0x6, r52}], {}, {0x20, 0x3}}, 0x6c, 0x2) getgroups(0x5, &(0x7f0000000180)=[0xee00, r26, r39, r52, 0xffffffffffffffff]) r54 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r55 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r55, 0x0, 0x10, &(0x7f0000000140)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xe8) r57 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r57, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r58) r59 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r59, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r59, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xfffffffffffffeb3) r61 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r61, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r62) r63 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r63, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r64) r65 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r65, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x0, r66}, {0x8, 0x0, r66}], {0x10, 0x6}}, 0x34, 0x0) fsetxattr$system_posix_acl(r54, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000540)={{}, {0x1, 0x1}, [{0x2, 0x67aa0e1dbddc5c9d, r56}, {0x2, 0xf}, {0x2, 0x0, r58}, {0x2, 0x1}, {0x2, 0x1, r60}, {0x2, 0x5, r62}, {0x2, 0x4, r64}], {0x4, 0x2}, [{0x8, 0xda0610c6b32be233}, {0x8, 0x6, r66}], {}, {0x20, 0x3}}, 0x6c, 0x2) r67 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) r68 = accept$inet(r61, 0x0, &(0x7f00000002c0)) getsockopt$inet_IP_IPSEC_POLICY(r68, 0x0, 0x10, &(0x7f0000000140)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@initdev}}, &(0x7f0000000080)=0xfffffffffffffce2) r70 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r70, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r71) r72 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) readv(r72, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x47}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xf0}, {&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(r72, 0x29, 0x23, &(0x7f0000000340)={{{@in=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xfffffffffffffeb3) r74 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r74, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r75) r76 = socket(0xa, 0x2, 0x0) getsockopt$sock_cred(r76, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xa) setreuid(0x0, r77) r78 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r78, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000280)={{}, {}, [], {}, [{0x8, 0x0, r79}, {0x8, 0x0, r79}], {0x10, 0x6}}, 0x34, 0x0) fsetxattr$system_posix_acl(r67, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000540)={{}, {0x1, 0x1}, [{0x2, 0x67aa0e1dbddc5c9d, r69}, {0x2, 0xf}, {0x2, 0x0, r71}, {0x2, 0x1}, {0x2, 0x1, r73}, {0x2, 0x5, r75}, {0x2, 0x4, r77}], {0x4, 0x2}, [{0x8, 0xda0610c6b32be233}, {0x8, 0x6, r79}], {}, {0x20, 0x3}}, 0x6c, 0x2) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000480)={{}, {0x1, 0xec2f7d9fd8e17747}, [{0x2, 0x6, r2}, {0x2, 0xa, r3}, {0x2, 0x6, r5}, {0x2, 0x9692e42a6c5c2046, r6}, {0x2, 0x2, r8}, {0x2, 0x7, r10}, {0x2, 0x0, r12}], {0x4, 0x1}, [{0x8, 0x5, r13}, {0x8, 0x5, r53}, {0x8, 0x3, r66}, {0x8, 0x1, r79}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x84, 0x2) r80 = socket$inet_udplite(0x2, 0x2, 0x88) r81 = fcntl$dupfd(r80, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r81, 0x8912, 0x400200) r82 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r83 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) dup3(r82, r83, 0x0) [ 493.971966][ T21] Bluetooth: Error in BCSP hdr checksum 07:19:52 executing program 1: r0 = socket$inet(0x2, 0x1, 0xca) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000001580)=0x7) setresuid(0x0, r1, 0x0) setuid(r1) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000000)={0x66, 0x4, 0x1ff, 0x401, 0x9, 0x0, 0x92, 0x32, 0x6, 0x1e}) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0xf) ioctl$KDADDIO(r2, 0x400455cb, 0x100000001) keyctl$set_reqkey_keyring(0xe, 0xfffffffffffffffb) 07:19:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x5402, 0x0) 07:19:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000200)=0xfc, 0x4) recvmmsg(r1, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x205) 07:19:52 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0xe) ioctl$KDADDIO(r0, 0x5403, 0x0) [ 494.232070][ T34] Bluetooth: Error in BCSP hdr checksum 07:19:53 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x1}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x60, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, 0x8}, 0x1c) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) 07:19:53 executing program 1: socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) bind(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0xbb8) read$eventfd(0xffffffffffffffff, 0x0, 0x0) [ 494.491153][T15587] Bluetooth: Error in BCSP hdr checksum [ 495.750775][ T9424] Bluetooth: hci0: command 0x1003 tx timeout [ 495.756959][T11049] Bluetooth: hci0: sending frame failed (-49) [ 497.830715][ T9424] Bluetooth: hci0: command 0x1001 tx timeout [ 497.836981][T11049] Bluetooth: hci0: sending frame failed (-49) [ 499.910705][T11388] Bluetooth: hci0: command 0x1009 tx timeout [ 504.003508][T15513] ================================================================== [ 504.012090][T15513] BUG: KASAN: use-after-free in kfree_skb+0x38/0x3c0 [ 504.018754][T15513] Read of size 4 at addr ffff888095c80854 by task syz-executor.4/15513 [ 504.026968][T15513] [ 504.029300][T15513] CPU: 1 PID: 15513 Comm: syz-executor.4 Not tainted 5.4.0-rc7+ #0 [ 504.037167][T15513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.047488][T15513] Call Trace: [ 504.050804][T15513] dump_stack+0x197/0x210 [ 504.055134][T15513] ? kfree_skb+0x38/0x3c0 [ 504.059640][T15513] print_address_description.constprop.0.cold+0xd4/0x30b [ 504.066660][T15513] ? kfree_skb+0x38/0x3c0 [ 504.070990][T15513] ? kfree_skb+0x38/0x3c0 [ 504.075319][T15513] __kasan_report.cold+0x1b/0x41 [ 504.080267][T15513] ? kfree_skb+0x38/0x3c0 [ 504.084679][T15513] kasan_report+0x12/0x20 [ 504.089016][T15513] check_memory_region+0x134/0x1a0 [ 504.094127][T15513] __kasan_check_read+0x11/0x20 [ 504.098961][T15513] kfree_skb+0x38/0x3c0 [ 504.103160][T15513] bcsp_close+0xc7/0x130 [ 504.107419][T15513] hci_uart_tty_close+0x21e/0x280 [ 504.112444][T15513] ? hci_uart_close+0x50/0x50 [ 504.117159][T15513] tty_ldisc_close.isra.0+0x119/0x1a0 [ 504.122983][T15513] tty_ldisc_kill+0x9c/0x160 [ 504.127567][T15513] tty_ldisc_release+0xe9/0x2b0 [ 504.132420][T15513] tty_release_struct+0x1b/0x50 [ 504.137261][T15513] tty_release+0xbcb/0xe90 [ 504.141676][T15513] __fput+0x2ff/0x890 [ 504.145645][T15513] ? put_tty_driver+0x20/0x20 [ 504.150307][T15513] ____fput+0x16/0x20 [ 504.154275][T15513] task_work_run+0x145/0x1c0 [ 504.158853][T15513] exit_to_usermode_loop+0x316/0x380 [ 504.164124][T15513] do_syscall_64+0x65f/0x760 [ 504.168912][T15513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.174798][T15513] RIP: 0033:0x413db1 [ 504.178680][T15513] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 504.198409][T15513] RSP: 002b:00007ffe46a5bf50 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 504.206817][T15513] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413db1 [ 504.215116][T15513] RDX: 0000001b33420000 RSI: 0000000000001340 RDI: 0000000000000003 [ 504.223070][T15513] RBP: 0000000000000001 R08: 00000000fe747340 R09: 00000000fe747344 [ 504.231033][T15513] R10: 00007ffe46a5c030 R11: 0000000000000293 R12: 000000000075c9a0 [ 504.238998][T15513] R13: 000000000075c9a0 R14: 0000000000760720 R15: 000000000075bfd4 [ 504.246978][T15513] [ 504.249300][T15513] Allocated by task 15587: [ 504.253700][T15513] save_stack+0x23/0x90 [ 504.257848][T15513] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 504.263472][T15513] kasan_slab_alloc+0xf/0x20 [ 504.268040][T15513] kmem_cache_alloc_node+0x138/0x740 [ 504.273859][T15513] __alloc_skb+0xd5/0x5e0 [ 504.278194][T15513] bcsp_recv+0x8c1/0x13a0 [ 504.282787][T15513] hci_uart_tty_receive+0x279/0x6e0 [ 504.288177][T15513] tty_ldisc_receive_buf+0x15f/0x1c0 [ 504.293470][T15513] tty_port_default_receive_buf+0x7d/0xb0 [ 504.299185][T15513] flush_to_ldisc+0x222/0x390 [ 504.303843][T15513] process_one_work+0x9af/0x1740 [ 504.308773][T15513] worker_thread+0x98/0xe40 [ 504.313256][T15513] kthread+0x361/0x430 [ 504.318007][T15513] ret_from_fork+0x24/0x30 [ 504.322396][T15513] [ 504.324706][T15513] Freed by task 15587: [ 504.328752][T15513] save_stack+0x23/0x90 [ 504.332902][T15513] __kasan_slab_free+0x102/0x150 [ 504.338001][T15513] kasan_slab_free+0xe/0x10 [ 504.342522][T15513] kmem_cache_free+0x86/0x320 [ 504.347269][T15513] kfree_skbmem+0xc5/0x150 [ 504.351664][T15513] kfree_skb+0x109/0x3c0 [ 504.355884][T15513] bcsp_recv+0x2d8/0x13a0 [ 504.360201][T15513] hci_uart_tty_receive+0x279/0x6e0 [ 504.365484][T15513] tty_ldisc_receive_buf+0x15f/0x1c0 [ 504.371288][T15513] tty_port_default_receive_buf+0x7d/0xb0 [ 504.377124][T15513] flush_to_ldisc+0x222/0x390 [ 504.381889][T15513] process_one_work+0x9af/0x1740 [ 504.386812][T15513] worker_thread+0x98/0xe40 [ 504.391294][T15513] kthread+0x361/0x430 [ 504.395364][T15513] ret_from_fork+0x24/0x30 [ 504.399756][T15513] [ 504.402071][T15513] The buggy address belongs to the object at ffff888095c80780 [ 504.402071][T15513] which belongs to the cache skbuff_head_cache of size 224 [ 504.416755][T15513] The buggy address is located 212 bytes inside of [ 504.416755][T15513] 224-byte region [ffff888095c80780, ffff888095c80860) [ 504.430007][T15513] The buggy address belongs to the page: [ 504.435625][T15513] page:ffffea0002572000 refcount:1 mapcount:0 mapping:ffff8880a99e7a80 index:0xffff888095c80b40 [ 504.446014][T15513] flags: 0x1fffc0000000200(slab) [ 504.450950][T15513] raw: 01fffc0000000200 ffffea00023fa288 ffffea000272be08 ffff8880a99e7a80 [ 504.459514][T15513] raw: ffff888095c80b40 ffff888095c80000 0000000100000008 0000000000000000 [ 504.468179][T15513] page dumped because: kasan: bad access detected [ 504.474680][T15513] [ 504.477025][T15513] Memory state around the buggy address: [ 504.482646][T15513] ffff888095c80700: fb fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc [ 504.490701][T15513] ffff888095c80780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 504.498920][T15513] >ffff888095c80800: fb fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc [ 504.507077][T15513] ^ [ 504.513746][T15513] ffff888095c80880: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 504.521787][T15513] ffff888095c80900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 504.529853][T15513] ================================================================== [ 504.537904][T15513] Disabling lock debugging due to kernel taint [ 504.544609][T15513] Kernel panic - not syncing: panic_on_warn set ... [ 504.551338][T15513] CPU: 1 PID: 15513 Comm: syz-executor.4 Tainted: G B 5.4.0-rc7+ #0 [ 504.560615][T15513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 504.570997][T15513] Call Trace: [ 504.574504][T15513] dump_stack+0x197/0x210 [ 504.578819][T15513] panic+0x2e3/0x75c [ 504.582695][T15513] ? add_taint.cold+0x16/0x16 [ 504.587371][T15513] ? kfree_skb+0x38/0x3c0 [ 504.591729][T15513] ? preempt_schedule+0x4b/0x60 [ 504.596747][T15513] ? ___preempt_schedule+0x16/0x20 [ 504.601837][T15513] ? trace_hardirqs_on+0x5e/0x240 [ 504.606844][T15513] ? kfree_skb+0x38/0x3c0 [ 504.611152][T15513] end_report+0x47/0x4f [ 504.615289][T15513] ? kfree_skb+0x38/0x3c0 [ 504.619607][T15513] __kasan_report.cold+0xe/0x41 [ 504.624450][T15513] ? kfree_skb+0x38/0x3c0 [ 504.628758][T15513] kasan_report+0x12/0x20 [ 504.633063][T15513] check_memory_region+0x134/0x1a0 [ 504.638149][T15513] __kasan_check_read+0x11/0x20 [ 504.642983][T15513] kfree_skb+0x38/0x3c0 [ 504.647128][T15513] bcsp_close+0xc7/0x130 [ 504.651351][T15513] hci_uart_tty_close+0x21e/0x280 [ 504.656349][T15513] ? hci_uart_close+0x50/0x50 [ 504.661006][T15513] tty_ldisc_close.isra.0+0x119/0x1a0 [ 504.666357][T15513] tty_ldisc_kill+0x9c/0x160 [ 504.670927][T15513] tty_ldisc_release+0xe9/0x2b0 [ 504.675770][T15513] tty_release_struct+0x1b/0x50 [ 504.680612][T15513] tty_release+0xbcb/0xe90 [ 504.685011][T15513] __fput+0x2ff/0x890 [ 504.688971][T15513] ? put_tty_driver+0x20/0x20 [ 504.693640][T15513] ____fput+0x16/0x20 [ 504.697601][T15513] task_work_run+0x145/0x1c0 [ 504.702349][T15513] exit_to_usermode_loop+0x316/0x380 [ 504.707835][T15513] do_syscall_64+0x65f/0x760 [ 504.712410][T15513] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 504.718285][T15513] RIP: 0033:0x413db1 [ 504.722160][T15513] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 504.741769][T15513] RSP: 002b:00007ffe46a5bf50 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 504.750244][T15513] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000413db1 [ 504.758326][T15513] RDX: 0000001b33420000 RSI: 0000000000001340 RDI: 0000000000000003 [ 504.766299][T15513] RBP: 0000000000000001 R08: 00000000fe747340 R09: 00000000fe747344 [ 504.774255][T15513] R10: 00007ffe46a5c030 R11: 0000000000000293 R12: 000000000075c9a0 [ 504.782220][T15513] R13: 000000000075c9a0 R14: 0000000000760720 R15: 000000000075bfd4 [ 504.791916][T15513] Kernel Offset: disabled [ 504.796260][T15513] Rebooting in 86400 seconds..