[ 49.905102] audit: type=1800 audit(1539865571.942:27): pid=5912 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 49.924688] audit: type=1800 audit(1539865571.942:28): pid=5912 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 51.627448] audit: type=1800 audit(1539865573.672:29): pid=5912 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2432 res=0 [ 51.777529] startpar (5912) used greatest stack depth: 53280 bytes left Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.84' (ECDSA) to the list of known hosts. 2018/10/18 12:26:27 fuzzer started 2018/10/18 12:26:31 dialing manager at 10.128.0.26:36143 2018/10/18 12:26:31 syscalls: 1 2018/10/18 12:26:31 code coverage: enabled 2018/10/18 12:26:31 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/10/18 12:26:31 setuid sandbox: enabled 2018/10/18 12:26:31 namespace sandbox: enabled 2018/10/18 12:26:31 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/18 12:26:31 fault injection: enabled 2018/10/18 12:26:31 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/18 12:26:31 net packed injection: enabled 2018/10/18 12:26:31 net device setup: enabled 12:28:32 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x4, 0x4, 0x6, 0x2}, 0x2c) syzkaller login: [ 191.580232] IPVS: ftp: loaded support on port[0] = 21 [ 193.663519] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.669986] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.678338] device bridge_slave_0 entered promiscuous mode [ 193.802573] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.809206] bridge0: port 2(bridge_slave_1) entered disabled state [ 193.817474] device bridge_slave_1 entered promiscuous mode [ 193.939360] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 194.062949] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 12:28:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmmsg(r0, &(0x7f00000000c0), 0x8000000000000ec, 0xfffffffffffffffe) [ 194.439522] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 194.571457] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 195.168284] IPVS: ftp: loaded support on port[0] = 21 [ 195.527373] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 195.535582] team0: Port device team_slave_0 added [ 195.661118] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 195.669099] team0: Port device team_slave_1 added [ 195.921586] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 195.929532] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.938391] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 196.191312] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 196.198599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 196.207211] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 196.405086] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 196.412735] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.421446] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 196.551445] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 196.559626] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.568515] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.091264] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.097950] bridge0: port 1(bridge_slave_0) entered disabled state [ 198.106335] device bridge_slave_0 entered promiscuous mode [ 198.399651] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.406209] bridge0: port 2(bridge_slave_1) entered disabled state [ 198.414628] device bridge_slave_1 entered promiscuous mode [ 198.666676] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 198.931908] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 199.051841] bridge0: port 2(bridge_slave_1) entered blocking state [ 199.064231] bridge0: port 2(bridge_slave_1) entered forwarding state [ 199.071133] bridge0: port 1(bridge_slave_0) entered blocking state [ 199.077799] bridge0: port 1(bridge_slave_0) entered forwarding state [ 199.086373] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 199.422703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 12:28:41 executing program 2: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000001c0)=ANY=[@ANYBLOB="e0000002ac1414aa0000000002000000000000000000006d"], 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x100000000000025, &(0x7f0000000380)={@multicast2, @local}, 0xc) [ 199.569577] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 199.915183] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 200.247234] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 200.254437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 200.351611] IPVS: ftp: loaded support on port[0] = 21 [ 200.483738] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 200.490950] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 201.303341] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 201.311131] team0: Port device team_slave_0 added [ 201.598020] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 201.606068] team0: Port device team_slave_1 added [ 201.896140] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 201.903384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 201.912246] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 202.169397] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 202.176725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 202.185375] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 202.489672] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 202.498795] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 202.507623] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 202.763120] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 202.770631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 202.779406] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 204.482490] bridge0: port 1(bridge_slave_0) entered blocking state [ 204.488943] bridge0: port 1(bridge_slave_0) entered disabled state [ 204.497272] device bridge_slave_0 entered promiscuous mode [ 204.717078] bridge0: port 2(bridge_slave_1) entered blocking state [ 204.723641] bridge0: port 2(bridge_slave_1) entered disabled state [ 204.731913] device bridge_slave_1 entered promiscuous mode [ 204.986170] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 205.184383] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 205.845723] bridge0: port 2(bridge_slave_1) entered blocking state [ 205.852284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 205.859174] bridge0: port 1(bridge_slave_0) entered blocking state [ 205.865745] bridge0: port 1(bridge_slave_0) entered forwarding state [ 205.874165] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 205.893373] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 206.146825] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 206.434968] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 206.443375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 206.522093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 12:28:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x48f, &(0x7f0000000080)={0x0, @empty, 0x0, 0x0, 'ovf\x00'}, 0x2c) [ 206.722210] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 206.729259] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 207.590257] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 207.598216] team0: Port device team_slave_0 added [ 207.630231] IPVS: ftp: loaded support on port[0] = 21 [ 207.959259] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 207.967274] team0: Port device team_slave_1 added [ 208.311930] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 208.318981] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 208.327604] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 208.589992] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 208.597326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 208.606029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 208.965357] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 208.973142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 208.982106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 209.280449] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 209.288235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 209.297028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 210.721563] 8021q: adding VLAN 0 to HW filter on device bond0 [ 211.849379] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 212.894301] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.900774] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.909051] device bridge_slave_0 entered promiscuous mode [ 212.961845] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.968411] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.975428] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.981959] bridge0: port 1(bridge_slave_0) entered forwarding state [ 212.990540] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 213.057414] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 213.063934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.071912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.216132] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.222773] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.230967] device bridge_slave_1 entered promiscuous mode [ 213.363026] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.612033] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 213.908459] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 214.342368] 8021q: adding VLAN 0 to HW filter on device team0 [ 214.678509] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.938675] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 215.327205] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 215.335629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.616003] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 215.623130] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 12:28:58 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) creat(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f0000000500)=@loop={'/dev/loop', 0x0}, &(0x7f0000000540)='./file0\x00', &(0x7f00000005c0)='ext2\x00', 0x0, 0x0) [ 216.565170] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 216.573157] team0: Port device team_slave_0 added [ 217.049369] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 217.057320] team0: Port device team_slave_1 added [ 217.435491] IPVS: ftp: loaded support on port[0] = 21 [ 217.471598] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 217.480397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 217.489227] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 217.833782] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 217.840813] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 217.849606] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 218.173470] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 218.180999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 218.189950] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 218.564040] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 218.571528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 218.580904] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.508338] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.038150] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 222.399205] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 222.405793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.413681] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 223.171076] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.177663] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.184675] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.191139] bridge0: port 1(bridge_slave_0) entered forwarding state [ 223.199484] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 12:29:05 executing program 0: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af22, &(0x7f0000000080)) 12:29:05 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400002, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000040)={0x6, 0x459ab7351921c488, 0xfffffffffffffffd, 0x400, '\x00', 0x4}) write$evdev(r0, &(0x7f00006f7fe8)=[{{0x0, 0x7530}, 0x1, 0x400000000000048, 0x4000400000002}], 0x18) write$binfmt_elf32(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x18) [ 223.766471] bridge0: port 1(bridge_slave_0) entered blocking state [ 223.774037] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.782324] device bridge_slave_0 entered promiscuous mode [ 223.854577] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 223.922380] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.130904] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.137472] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.145789] device bridge_slave_1 entered promiscuous mode 12:29:06 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x254380, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x460, 0x120, 0x0, 0x238, 0x378, 0x378, 0x378, 0x4, &(0x7f0000000140), {[{{@uncond, 0xf0, 0x120}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0x3ff, 0x8000, 0xe3c4, 0x3}}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x1, 0xfffffffffffffffd}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback, @remote, 0x8, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4b0) perf_event_open(&(0x7f0000000040)={0x2, 0xfffffffffffffea7, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xd, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_sctp(0x2, 0x1, 0x84) r4 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") open(&(0x7f0000000180)='./file0\x00', 0x301000, 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x800000000004, 0x20011, r4, 0x0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000280), 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f00000001c0)=@generic) [ 224.525792] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 224.840857] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 12:29:07 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x204100, 0x0) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@remote, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@ipv4={[], [], @broadcast}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000580)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000000680)=0xe8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000700)={'irlan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000940)={'veth1\x00', 0x0}) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000e40)={@remote, 0x0}, &(0x7f0000000e80)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000ec0)={0x11, 0x0, 0x0}, &(0x7f0000000f00)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000f40)={@mcast2, 0x0}, &(0x7f0000000f80)=0x14) accept4$packet(0xffffffffffffff9c, &(0x7f0000001100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001140)=0x14, 0x800) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000001600)={@broadcast, @broadcast, 0x0}, &(0x7f0000001640)=0xc) getsockname$packet(r0, &(0x7f0000001680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000016c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000001700)={@mcast2, 0x0}, &(0x7f0000001740)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001780)={'vcan0\x00', 0x0}) recvmsg$kcm(r0, &(0x7f0000003e80)={&(0x7f00000017c0)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000001840)=""/245, 0xf5}, {&(0x7f0000001940)=""/115, 0x73}, {&(0x7f00000019c0)}, {&(0x7f0000001a00)=""/209, 0xd1}, {&(0x7f0000001b00)=""/226, 0xe2}, {&(0x7f0000001c00)=""/4096, 0x1000}, {&(0x7f0000002c00)=""/140, 0x8c}, {&(0x7f0000002cc0)=""/38, 0x26}, {&(0x7f0000002d00)=""/4096, 0x1000}], 0x9, &(0x7f0000003dc0)=""/185, 0xb9, 0x101}, 0x10000) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000003ec0)={0x0, @broadcast, @local}, &(0x7f0000003f00)=0xc) r22 = accept4(r3, &(0x7f0000003f80)=@hci={0x1f, 0x0}, &(0x7f0000004000)=0x80, 0x800) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000006700)={&(0x7f0000004100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000006600)=[{&(0x7f0000004180)=""/159, 0x9f}, {&(0x7f0000004240)=""/4096, 0x1000}, {&(0x7f0000005240)=""/47, 0x2f}, {&(0x7f0000005280)=""/169, 0xa9}, {&(0x7f0000005340)=""/4096, 0x1000}, {&(0x7f0000006340)=""/252, 0xfc}, {&(0x7f0000006440)=""/54, 0x36}, {&(0x7f0000006480)=""/115, 0x73}, {&(0x7f0000006500)=""/239, 0xef}], 0x9, &(0x7f00000066c0)=""/61, 0x3d, 0x1}, 0x2043) sendmsg$nl_xfrm(r22, &(0x7f0000000400)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4142820}, 0xc, &(0x7f00000003c0)={&(0x7f0000000740)=@flushsa={0x1bc, 0x1c, 0xb02, 0x70bd29, 0x25dfdbfe, {0x2b}, [@policy={0xac, 0x7, {{@in=@local, @in6=@loopback, 0x4e23, 0x0, 0x4e23, 0x10000, 0xa, 0x20, 0xa0, 0x0, r19, r8}, {0x37, 0x31b, 0x81, 0x1, 0x12, 0x5, 0x800, 0x9}, {0x200, 0x0, 0x6, 0x80}, 0x968e, 0x6e6bb5, 0x2, 0x1, 0x2}}, @lastused={0xc, 0xf, 0x7fff}, @offload={0xc, 0x1c, {r12, 0x2}}, @sa={0xe4, 0x6, {{@in6, @in=@multicast2, 0x4e20, 0x2, 0x4e20, 0x0, 0xa, 0x20, 0x80, 0x29, r17, r1}, {@in=@dev={0xac, 0x14, 0x14, 0x10}, 0x4d6, 0x2b}, @in=@rand_addr=0x4, {0x3b, 0xfff, 0xb4, 0x4, 0x3, 0x3, 0x66, 0xffff}, {0x20, 0x1, 0x9, 0x8}, {0x2, 0x6, 0x9}, 0x70bd27, 0x3506, 0xa, 0x2, 0x7, 0x8}}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x1}, 0x85) sendmsg$TEAM_CMD_NOOP(r4, &(0x7f0000006d80)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000006d40)={&(0x7f0000006740)={0x5fc, r5, 0x8, 0x70bd29, 0x25dfdbfd, {}, [{{0x8, 0x1, r6}, {0x16c, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x10000}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r9}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}, {{0x8, 0x1, r11}, {0x1dc, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r15}}}]}}, {{0x8, 0x1, r16}, {0x138, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4887}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r17}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r18}, {0x80, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8, 0x6, r20}}}]}}, {{0x8, 0x1, r21}, {0x7c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r23}}}]}}, {{0x8, 0x1, r24}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}]}, 0x5fc}, 0x1, 0x0, 0x0, 0x4000080}, 0x40) shutdown(r0, 0x0) 12:29:07 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x4, 0x0) ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f00000000c0)={0x1, 0x0, [{0xfffffffffffffffe}]}) r3 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000100)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000140)=@req={0x3fc}, 0x10) sendmmsg(r3, &(0x7f0000000080), 0x86, 0x0) close(r0) close(r2) getrusage(0x1, &(0x7f0000000000)) [ 225.953511] bond0: Enslaving bond_slave_0 as an active interface with an up link 12:29:08 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000200)={{0x0, 0x0, 0x0, 0xfffffffffffffffc}, "73797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400"}) r1 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x4, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ppoll(&(0x7f0000000000)=[{r1}], 0x1, &(0x7f0000000040)={0x0, 0x1c9c380}, &(0x7f00000001c0), 0x8) [ 226.341960] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 226.402324] input: syz1 as /devices/virtual/input/input5 12:29:08 executing program 5: r0 = socket(0x0, 0x0, 0x3) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000580)={0x0, 0x8}, &(0x7f00000005c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000600)={0x0}, &(0x7f0000000640)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000001f00)={0x2, [0x0, 0x0]}, &(0x7f0000001f40)=0xc) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000002080)={0xff, 0x3ff, 0x8, 0x1f, 0x6, 0x0, 0x2, 0x8000, 0x0}, &(0x7f00000020c0)=0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000002100)={0x0, 0xffffffffffff0cc7}, &(0x7f0000002140)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000002180)={0x80, 0x1, 0x22, 0x4, 0x0}, &(0x7f00000021c0)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f00000038c0)={0x0, 0x86, "686bbd84e9a9ee1813e3af962cc4bd8b8a23da9db54ea10a08cac17830d41858be5ed7a39901b3ec4639d804def33f561e0da39ced68e3282b2fcd8eb42e53856ea1c95fb37e67956f8ea05e84fd28905bea42fc82b9b2d01001972f57a7efb2cc674966fc8f533bfff9903255c8fe7560e1ff2d0319bcd21186eb38aa9a8f1b44f55f391b33"}, &(0x7f0000003980)=0x8e) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000003e80)={0x0, @in={{0x2, 0x4e23, @multicast1}}}, &(0x7f0000003f40)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000003fc0)={0x0, 0x20, &(0x7f0000003f80)=[@in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e23}]}, &(0x7f0000004000)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000005380)=@assoc_id=0x0, &(0x7f00000053c0)=0x4) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000005400)={0x0, 0x101, 0xff03, 0xffff, 0x5, 0xfffffffffffffffa, 0x8000, 0xffffffffffff0001, {0x0, @in6={{0xa, 0x4e22, 0x80000000, @loopback, 0x7ad}}, 0x8, 0x10000, 0x8, 0x10000, 0xfffffffffffffc00}}, &(0x7f00000054c0)=0xb0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000005500)={0x0}, &(0x7f0000005540)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000005a40)={0x0, 0x1, 0x3, [0x0, 0xff0000000000, 0x100]}, &(0x7f0000005a80)=0xe) sendmmsg$inet_sctp(r0, &(0x7f0000005b80)=[{&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x3ff, @remote, 0xdfc}, 0x1c, &(0x7f00000004c0)=[{&(0x7f0000000040)="fe7bdac9529a47a5094e1e248ceb3fdf5bceca5dca8cd72c5d6a1e4519d7", 0x1e}, {&(0x7f0000000080)="241300fe364fc1ad0a643d236865ad87128f7279d232b2ef143628fe21a1b2ed07e94b67bbc3e551fe1340b716f4cbe790b8bbfe30e864ba0e90660191c17bf1d306c514c2903072", 0x48}, {&(0x7f0000000100)="1f18562db80c7e0b16c075945b15d6348710db784d7086ff4ee92efc9af3466eca1cfb28899ee869164bc4ed278fa5512dd142257a6cdb917ee522e0da7e6725ecb955c4c6fbe0dd7769a66d18ac2cbe20c00b8d4297bc5dcc12ff28bca30baccfce54134c6eddb550ede320a69716af07f3e9cca7fb", 0x76}, {&(0x7f0000000180)="d804e566a59c8bb906403247b5bcc91daf8b54080c29532db8aa1814c68305f4799fd4083afb1ef0ae60e9318ee4fb01ad4924112b674f6703d1eed1dde093d8cd674022e6a60a6c626536e09fa123c8cf1d6d2f174f201ccadb8b1ca611cd793057dfc90bcee1cf221bf171196b0889926cfbb582454afb20ee7f5a2ce30a121b005882a709b32b3bceada234a12b8017b79e4e846ff6d6474ba9f8a23b796320809931510e4b5f9ce7097a7b", 0xad}, {&(0x7f0000000240)="731ac176af387fc0707dc244951b78f5a3ceaf1c6821590302f06bcfd5ccfd109403290c2308ff1309643d954998e7cc6c8d5fd01a5a0a83c86fed3dfce699a891d0abfad8898f06e933357d8f6fd782000f6dcef3e8badb68d0d36dca1b93a7010ac5b6046d221c287d09fa0497d6bdd01916ecbb86d113e2155e81c54731f9cb79d91fafe8f4b5cfa647f479bb46f9ec444537ff5bfaa9f0ce5444a4ee0b69dcd0bf5fba36728e855d7da30fbc7d14b0ace0", 0xb3}, {&(0x7f0000000300)="56959daa9af6afe977fda0ef2d8211495f5a1e401a6d4be2bea3d138754ad4a6d2353bff4a4e248aad97ea485ec2a1ed238ac9e517d1b5359f62d0d864a8b2c1925e3cf4d2bc8714b44c95d26fad67790c6c004fd41164c7", 0x58}, {&(0x7f0000000380)="586bbf8aefef96b53b6452fd501aa9dd0889bdadce22ebc57ee13fd59be0bfa1c575f58c9a271869361c491354aea74201e975a64ee21b5e41bd5ec3fc3583d78d6b9e414653ab0212bcd465f9862346ee37fc7345158c1e8d4a40485b9979cae2e5441d2a5adb71ec4304dae10f40633e32c31979a691", 0x77}, {&(0x7f0000000400)="f53d221443f9f3357c2a5cb8c209e3f2b5d12e0c33dc0deadd4dae63ee93bc754f8e5b9ce36dc23665fb45ef79cfb7a53360d9d92da005b4ecbcd7860e3fb5be617ab4ddf09c74f7687d2f3a0dbb0871a85146e36bedf54a", 0x58}, {&(0x7f0000000480)="0ed60729d1272eb8637afe2b6a4469ab5985f0ffc6b673d8fd6f803e077cf8d3de5d39c7", 0x24}], 0x9, &(0x7f0000000680)=[@sndrcv={0x30, 0x84, 0x1, {0x7, 0x800, 0x1, 0x0, 0x1ff, 0x1, 0x8, 0x80000000, r1}}, @dstaddrv4={0x18, 0x84, 0x7, @remote}, @sndrcv={0x30, 0x84, 0x1, {0x3, 0x10001, 0x8200, 0x4, 0xeaeb, 0x0, 0xaa, 0xb80f, r2}}, @dstaddrv4={0x18, 0x84, 0x7, @remote}, @dstaddrv6={0x20, 0x84, 0x8, @remote}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x1}}, @dstaddrv4={0x18, 0x84, 0x7, @loopback}], 0xf8, 0x4040000}, {&(0x7f0000000780)=@in={0x2, 0x4e23, @loopback}, 0x10, &(0x7f0000000c40)=[{&(0x7f00000007c0)="b00c424adbdec50889ccbe6729406a22029eee33783bd21e6118f6d9b1a9ca3696aa46b6f270738eeb68249d3683a8abaea8697693a75072e409b302fceb64973fd0b0322d49fcacceffa45b6e76163a21404bbe8a257bdb3adee36da3d572f1edae1b60d18bd44f697b07d4bec06245522ed4d1f7aec5daa3676fa25f0cd03a1122e723bde394d80a260ecf83ba1ce49f4e7e08f82c1eeaebc343d144d54b8064edd0dbe8c6bcf7e1", 0xa9}, {&(0x7f0000000880)="cfb6d338d94da297899ab3905faeced67920ff2e8c260109588e0bc557bcfe8d1754a20987cd327bb2b76e40b80e965ec832bbed050d", 0x36}, {&(0x7f00000008c0)="7ba37535a7995df895e14b69f17eb638b59aff3f5bb0be6a7151115aa13380432e54596565b4b213c67baacdf6fa79474e23db94a85909a8729b049bcc80d37896652cf9d30439dd8c8bda76fae8797a0ce919200ad87d9274a6bdeea89b9ff2be030934eeeda5b7ce1970ca1cdd9a107af8609b62bb1aabfcd1b31d8f028223856a6b540a9689a003ae4c1e8eb4d04d8d635a5ea931c63538753f35efa2cb3975ddffe75e70e14bb152b3a6fe1732c36f08a3ae1150e0f7b2727f5e9e79e94d62d87870dbc30987b8ae49efe42bd857e19a9a541b7575b09e0b611d7dc23f1204e3fcbfe7a08fc4f6", 0xe9}, {&(0x7f00000009c0)="3b9910f75d62f6d5dcf1941f4d5c063f3003bdac7918689e7381b674a934d8e57b4c07ed4dfe14e499bbc91c7d23991b91cdb1f1bca7487e42c36df77dbc01baf83a379b19ef5b1d8d290b0402a46bd4bfeb0519651c6cf41131b62ab5b7073318c06fdcc5b3a28f3a8186c67b4e3a5644bdf7c59730e689211785d36e4b7163034d89adf87866ab2a2c4d27dc78c97c0d67b879d683822c5ac9e55a161fd4520cc27bbdf6a3cc834be348326b3944f66545a640c01b4fc38346684adee424e89f6536728ae7c2089b606cccaf4992845631447bc01cd7a2536dbe560d", 0xdd}, {&(0x7f0000000ac0)="aa5c030ec83e1257544966dffaa99cf70a45fc642c3003165cef343612e35d8ff24fbaedd7df87642f8aff9b94319f72c55e57f48c366c1ce4ab744e3b31fc54be39fceacb64042be144c68cc02998c5b65735cea945dfc248cf8a80efb6fce6bd29564ba44d06f64d183d8df7ac4828bc0192c5a6df46171c1b4160a70c2b38063a9ebd88a5d47a8a70fae8e6a2bd15270ba9ea803ae94a29977a1ca8c7b82bd4fbf6ac6097704139e082f72580a613968390b80251decb60dc3f14a38645c0", 0xc0}, {&(0x7f0000000b80)="079cb1182a85637257f61bbaa0d2df3a1222229d9f8784c1d4be46b03fdfdebfb22ada3b599b00d9dcf09bd2cc843f57f576931cb0f540183be61f14af62f141bf7420b7395e6d18bb27c10a23c32c80897934931deedde96a8d46c82aabdb928ac8868eac4722256dac52184d32bd892fcbd6c7e5d411d5b0ee48d79d8af722c7fc2fe47e6cc4a326c1bb909bcea7875ec244d4dfefebcc7f3b09187df18eae1669449afb37be7f288b51d47aa9", 0xae}], 0x6, &(0x7f0000000cc0)=[@authinfo={0x18, 0x84, 0x6, {0x1000100}}], 0x18, 0x20000000}, {&(0x7f0000000d00)=@in6={0xa, 0x4e23, 0x7fff, @loopback, 0x3}, 0x1c, &(0x7f0000001ec0)=[{&(0x7f0000000d40)="e5a31cbe8838622ff9f7e8951e8305f2b3f73f41e249f885ecb354a816b205a6d7ffb3263a9e4dce1eaaa75e6f6bf56be142b80f5b04ac7da1142308a6295b3c8e", 0x41}, {&(0x7f0000000dc0)="4fd36142bcffc6c5b2d8210e4b3c23f89df4fcd7a457e311635d7121d4482861fed51a0dec506edc3f46dd4368f4b3b09c21161a6b1742f64c110343c82fdafb1316e53ee9762d46b7de01361055a4d23d2d70521c53a6174a11f3af6d0351d03bb8b2693013178ddf624641dd85f981cc2ecece73e2e4d4d137eb2b1ab113557b3af7d1b64f9cd59b292855cac728d70123c3eef3da466c5af6ea6cf4920ce9e0c6ca63ea133ab6053d7895797164bbba4fe219c1852695b998cf7dff75c1ba02099639aeb27cda1c258dc3cda5ccb5843e9097fea23dc85767539073a2ae3c28a0724fd191015b9f64cb4234ceacfc4ef7a0e093c489ee768b8636cc", 0xfd}, {&(0x7f0000000ec0)="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", 0x1000}], 0x3, &(0x7f0000001f80)=[@dstaddrv6={0x20, 0x84, 0x8, @remote}, @init={0x18, 0x84, 0x0, {0x2944, 0x5, 0xff, 0x8}}, @sndrcv={0x30, 0x84, 0x1, {0x7, 0x4, 0x8, 0x800, 0x8, 0x8, 0x7fff, 0x5, r3}}], 0x68, 0x40800}, {&(0x7f0000002000)=@in6={0xa, 0x4e20, 0x2, @dev={0xfe, 0x80, [], 0x1e}, 0x9}, 0x1c, &(0x7f0000002040), 0x0, &(0x7f0000002200)=[@dstaddrv4={0x18, 0x84, 0x7, @loopback}, @authinfo={0x18, 0x84, 0x6, {0x7}}, @sndrcv={0x30, 0x84, 0x1, {0x8, 0xd81e, 0x1, 0x12f4, 0x0, 0x10000, 0x0, 0x2, r4}}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @multicast2}}, @sndrcv={0x30, 0x84, 0x1, {0x3, 0x7fff, 0x2, 0x4, 0x0, 0xc5f, 0x8001, 0x2, r5}}, @sndrcv={0x30, 0x84, 0x1, {0x7, 0x5, 0x208, 0x305, 0x7fff, 0x9, 0x5, 0x8, r6}}], 0xe0, 0x40000}, {&(0x7f0000002300)=@in={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f0000003840)=[{&(0x7f0000002340)="78c2cfab5b83cfd4f1c46ae467ca9c2ca45b201fa67c5bb87b370bb0ec15cd05e76a11fddd1f5ca6db85e0902c5ff7cb8c644fe9cfd932cbd8a39821dc171e8b47fe2f6807eaa71f863eb04517cba2f66be11c503a51aba5a86e12cfcab98fb2448024630deab3644b23d5e05188c83be57ed190cd438add3c041ae4034d705b9ebdb9f2951ba7ffea5103e6cb233f0f1dbe87f5979c938579ea871826567b010915c7760d3907c56ab4219b15150d909178e7f090ad1dc61c35aea9ea8a741d9508011cb336dda7ac683a534af05282fc4b23f9f5275a02daefe5da6f6b14da474b39cc848118073dd1a1127d95af3a189f0f7246", 0xf5}, {&(0x7f0000002440)="ad9c032c96db2cdded7c0a2613797195f110d0049773398e06a7ab2873f99f3506b65de76fbc5982627a00ee650cff3f73fce9c3374469283e7d9ea16555de6c67b1da6b3c6c9777108834c51a85a5de97c03f3fd111828879324507e3d9b92776cbc7a2af840488fbf6f98add9c416c5e48ecb8b1b40ea393b35a08602133ffe5d0fb68b92e79f42f056607bcef3f8e605f5de3a98ddc71bde87c2774630527b9cab98cbffaa708aaf1189d425136876276", 0xb2}, {&(0x7f0000002500)="03fd11fab94fa8", 0x7}, {&(0x7f0000002540)="7d96acd61b4b2472422f2d9e8fa9052f0bc794e0fe4bbc3e932c4324eec5d1e29bec6cad458f0fddd80621a96730b017febe3411e54fbfa14e73116203c10e840f84e84770cb8dac87bcc161b5f64c85c72ed50d1bee4784aca04069d3e51c81e6e7ffc308d8f28e73aea73631aa7c4afdf538b5e69c71ce08585a1a75882a2f4fa6817f36a156fbdc71c2c08e552d7013466cd1b62f00f141a1cb901ac0c95ace2bdd0c4e4da307fa4b49dea08ab3adabebe0af2f6c4bb0a9e31c159f063955bda46af9d8cd7ebaf60da4b13728bdc70f85c66128c8b1fa05587fef36e0efbb1732f98139fbc818246fed5083121c838c666a0fd15862", 0xf7}, {&(0x7f0000002640)="c74152efeef7def67445dbcc97b641911e1d5c9264a043a16c8d28a3135f57c000be6bd233e36b0fe278e44cbb18dc50e636ba096cd0cdecf0537968ce1ffb968d174104c33691e8464d373ccac0ab643a886f3cc8d3eec3a5845c86d81e3dffa4b1f1631412a2fcdd7ef7a663641ab4a25d1d09c2c32d4e22520ef92a748bbed2a02c59057e24ecdb132552b04c155491279ff7a0316c214794fccc5191137c803506ee0ee01db0499967925cdedebeabf2a494325f4bdefbe2a3c187310da1f67152992ae8b46149c71eebc6ce1223e30b7bac0678c9ba8d2d301c37a7f873ac45168d06292ec15f32", 0xea}, {&(0x7f0000002740)="290b8e8d440abb86ce52d87138524a7d509257b5f4345ccb44f9572d0cbf555debed09e4511fef315b5527e22cf78fda3a49f4ec277e7ec66486139dd546571c078f5d27087a5b12c244cb6cc62271292dd6c4cd0eab1d0f948a97a67d1273", 0x5f}, {&(0x7f00000027c0)="ecaf2b59923a4b9807f85a543b39dcba65b3e238ac34466a9b9ac0cf80f81b4d6b9e335bf7921fda37dddbcab4e4f6915ed99122eeec5eb09afc67e11ed6027aad683ad0dd71033d59fec162e4f3ffc027b694e9ae7bafb65569b85f8a78d84ed5dd362c5373d60ff2bd6488ae17087f1f277fd7c01518474aa103ba9650fae0b4d8281ccee427deec17306390bace266d3e5993a6dc561f4b39c4cf86181419bb343b9b43fd1a709b9215619e86a1cad61ea805d31654f930e5c086f652779cdb36557fe80a7730d9065d790a0606cf091e84575845efffc020bbfa7649d047eda5234f3b46d5e94d75c59df75222600e4d5ee96a172af53d4da6c1ea8a4d9dc3155020c7a19bfaf4a778d5756522c1912e011a488a18410c4dd327ebf17b6ed98210759d4d77e7d628c364e2e050dc4e290a068fdafe2fbdb0c12886ccc1477894939a8fbfb94ba0ed76cfb03dd19908c4aa3e941302eb84a636fd2da59e63fbaf26d1b1816a735cd9c53e38a8b6d8f387cf99406616d2ec71b50aeb1331bd217c45899a844367699caffde50bdbb9b2550481214d0814ba003c8214ddd023b894de5033d7487767df369120182c9099f03b29aa241bcab935f9a8be7c645f76c9c23c37336132f51289820d275f19924d88efa9d1bed979a125493fd8182ab21499315dd10faa8ded50d8311d4244f433bbb156647596487f125afd205db0ed53571a6f3869036675a0f13f3b1ca452b84aadec0c9af2280166cd3260522ba6e24df14ca3e03f2439446302263a705a00018e3c01d38b84ab6f1a81ea70ad0357a46518521ec99c83d23251b3a28614873fb1aa244a50f11d00eadf8707be49341e3d79e0ab0ae4defb7137095f0317dee8d206f8eb050d1da9463753f5227626e2c62c60414dafc83b69efe1a58f96b29f3475f834dd63d07ecdd3e8858822ec26e1f3248b62127b622176149ef8da4c7e8ccbe28e9ee01f3fc10af866016dd01d8f9d80330d881ebda8bfc6fb8487f5a083524f7aacd3f9cd1fd2080814f1ba6957d4d1b0abf0aa05b6040eff86680ca73f0db3f15ae452bcd7f04536fd792fcfffae70d410285ee1b1e09eeb34cf96582b30c3319ae827fb9643b7d7f8daa83733b8633c74f9867b70d338305b4a2a3aa6373ba3a05fdf34baadd36e28167e4f3cd411ea20004a48676da44a7efb61400f7d42475c164245bdbd9f51659c65a80652461f3ff769f2764f024998ed4a4f66c79122b757b806e763b2783886275386207ee0c22dd1818b26872f444c802d72a12a90fefd70f0c135b1281e242a4d2ef32e43d5cbd9a02e0ba5828e4ccc2bbaf5f5100f08497890c6157799a8001e2f0d3556ea77a65e7769c0d15a883c695df5b3521f7e3e29a8bcf1841d01cc7e3a0795b7e34983f6b22aaec1ba6af63c8ba4dce56aab2d2d1a94d531b71b465cda17562b583a1be4ddef1cd6d0eeb4587923c93b8e4622069f2e45fe62fd91d38f5e91f526ac71a909bea3d069456398e104763db6161fd0ba49ec63e36fe45b977846e5308eb0b866d8ef17625cd22fa6a14aa833a013a54687ca5438d1527bb047e645aed1b63385f9da43a41de7129412ec3848405e3725d7a12def7b3a3c9b09a7d146f19b1b080d9e22d23987b68f87f309656d9cec02769635339bf0e645c4bff32d82cfa34275d8383ca563dbf8523e7f35f2cbc380b51264cbc26a09a49aa000f4ee04bab09a26188e7790d32428f93a640720ec95cb5fe347806b0396be370002e7b9a7198a62811ad0a000f3323c731bb4c751c99ab037e3a790d82fb0303ff7e60e4ea32e32cd0b0499d228bda6f40c787adceed6561d43a00b43f5f956d7c4ad03cbc66529ca85579d1425dfd83ec91f79917c11c6b7c224afba6cb3b5212d601bd5d4c94973cbef1724684b69a1c9834b87a8ac0eed91912bd1de16765ad19281c586e573ff24cf2a7dab7379812ed5cd4d773cd0d21e4d551acbf84f6132cebbcf0b5d07fc7819b5e173d6ac4731262556c9db7cc6385089c48aa172140aafb60459a7c0153095dcff63880c1b0a70c88d61e1c73dd5a14d6a2e3e717d769fe5411382ffab511611d1d036bc5857adf4eb1e62125f9fb6ca17f3a208bc683589ac131cfba32fc8aedda4c04f35fd73d87bddcbb280a5451ecef42276113ef454f55c6f1d3f84b0d24acd25c04048405f9e15b8a6cb750c22c9e05d14906cb2d6f245afa7b0a5800a6939a94c765502d7ac87b7ea47cb51d6d81cbb96bc874c152cbc2ad38121b9603b5f499820cd5b8d3569a9fa008e124bf23cbe77c1dce4672876c482dfdb45eaa4f5a85205a1f39920f3cbe3d5fcb6a2b9dc3d699f2ea07ed70b1a0d3a1881e5371f41350577519f7619f8c1ea6c5c744d59babcddd5e1de8b2eb8f3de220a802f65d54aa6b51e54fd8c23fbf9e782118c474acebaedc1a44d863b256b5bbcb4e27d1b77babdd5d60a18b4b0ee278c52adda77080349f3c9fdf9bc85e498266c5a9ee7ac6d2905218c22aa522f3f1faef4a264b47cb8cd171af1b504ef260821162132a1ab040ab8d4aa6fd3e802efb976e56e25b52e4cfb0f393bd1354206df47f1da9878988d9f6bbda492ee311183a02770a94f5e0faaf136e93804176b52ca0a582fb1704e9ddfc76d62b628b2928feb8f889006dca931649c77060527e473afe2b3833956c056fecde2c680e689e09e4c7f16b3a5be5f861d96682d9acac899b47c33bfa831fbe9d2d2d05ec83b52ead46363669327743f626b8cd98381dd98c35c8661206987383da584704ddc5e46db2f1b3836e3dae2ff2320c81100bc00c0cbfd90bb0e1b8a560d43b8b0d77fdbcc7ca98879a4e2681fb12808dc6dc68487bf39296f4992d87582bd3521ebf7fc10fcb71de0097a33e3c082c41c1f117cae80bfec805b78fcb8f3d99174724f5493af184ae94ccc56a91a24fe13c08aaca2c67c6223381a724b9a70eb0d1dd3eaf99601ad213ab288b948c1b6dfee286176a6a7c2368b87bde96add4a353a46ec816a6da6c444fa4ee4ace667fafc5fb5abcfd0d1667bbfe90a67ec1228f0c5d1c472203510480606a57d88468a50c289eac3d5198a514616706461ba0372e7833071037fd5d4ee25bc53f489bf039b9b83f431bef4c9911e3a63f99f2475bd9c0f85386bc949df4cba1c81c95af2d20699e1d10fd157d7a6c5d51fd66bcbdcfa6960f99d0e931a35979126c59ee8f7c111d2f4fb28f0bdda290a1d857d29c7814064951b08fb774acb54a5c8b55150cc47b7b1d671dd959e2edda705d5a9675b4b696e8090cde1b321234f954657ef6acb4d6ded21f46580079842b051c19a02b4a510702b2031d6f73032975768bbbb9767c006cead5d5ddbe888e165d3918c15f35e75d9517c3dc1d891e66b4c5b788d2c6e785f99ef6921cdaed52170e1cdda61fe1dcd75b4faba40a9f3f170e29f693c0aaed47c06aa9894ae99ca2b7733333921e5c37c88304f757ccd0ccd7d40b2e2e1521db49c5b87737ba61c4fef2a2413fb0d68252d2d954068218398259f5093bf8e2c1f47ac2e809c68533a901f86af9476ce30def43c2d02b9a1336591769c1fa1cf0a7cec0868f0ef01f0d3cb24743887239c301f46b6e3a1065ac28addc7c6b6848f33b4f050c4f3a514972cfc63efe8b94cbf95c14fa6b90692a9272749f9298fac5738c165dc006dc532bce674d6e791035c85312fa01e1e174522c1eecf80b9bdf9a759b56554824e65ccb74e84a11049e0411d5daca4017650400cd5dfded0524d35319a690558bba0ef28a67758c52bf0988445cbc295ab1d849457c32155e7e7ff942b2bb710c55adb366be92ce88705bff35a4b8e88f28ceed9dafc58714a39719a2cc0b10752bafeaa2089a696170380086eda75a37b049afaf5e46188270f3895825290124969e91270c8cfd73225ed2ab6c727b816c47ae25cc91fc714474f589ee8052c88b695027a1cf475be30383ffcf2aff29c8c56c055332d50b4ba6a8340550716c3f7d20f15328fff64dbeed1721a1ee5771b300dcd72c04090f3856ae1251185e38d138720e608bcaae2efcae82a7ae86487448edb70fed84fde868f4fb51d47e5988587560ad77c3108c5fbfe7e1ba5d21bac846925f57ea6e80f1ec563824e68d29ca97a5570abb1066f588030b05d48256c3c9693984c2bacf731c6f61d8330add229a5c7ee4287bddf30c7c2831fcc80f243f671b8d945e4e0a87b3bb062197fa2e13750d5a9ed88fb4a2b122cfd63cb482b1899e83f8581244db743fbe68549defbf812b2d73c21c9783e754400f4e9d3251d1e9d4bddddbe82d95092523049f7b403418c9b4f4496c5d46bf4d3a9c86978e4cc3aa91219b7abbba30efee1c7b169bc639b527ee24fabeb61d9a03c634765cea45eaf4711096f6eda6d597596a2e0a14341f11e8530b36c9bc645ea7404b0a7c2b6123997ea57bad72b6abb30acb8c762939b086e243c72f0bc780970764d4d0c8f67b0e6f915bff2232f3dff170f7352de423e3ba95ec57e6a14f790fae5a3a4e51c03eac7d434809d7590040ce1137d259ca8b0dd27d2e41434c9526fc1f92581ac3b2e1794951c44d284993841c7978202b986023d55203d27b3598b77c0152028f722b995b3316be79e52f4eea3705e14301e056a197ad9a60409de35bf1a6899bf3cb6f4a4f6850a5bd01f3e0f490724509dd018ce67d884df1e22d1b05cb2d7d5c1dfc3858673468da8738a018a6352ac9222268530468a037cc1a64e1eebc361b677d2fd7c7422092575b82d9e7b91d4343bc0369593831df079fea9c10b56396eddce9b72c74ffc80777ecc9c37744271d7e7496acac8f711f102ecf4b3485573f165917a06806fdb808b7fdc0cf4429eb76b2fded79b4b6e0ce48234926f35c3a58a83d7044da10a171accac6190fef2b4afffae6901fdd493e7511155747b2e402cdcef2cfacd4fd9c6cbd1a1b2b4002a1512b1c117ed311da166bd1628eac8a5c7a1d76ea5fa4f0306cd31c1d22e677b3ac5648eb30d0a8e8a823bbd89c0274fcb6136fe0954d73383fdae5cef579e6c7eb72715528a4d1315b0c7224c0931464c547ecaf10482ff59218605a05fd00b0bd5b284d612d6d48c23e9c9e8d3d1e0da698117cbd3e278b9b900f528e52b2fb647427d680bdc4b92d6caea596e92b71510c8e8c3cc14a47d40365d5a9bcf33b23a8f45711865f85b4b07454a8efa1c928b5769ab8fa87bad658847312aa51eddc66a1b42e3b7414f2fde8b53054c0d25469c374d32ed4eae28c326b1f5657711254a1ceec2a5babedc82bf9a27e9496e872a192431a98d5b4ae4ac5ee3a06bb31d9868366b439c27d25b385198ae15e90736e1ff16044090f345ff546393266b460bec6635f435a7abb34dc5bcf53bb0bb63d91fb819eba108a8d8653a9e4e21b0756bc75bc4982ca97e5a971e6e32029afbfa9aebc28edaac32cadbd30b6f9b6d91a67d4b8ffac06f42aefdc31966bf3d4199222806c477fd82fef906d83cfa5442271cd4b21838d3219ab4649b20d4accd4cd9382a1b5adcddef3bf73fab857de94dc7e1efe655d9f30d331c7a92b939aed6d31a8ceff9e5ae59f2dcb020a2c3d1e16c28504fc9cb504ba9e8a2771c593b8d2468596f6eeeab6f6087410d44bad920543eabebf87033195f1fd3341284ed9a186f3924875a14f6020cfed093d951f2113623ab7950fd2c02d1d505fc2e2418d812ebcf1b04de4f7bf0501944c8dfd12c6d23e9c3c586b53418091eaa424a58", 0x1000}, {&(0x7f00000037c0)="0f01530c434cb771a53a5f2464d7f34c013cb35e1d53947acb2b11dc703916358a64fe4b300f97498445b35c13e7cb0964f497c25ab4a479d21072dc37a1cd4e96c7f23114dc643e542c23ccf5", 0x4d}], 0x8, &(0x7f00000039c0)=[@dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @init={0x18, 0x84, 0x0, {0x0, 0x3f, 0x100000001, 0x1}}, @sndinfo={0x20, 0x84, 0x2, {0x80000000, 0x1, 0x40, 0xfffffffffffffff8, r7}}], 0x58, 0x4000800}, {&(0x7f0000003a40)=@in6={0xa, 0x4e23, 0x9, @local, 0x1f}, 0x1c, &(0x7f0000003b80)=[{&(0x7f0000003a80)="b25c5dbf369cc9bdad338c7b955b2aec0c9a58399717be48cbe4191c5e426d9602f5417b3ff6d1d2a0ee0f8ffdebadc0185999ef8b20465c707853139c1aa7408b34df9340c7306085d3b4d3f65d0b9ab527edfdecdafe03dbd8f991abc525e143a2b84a89dc57876ae6c3a905e0adef6e651595e1a99d0401b7e0cc4b", 0x7d}, {&(0x7f0000003b00)="66d9de2a6475ddccf5ec058babb0dcc41c0ec8242913fc1d9ec4d4075b6a7edc4e38011e3c00aa2fc10dbe1d789d793f6e617b1de7933b351ecb532dccae25d2087c9c614d4117f91e0c0c07f46dcf55fec229aa69f0b997d542303902536baf05b54344a04a587d", 0x68}], 0x2, 0x0, 0x0, 0x80}, {&(0x7f0000003bc0)=@in={0x2, 0x4e23, @rand_addr=0x7ff}, 0x10, &(0x7f0000003e40)=[{&(0x7f0000003c00)="4a4e628dd6f8fc5b0cdd5224c74cce603c0eb28d19d7f2fb6b4dc1c94ed6cf5fdfefcc30c76776266375ecb2baa503494ebe8cad4378da4d34f4d4defac2550df70cdfb5c0279b8a3084d531ddcaef322ac4505f79e4cb8710e7de2914ffaabfaf58a07f77d6eb4bd5c84c9274780b94ea5f664196dc9609909eab0d6480b519d0a1a0cbf4a89fe83318c7e97a9e7cbf0e3c56c8aee6cde8c7ab83d72904e730c74e217f39a99ec91be2adb45f255613e0b2aa04d1b529787ca16146675781452bb41357f9c1a8ee2eca82fdc6dc11465dda7e162f51dd6ae4aa8e6f824144fb01af47e4f9eef450d3d6efbb4fd730e410d25579ab023d44", 0xf8}, {&(0x7f0000003d00)="f610eac7400760ff12dcf9617ffb7ada43328a3cfc9079a50a7d89c564a573d9e178024cc8f06e647a8b8f37d3fa9850da8521e7564b179966c0e3ab6b869c9020dd", 0x42}, {&(0x7f0000003d80)="5df529c1af23a540c67e8b555fa20f766db30dd3b4ee106004425f53e43a27ae69c78e0d0cad70471c6b11cb35ae57e456c717e94a5cef08aa1735e2946ab987d4e03139e184eb26067b4c6c26be19a4a4f0e7fd3b6dfcb3844dc00875af7d1000d66db64e819aa0df25b61d8c50f1e51da24d255b12a22f74e0088ff802dea19dbd09326fb779", 0x87}], 0x3, &(0x7f0000004040)=[@init={0x18, 0x84, 0x0, {0x4c0, 0xe2, 0x1, 0xffffffff}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x3}}, @sndinfo={0x20, 0x84, 0x2, {0xd8, 0x8, 0x0, 0x4, r8}}, @dstaddrv6={0x20, 0x84, 0x8, @mcast2}, @sndrcv={0x30, 0x84, 0x1, {0x3, 0x0, 0x8000, 0x8, 0xffffffffffff9f54, 0x8, 0x400, 0xfffffffffffffbff, r9}}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @dstaddrv6={0x20, 0x84, 0x8, @remote}], 0xd8, 0x80}, {&(0x7f0000004140)=@in6={0xa, 0x4e20, 0x7, @dev={0xfe, 0x80, [], 0x1f}, 0x7}, 0x1c, &(0x7f0000005340)=[{&(0x7f0000004180)="23f8df50c083537d97caf08897b40745608e74b2bbd2201adb5a472f7bcb11b184a5a824d7f72c375a7e9ed264e1a8d45035e79b1909aa87bd4ecb1c370fa13dbe21c5fb475e78f8c1737c070496c80104fe9f0e06c10971296ab3d16ae73db7c7a047c0f898d48e010fb788df5ec978029b6531d8051e149a6cb05673c2d1b74695e40e2187dede59f3b4f0619bba02cc164e3a64323efc1e4c72d9e6b6929a3bf295f6d9967b59cea766895df58478c8e7c1f006f47a77e782c57025362da578c521e9441e9447c50953d7102075ff4c0f1b", 0xd3}, {&(0x7f0000004280)="eb6f3ef455d040d036f40085858b29c4d89e739430cfbe562ad269dabf6d9115ef8f1637df29ec7a8bd22197df371cd2a275e4b8ba81895c594d6c89b8c2fc2c09ef0db7a7b81b1e11fd6f223e9858fc999ea630bae93ef238c5be575a973537fc6f97ad62d8fa134b6f635e42940c60251699888479741b666855a76c21ea4f088f2da407e7c18b6ba9323edf24fa2cc885be969071eb0e8c2d9fc4dcb4bcab1d214f0a8466", 0xa6}, {&(0x7f0000004340)="9fe5b9eae7cc79e443cab7f9014858df73056bf0f7b151fbbfe6e8ebb6ce0239780cfe8605b437b09b4b6f014046fddd67ed534c45974fd0a096b80a054499a1572f13f2dd476f0b0ffe390d567a8e5a4350dd49dfab40c9d29b9013dbb16041877bd04ad4dbcd63f17ac059c73725f8d19035b62dd8b810833d20e0dff65ca0fc63080449035d6e02d245181955e2ac6dfa1de7adf78da9f079e498f5e5b553efbc83bf1b44da280735f23038e6af2083a601e982757b95ea9cebb1148497b60906a2230ce1517452d7be4e15735ed167c40b43413ce9f4034bf92a8988aaef896134f72da53dcc9f591e2c9f9bc8d1cb37a7f19bf71a47a3df05c60b3cfcc010d347e8b3ace9e377a0eddde947aec4afd5cc5403f07700a19295d43010e9969d95ca6737552949bc3263eff04d97033e76ac0d8cc7bda9d905fe406b2784b4a408341344de6bddd2af4d40ea640e11a3f39545cbe26583a57baf8f80184b46a1d835eb6b66891f23c54f8175766b620e9eca0bae0619ca813ded9a407dc9c033c4252b90c35412de2aa4aa3dd57bd568e324f80a3e7dd4558497b53d4f838825331b062ccb8bd46ef9cdbca9165bb59fffd79c32c22f4a66fc8ac370081da420092c8d12464e19087ecdbb6f6baf6920e4c60fb421d1e18b8ab7e73a90ff30f3ffa3425f14df5ed9bb057ab3e6e2f85b1319f6f459ae2dda5701d648beacc640ee753f499791b8edd49aef04fd75c17f682dde1eeba8587b2503c5d7fc931e280d17606164158e9a2a160f484c7652eb4501ec52865db87760394bb07bb940367d56d107b98f43687096702c7ab4b25368e5e9d0f0fc8d2cdc34b346dac3adf65cdd7c1244c6a94e5d75b0d7d9f8bf4b0dc82c9cbc6148060bb1065078b0e36e0c24cfbfe6b6b515f03f2ee13d5b31ad87106bc3df94f4a89635a9efd676d2057bd6023f7a498dd38f92ee2fcbaac6d9027cfbb16d955e6fff0da86d0957e2317049ab78002520c5275651fa9601ee3456c05965ca56d157295fadb1cc0babcd29e80f131290d4b4d0a2d13d1d3c6d2b10e65139edbdcfd8be54fb606939d2b5dfd2353bce81b663cd8739bdf8de306d41d7f8b5c52d7b55d885ae739bb47fc8218b39c07060fb303973183936cefbe23350599d4a5918d99354a098f33b00b31f3d2e919053fd12968dd9e6794c8578dd6ef1c8220033226d36a2ac283ac4859b519896b9d3742e1ab91dfbf59f7382c3b1e16c8945683be432a5c1c16f965416740082c6061e7a6afba254e77cee5a1b1ab1977c9090bb1331aa5665f1ff39e29b554a2ebc67a4f6d71f0efde81ac69ac0a2e4a5feef09831e13077b114c9e0eeee7613b8db824bf80821fd86c6581fb7bf8b292caa75eb2c196cfc35635b35a81501db9dd35fbfbd39d822ca1738ff221f34d91e7e6594c86e021c0a561a04616131cc5c12cc8a57afd11bb1ed8d18d7b05f76b19e8b3ed90f742db9cff3a99ceea3e04de35fa2393f5192205d5638e31405b9151eb86e721aea83967c1fa8675b06d7ca932d4df0e08867aec9713cd16318740bd2d54146dd69893408d73ed1db8895adaee07bd5d3ba022eab92cb3796f843f124f9931df911a8f13c7809a2413458217df9252f37bf238135adb5503c687e07e7d7fb4b5ac1d0d28b26bb0ec216a26bff90051835d240a1745681ecc6b4546bce944d8a91efad1abdf77a316d2e7ab4f4c4c7e34f6ecff3a5c59673b8ba4c38493c4d5c6d1facfbcdb72a5cb3ade6847df989de0a2d32af404bcc4c5442fb2ae85cb31a5c374f9ffa6ee66f4616d971ebb75ec3ab5abcb867f631d42c881b223312bd64ee707699e50481a39f4051d8cde0f093f8a8d44c9d055faf334b595d5365f5ad045c225ced3fe4c9e4452ec6606bb29b85ecbe5a692d1e1d7af9d2b4b81f028da6e72bf4ca176e602510009f721fadc4e2ace76c4adcf4ae5d27db6d630c78d6cd0d655a1b2dbb8ed3adfe43b42880d4a19c7e88af6fad0f3c15e9e9bf173e7f28c6e2e38c67919849556dbdd91140c8e9c266a92a08fdaa1b4436b5ae26737f430865fce9de1b9b7622519baea03fdf6a5139a452da22985835c2c138b317e24f5b75c958f73ce67bd51aae1fffdbf771ab976be16f68d5662b76ff802f3c9483608c52a2ee657190f73ec19537ba351b3c05c13c641af09d9076c86273e94ff4131bc18248e5205a3040e6a47f1ac596dc073cf1f4bc412eb86d0c4eb90d19f0f4ee4797d2bd74a10ee92cad13132f7537264985ec5203fecd539d3bf524209d91f714646d9e8f4f4745e5714276b26ec2a91981d2ef2ebf9bc19f1aa0e8bd490056a76fe479e3424d65becd1535a8385f3dc2a05410cf848cb31cfc129a9bbf3522faa857c7080603e07d16fd081f078065ac54b93904b0cd5140832a681e2263066f8058dad922b0e1e5962a0c47295537018fb505b293ba23768531be38f10342762c5c8c63cca05740ca6dd25f9162dcbb671e47694ef9ed02860b4b26c9528e12929c7e2aec1887768f95477276d401f0b924db3c35e562fd55d2b25c24b856c3b8a6a5882f08457b9d3a6728bec416b19728cc9dda96688a12f1db77d543c7d4e42c516fef153cdaf5c897173723a43e83641f11c7ac29c179602d6f66c4c720a87c4ba82ad84f4f449ab8cf7b5a5a5f0aa641bb076a6979082eb76522d56c8e1e13867e6f01649f701b34e1662d4cf3bcbf83ad2e9b9ac924b2b23a046abc1b02951e0514b3532378bebe20886d8f8c17b67541f1e8b8989c298aaef633853fc3c3296e14b15cd35030ff4acb19df414c750737f10e1e54e20ef0c9449eaf423f3b33d95091fdd7af16166fc57f9bf1e5c96bb889b69a065808ed0b168446691308b680bebca7b613c6d424f9200ba81b9046997f22ce35ad03149a7adcc0fbdec4c0415e878101ad95b21cbd6e6ca9adeb4efdbde1d98e2ea52ca684348d7fb8d40f4872e5448879eee95d236cbfa9444cf1c78b5614cd0a326d1a77c386471cf8d5a019066dcef9339548ab7c960384c36cd9389190b1b33deabce2971bdca7efc69beb48411df812e44e312a125e82ca54a526cc1db3488d2535d64464e4c67a3434bc17b837ec37e237612aa431f754991cd268409f18acdf4bb27f81e3f9b635b48937ce29eb12dbe9719f4d0712a2e1d8f9e650777448ee385b21b13f35b658597566cceb6a17b7392872615f96500ac86613aef9fa39b1c594f86a3449bcd171bc6a23a1035017f48b8c30ab225c0d675e100d3ae07be50697ff8f8c00f669794a6108645fa94a4defa1ee50b0d477540b81fe16435bcea32fffd489062a4f0bae152293fc00f4ce0960eff48df03d5e325fe7da93c515a2afa17f4245b277edd012dc946251a4e3fe89c43f7bf8351b957bf3c391bb9fb9f102304eba3a4b9be18e0d2dec2a569970f958b305648da13253d2540fc38ab98208fef67ad43a33ba63a7038bdf946c697a72f848e58bfbd0e5e9319819a748fc385b5cbe42fcb3e511a79529d16c5a960cde8c9a3b614d2ee2b0c6589277fecede2d6b1a992150ea6e75d092b92a4455a8157dfec96386e5103fe19e1c51bb93d49d63e4b4651f7bc93727b8a85a3a33247471fabefec35a7502cfca8e0f1e2800bc046e4bba2218aae35d6bdfc6a0106730cbf1083e6a7768b5fa6340628edc8ef42d9be4bdc7e609599d2c59cb9412cbf1ca5261d2d8b2382b7aace91c0b525fca02fd4480fc0ada160ba177fa0ec2bb499ad29c4be700ae4879a776ec2fc0bf7592f43c498393267d915943d84d186dabde29f928097dbb0c3bd318c0eace0e79018704ad008676ec5c42f910ae2631b243437c9bb599df30b145f8ea1c2fefc19ff12e8595024ea4e2753d5252c5823be0101b2c355575c36ac3048e5ee1b1e9767c60c75c956ff0a8e93ce0a928d12ca0356f4e482cf811be5db7ef0098ba8cebe832fe2f9ead481c198053c2e6381684c87dc13787cc585fc487f41cb9b5187e283073780b28aefdd2a67770bd7517dea75014b408792267a65a0811c1d1a666825951b3c1344410122a898b014dde9a8d96bd13db950343d6de1f608c8cf04b7723d39f32e5e93edab4dd979792faec6f0aabdf0c08050677867e820e52375a814c05864819029822e1b4cbd1bf1026677b804505913cc0fd27f7084cfce6a1f87904c61ea05f084cc7d6ca4bae02f701c452ef607e41701168abc04fa583f7f5bb5a6bd876739302fadce895e41f3d88263a2b00f602469e04f75354f5d0e61a5ba70db362a3bf8529ae0f584a74eeeb0a01f9b067c3f07c63f662b227d7a7846fa308bbc40bad9df224488b1bb2d5d1643edf1577eee035c0c95ffb4184c4d7c531a6593f61722130e29a298841a2a9997da25abbeef7905aa5464eead03267d8a0ff228e49b520d0ae6db9e74f952ff5d046c3f115e23c63e61d6faea1b34ee2b638dd12bcbbec31185285010efb0a65e72e0435a5b3ccd9d305a853975928292cc489ff6570d64e268ee93f2e3862cfa67cfefe0365e89570915ad5dcac1b1543665e6f3e691ac8cc09c44eb73913cb41c70e4a2afbe158d3292a05b0f03b92b06dc98679e2e80b777e7b9930569431a25b0a10e01b19ff2a9da81b771379c1b9dd418e976b8a76521fb100c40aef425524b8cfae76c856047c1dc14c0be3981a88709cb406e99d122ca4646b1b2410154cd7ec854196781e54385cbbb3f456f9311dca5a542d88138ed2372194eff3fa972c2caa3486bf8fd45c02fece0370e603025b64c83470f3ce177b8b0591b620dde7444ca77d0fd1471846d337c82e256ef41c1d2f628026cc5576237a31002a3df525628133e04dc2079d8f372b8dddf246b323885a344a907ac0224eb94cdd353dbc670bdaee5ff8608fa5b081c47367a1331e1590621081df39606a42d8392f0b51a305373a294896c48a3e5ce75a84ace788f5a0cef06abc14e2100ae771bc75de8cf179668d75c0b2e3c1a299c7fa641ca912fccecb0c4cb841ee8efa16cf6e7e4f9493717eaf0c97a2cc83e41873c507c7eb4eaf10402a10c84dc046778af6c21cd57f855d61c2286c60d67e8bedb34b7f883c6350b438479a43da3e720a372000f86914eb6884b31d3bf096f1adf9dfdc2f5e24bed81ec0f1e9c8057aa67ac65be13c3ae3b5f5ef230f6544bedca1e2e1da9991586c52db1ca49bf70d3ae6d30c42e03bd0221dda3b0b3f72b6736d669793b2167a775a593028c0a92038be35bab3d2ff8a997b4af29a176a4bffb3776187dc794c19dfa024d5b6521b3768b7254a89768f802080fcbf4cf9010631b80d9f465f8cae5995bf949444156eba529b45cf83d4a8ce536e1a3927abfbbbdb4f633f9ff576b4feeb56814906b6f8777291a86d6015d229646d03d260752e9cd75a5d5f8b42edc3c0c697c5ab16cdfff3b94421c83a55db1103d070a4310170b504e0e6f3d8fb028ef09288d9960ea356997766f108dfbf6b0415940bc388ce9b8b7ebb249c6958ce0c7e45bbba6d9856a4756290dca95acce571e29dfb333edd357e4e67981a610a472f8a9186c927347852a7e580b91e8f10fb95281b05412729db03cab2593f7f1aff2a09e290079b2e4341eac67a491743a9b6ac2294230dff34d6cd92150640944038382333f01ede87bdb06460a2e7fcf3dbc10f5385e687caa042d4f653fb3dcf6737062ba449417f9411943bd8ccdb1272366c11edeaf58a1a144f68e0922767065cd9a812e71a519f8856065aaf6d1af", 0x1000}], 0x3, &(0x7f0000005580)=[@dstaddrv6={0x20}, @sndrcv={0x30, 0x84, 0x1, {0x6, 0x8001, 0x2, 0x5, 0x101, 0x401, 0x10001, 0x81, r10}}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @multicast2}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x9a}}, @sndrcv={0x30, 0x84, 0x1, {0x10001, 0x7, 0x0, 0x8, 0x20, 0x8000, 0x9, 0x2, r11}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x2}}, @sndinfo={0x20, 0x84, 0x2, {0x7fffffff, 0x8001, 0x7b1b5a98, 0x3, r12}}, @dstaddrv4={0x18, 0x84, 0x7, @local}], 0x108, 0x4000000}, {&(0x7f00000056c0)=@in={0x2, 0x4e21, @broadcast}, 0x10, &(0x7f00000059c0)=[{&(0x7f0000005700)="bf1c0a04", 0x4}, {&(0x7f0000005740)="3d460e86e112501a7c70c9661c35104ba998cb5385ced5ad7cd621443874df8f55ef191be50e511b37745657a91116bb5254", 0x32}, {&(0x7f0000005780)="8583567158ea1cc6e9181f71", 0xc}, {&(0x7f00000057c0)="e98305804f4d2ad1", 0x8}, {&(0x7f0000005800)="770b5eec7b71bd00885fe65890dd01a6f056254e533ceb4ab3c4f7764699f4176f818d226d7ecbc2bdd434767fd4b31283de691b84b7342c5982372f9a56dab259c0910bc5be3dec3546451a4c1e71f9055c625729891a0a7248b8f35307a85de015a9e2d504570e321de9e43192c1c1bf9097993da8e5d2b902e4c4e44ba687aac07f17b4d52b075b4f4bfbb4420654f17afcbd694b296b895daffcae1b9d64a106fe8227154020a0aee28243180258faf55a71bb6cc483f63bb79c137d75c6ed76d25e07c8fb550da74a22f08a83f72f2958f16df4cac5", 0xd8}, {&(0x7f0000005900)="4c92aa050f60bdc79433146a6eb6c52e4505a2b490b7242383d17a007a787eaccc3debdca6853a937b74726aa37d00722809f61e3abce666a671c43a03f40710a40db4afa29fd6780b0539083409a1070f1bedcdcf42eae6c3a693b2a6d4d7b3d459450b572f091059ea5a5b476e1bd7563807eee6d5b1f9e54520e9ebc250cf17d8e2f7bcce05a12e05e48cb612df66c44e0a8bf4816b0cb89d0bc63493", 0x9e}], 0x6, &(0x7f0000005ac0)=[@dstaddrv6={0x20, 0x84, 0x8, @dev={0xfe, 0x80, [], 0xd}}, @sndrcv={0x30, 0x84, 0x1, {0x5, 0x8000, 0x201, 0x9, 0x4d0f, 0x2, 0x7, 0x3, r13}}, @dstaddrv6={0x20, 0x84, 0x8, @loopback}, @authinfo={0x18, 0x84, 0x6, {0xc2}}], 0x88, 0x80}], 0x9, 0x40000) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000005d80)={0x5, 0x8001, 0x2, 0x5, 0x4, 0x7, 0x3, 0x0, r9}, 0x20) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000005dc0)={r9, 0x1000, "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"}, &(0x7f0000006e00)=0x1008) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x0, 0x4) r14 = syz_open_dev$admmidi(&(0x7f0000006e40)='/dev/admmidi#\x00', 0x81, 0x10000) ioctl$KVM_SET_XSAVE(r14, 0x5000aea5, &(0x7f0000006e80)={"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"}) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000007280)=r4, 0x4) r15 = accept(r0, &(0x7f00000072c0)=@ipx, &(0x7f0000007340)=0x80) ioctl$FIDEDUPERANGE(r15, 0xc0189436, &(0x7f0000007380)={0x6, 0x5, 0x5, 0x0, 0x0, [{r14, 0x0, 0x5}, {r14, 0x0, 0xffffffffffffffc1}, {r15, 0x0, 0x80000000}, {r15, 0x0, 0x4}, {r15, 0x0, 0x3}]}) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r14, 0x84, 0x76, &(0x7f0000007440)={r11, 0x1}, 0x8) r16 = syz_open_dev$amidi(&(0x7f0000007480)='/dev/amidi#\x00', 0x100, 0x12201) write$binfmt_script(r14, &(0x7f00000074c0)={'#! ', './file0', [{0x20, '/dev/amidi#\x00'}, {0x20, 'cgroup'}, {0x20, 'md5summime_typeppp1ppp0'}, {0x20, '@eth1!}\'ppp0&cpuset&\'ppp1.{mime_type--:'}, {0x20, "a3757365722b"}, {0x20, '/dev/amidi#\x00'}], 0xa, "fb711a3d753f1419dbcbf982676d17be2a21ce2070a87203480378fabfc85aca906f370cc9bfc06725b9f6dfdd929627ea788b94d40aa2e23d4bd84c1099df9b3f9ffae7ad2273b496f93dc02659155e6463fa09bc75c7c1e41456739762e7e7ef58bddf3ea608b2eb23f58a3149f856c9e39f57c1a7ef227b3e694f6b302f11b5996462489497ef04c1"}, 0xfd) ioctl$KVM_REGISTER_COALESCED_MMIO(r14, 0x4010ae67, &(0x7f00000075c0)={0x105000}) ioctl$KVM_HAS_DEVICE_ATTR(r16, 0x4018aee3, &(0x7f0000007640)={0x0, 0x3aa1, 0xfffffffffffffff7, &(0x7f0000007600)=0x4}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000007680)={r6, 0x800, 0x8}, &(0x7f00000076c0)=0x8) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r14, 0x5c) [ 226.663606] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 226.670779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready 12:29:08 executing program 0: shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x0) [ 227.002217] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 227.009287] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 227.929808] IPVS: ftp: loaded support on port[0] = 21 [ 228.018695] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 228.026697] team0: Port device team_slave_0 added [ 228.254167] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 228.262352] team0: Port device team_slave_1 added [ 228.462637] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.625876] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 228.633251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.641903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.991862] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 228.998940] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.007664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.328944] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 229.336559] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.345234] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.687966] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 229.695794] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.704552] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.797022] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 231.177612] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 231.193282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 231.200976] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 12:29:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000280)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast2}}}, 0x108) [ 232.416155] 8021q: adding VLAN 0 to HW filter on device team0 [ 232.949104] bridge0: port 1(bridge_slave_0) entered blocking state [ 232.955707] bridge0: port 1(bridge_slave_0) entered disabled state [ 232.964166] device bridge_slave_0 entered promiscuous mode [ 233.300293] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.306842] bridge0: port 2(bridge_slave_1) entered forwarding state [ 233.313817] bridge0: port 1(bridge_slave_0) entered blocking state [ 233.320246] bridge0: port 1(bridge_slave_0) entered forwarding state [ 233.328418] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 233.344503] bridge0: port 2(bridge_slave_1) entered blocking state [ 233.350944] bridge0: port 2(bridge_slave_1) entered disabled state [ 233.359309] device bridge_slave_1 entered promiscuous mode [ 233.618788] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 233.902879] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 234.332358] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 234.482394] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 234.745265] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 234.923533] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 234.930718] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 235.114248] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 235.121310] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 235.828903] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 235.836859] team0: Port device team_slave_0 added [ 236.125037] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 236.133275] team0: Port device team_slave_1 added [ 236.362547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 236.556242] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 236.563379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 236.572519] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 236.760286] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 236.768114] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 236.777021] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 236.909131] 8021q: adding VLAN 0 to HW filter on device bond0 [ 237.016044] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 237.025026] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.033955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.878680] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready 12:29:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000140)={@dev, 0x7}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000e95fe0)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/anycast6\x00') readv(r2, &(0x7f0000000100)=[{&(0x7f0000000080)=""/94, 0x43}], 0x1) [ 238.848977] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 238.855531] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.863340] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 239.729511] 8021q: adding VLAN 0 to HW filter on device team0 [ 239.787826] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.794382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.801244] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.807840] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.816010] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 239.862103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 243.015351] 8021q: adding VLAN 0 to HW filter on device bond0 [ 243.760581] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 244.391597] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 244.398235] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 244.406032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 12:29:26 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f0000fd0000), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @local}, 0x10) [ 245.101084] 8021q: adding VLAN 0 to HW filter on device team0 [ 246.758634] 8021q: adding VLAN 0 to HW filter on device bond0 [ 247.256467] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 247.755680] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 247.762120] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 247.769820] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 12:29:30 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000100)=@dstopts, 0x8) getsockopt$inet6_opts(r0, 0x29, 0x10000000003b, 0x0, &(0x7f0000000000)=0x95) 12:29:30 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) sigaltstack(&(0x7f00004b5000/0x3000)=nil, &(0x7f0000000000)) read(r0, &(0x7f0000910000)=""/100, 0x64) 12:29:30 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000280)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast2}}}, 0x108) 12:29:30 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) write$binfmt_misc(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="73797a31a24b6c8c40990ab76bb517d33dff7f4ddf70e7a464ee1614fe5db29f699b45e3a5cf5afd06008b2c4569afb6a84587904212345e3ec1015661322a1c790254dd341051bd85daec84cb7b092de9d5c45e153f53dab1fdbfbeb43e2d1ccf71207e068872141b00bc1c281dc7cb6437667ff8d0d5267507ab028d10c2da9a184491c424"], 0x86) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') memfd_create(&(0x7f00000006c0)='-trusted\x00', 0x2) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x820000}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="000000000000000000000e000000"], 0x1}, 0x1, 0x0, 0x0, 0x40}, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, &(0x7f0000000000)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000480), 0xffffffffffffffff) 12:29:30 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000340), 0x0) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000000000)=ANY=[], 0xfffffde3) recvmmsg(r1, &(0x7f0000000a00)=[{{&(0x7f0000000000)=@pptp={0x18, 0x2, {0x0, @local}}, 0x468, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/113, 0x1a6}], 0x1, &(0x7f00000002c0)=""/73, 0x49}}], 0x2f8, 0x0, 0x0) 12:29:30 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x2000000000048}, {0x6}]}, 0x8) r2 = dup2(r0, r0) sendmmsg(r2, &(0x7f00000083c0)=[{{&(0x7f0000000040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000001600)=[{&(0x7f00000000c0)="6b05", 0x2}], 0x1, &(0x7f0000001640)}}], 0x1, 0x0) 12:29:30 executing program 1: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000080), 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r0, 0x15) futex(&(0x7f000000cffc), 0x800000000005, 0x0, &(0x7f0000000180)={0x77359400}, &(0x7f0000000040), 0x0) [ 248.460904] 8021q: adding VLAN 0 to HW filter on device team0 12:29:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/88) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000300)=[@text64={0x40, &(0x7f00000000c0)="c744240006000000c744240200000080c7442406000000000f01142466b8c2008ec80f070f0f369a0f2002674669f9c12c000026660f38157e0f660f0dbead00000066baf80cb8bcecb281ef66bafc0cb80b000000ef0f20d835080000000f22d8", 0x61}], 0x1, 0x0, &(0x7f0000000180), 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000027000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000240)="0f21abd9f6b8fc0d8ec03e0cfcd8fa2e3e0f00d9baf80c66b89c39008866efbafc0c66b80a5e000066efbaf80c66b884929d8f66efbafc0c66b8e100000066eff2f30f19809988260f06", 0x4a}], 0x1, 0x0, &(0x7f00000001c0), 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'teql0\x00', {0x2, 0x0, @dev}}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioprio_get$pid(0x0, 0x0) 12:29:32 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0xfffffffffffffffc) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2}) 12:29:32 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000180), 0xc, &(0x7f00000001c0)={&(0x7f0000001080)={0x38, 0x0, 0x0, 0x0, 0x0, {}, [@generic="e1aa4cedd4798b8d24f6db8cc32ef5b9a8dc6eacc7f11ad7544c7331724b5be00cb18a9f"]}, 0x38}}, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000001000)={{}, {0xa, 0x0, 0x0, @dev}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, 0x5c) setsockopt$inet_int(r0, 0x0, 0x40, &(0x7f0000000ffc), 0xff50) 12:29:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={"6c6f000000000200", 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000000c0)={r1, 0x1, 0x6, @remote}, 0x10) 12:29:32 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) ioctl(r0, 0x8912, &(0x7f0000000280)="153f6234488dd25d766070") socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20}, {0x6}]}, 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmmsg(r1, &(0x7f0000000040), 0x324fad809d5a9cf, 0x0) 12:29:32 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000d55000), 0xc, &(0x7f0000c8d000)={&(0x7f0000bfdfdc)={0x14, 0x2, 0x9, 0x800000001}, 0x14}}, 0x0) [ 250.874257] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 250.909696] device lo entered promiscuous mode [ 250.992328] device lo left promiscuous mode [ 251.014232] kvm: emulating exchange as write 12:29:33 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000080), 0x12a) 12:29:33 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0xfffffffffffffffc) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2}) 12:29:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='cgroup.stat\x00', 0x0, 0x0) syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x400}]}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f0000000340)=0x800000001ff, 0x10000038f) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f00000020c0)={0x77359400}, 0x10) bind$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x5, @loopback}, 0x1c) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040), &(0x7f00000003c0)=0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0xffffffffffbffffc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, &(0x7f0000000040), 0xfe30, 0x20000006, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000, 0xfe80000000000000, 0x0, 0xe603000000000000]}}, 0x1c) 12:29:33 executing program 1: mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r0 = open(&(0x7f0000000000)='./control\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000044ff6)='./control\x00', 0x0) mkdirat(r0, &(0x7f00008b8ff6)='./file0\x00', 0x0) renameat2(r0, &(0x7f0000036ff6)='./control\x00', r0, &(0x7f0000036000)='./file0\x00', 0x2) 12:29:33 executing program 0: perf_event_open(&(0x7f0000000d40)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x4000, 0x0) [ 251.406314] hrtimer: interrupt took 92417 ns 12:29:33 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000400)=@abs={0x1, 0x0, 0x4e23}, 0x6e) 12:29:33 executing program 5: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r0, 0x11, 0x200, 0x10000) 12:29:33 executing program 1: mkdir(&(0x7f000000dff6)='./control\x00', 0x0) r0 = open(&(0x7f0000000000)='./control\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000044ff6)='./control\x00', 0x0) mkdirat(r0, &(0x7f00008b8ff6)='./file0\x00', 0x0) renameat2(r0, &(0x7f0000036ff6)='./control\x00', r0, &(0x7f0000036000)='./file0\x00', 0x2) 12:29:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000001c0)="637075262222000ac0f92a60006c4a947864c820f4b3ca0c907c1f66f0d29b61024b2828b182b270bbf3ddba72aabf5965d7a337c0ae24b12aeb00b5787f562d57eb9cf5e52064995d4f1399754abdef6583c2177e9e5cac1f93") 12:29:33 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000580)=0x3) close(r0) 12:29:33 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) sigaltstack(&(0x7f00004b5000/0x3000)=nil, &(0x7f0000000000)) read(r0, &(0x7f0000910000)=""/100, 0x64) 12:29:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000272000)='net/mcfilter\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000340)=""/71, 0x47}], 0x1) 12:29:34 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x800000000000004) ioctl(r0, 0x8913, &(0x7f00000012c0)="153f62344874ad3a") 12:29:34 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)) getdents64(r0, &(0x7f0000000840)=""/132, 0x22) 12:29:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x805, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x401, 0xc}, 0x8) sendto$inet(r0, &(0x7f0000000180)="af", 0x1, 0x0, &(0x7f0000000200)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) 12:29:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000000540)='/dev/ppp\x00', 0x0, 0x0, &(0x7f0000000780)) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001500)={&(0x7f0000000140)={0x10, 0x3}, 0xc, &(0x7f00000014c0)={&(0x7f0000000180)=@newsa={0x104, 0x1a, 0x1, 0x0, 0x0, {{@in=@multicast1, @in=@local}, {@in=@multicast1=0xe0000008, 0x0, 0x3c}, @in=@rand_addr, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@coaddr={0x14, 0xe, @in=@rand_addr}]}, 0x104}}, 0x0) 12:29:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) 12:29:34 executing program 2: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) fcntl$addseals(r1, 0x409, 0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) dup3(r2, r0, 0x80000) getegid() stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000800)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000a00)=ANY=[], 0x0, 0x3) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000900), 0x0) socket$alg(0x26, 0x5, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000980)=ANY=[@ANYBLOB="7f454c4600030406000000001000000000000101fcffffff3602000038000000817e0000000000000500200002000000ff00010400000000010005000000000001000000000800003f00000001000080000000010100000003ebbf761e6a6133570e2659f7b2a8ed1ff79b03c61af5585cb88e6af9"], 0x75) 12:29:34 executing program 1: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000680)) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000800)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000a00)=ANY=[], 0x0, 0x3) socket$alg(0x26, 0x5, 0x0) 12:29:35 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='ns\x00') 12:29:35 executing program 0: socketpair$inet6(0xa, 0x805, 0x9, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept$packet(0xffffffffffffff9c, &(0x7f0000000140), &(0x7f0000000240)=0x14) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/udplite\x00') ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000600)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$inet6(0xa, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r2, 0x0) write$tun(r2, &(0x7f0000000040)=ANY=[@ANYRES16=r0], 0x1) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) close(r3) 12:29:35 executing program 5: clone(0x200, &(0x7f0000000080), &(0x7f0000000000), &(0x7f0000000100), &(0x7f0000000280)) symlink(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00') mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', &(0x7f00000003c0), &(0x7f0000000600)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r1 = creat(&(0x7f0000000080)="e91f7189591e9233614b00", 0x109) r2 = dup2(r0, r1) execve(&(0x7f00000000c0)="e91f7189591e9233614b00", &(0x7f0000000140), &(0x7f0000001580)) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f00000006c0)=ANY=[]) open$dir(&(0x7f00000002c0)='./file0\x00', 0x83e, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000300), 0xffffffffffffffff) execve(&(0x7f0000000040)='./file1\x00', &(0x7f0000000400), &(0x7f00000001c0)) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000000180)) 12:29:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000001540)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 12:29:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000272000)='net/mcfilter\x00') readv(r0, &(0x7f00000006c0)=[{&(0x7f0000000340)=""/71, 0x2f}, {&(0x7f00000003c0)=""/165, 0xa5}], 0x2) 12:29:39 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) sigaltstack(&(0x7f00004b5000/0x3000)=nil, &(0x7f0000000000)) read(r0, &(0x7f0000910000)=""/100, 0x64) 12:29:39 executing program 1: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000680)) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000800)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000a00)=ANY=[], 0x0, 0x3) socket$alg(0x26, 0x5, 0x0) 12:29:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xf) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000140)=@generic) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) fcntl$getflags(0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000300)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8000, 0x0) 12:29:39 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x38) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x40400) io_setup(0x9, &(0x7f0000000080)=0x0) fallocate(r2, 0x0, 0x0, 0x6c0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000), 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f00000003c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x8, 0x0, "a7cdd39773de2dd6a4045751e52c2f868aefaf537936389dd2935273694c8dcf6f614c943663e67f9fc978833dfe20ba70f0f16fa5eb5b7a4c67d2a146111f9b0a0388dc952e1a4d7e4bdf797aeb2279"}, 0x17a) 12:29:41 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) sigaltstack(&(0x7f00004b5000/0x3000)=nil, &(0x7f0000000000)) read(r0, &(0x7f0000910000)=""/100, 0x64) 12:29:43 executing program 2: 12:29:43 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) sigaltstack(&(0x7f00004b5000/0x3000)=nil, &(0x7f0000000000)) read(r0, &(0x7f0000910000)=""/100, 0x64) 12:29:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000013000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x0, 0xe, 0xbe, &(0x7f0000000280)="6ff1a86487e1831e21547d59830b", &(0x7f0000000480)=""/190, 0x1ff}, 0x28) socket$kcm(0x2, 0x0, 0x2) 12:29:43 executing program 1: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000680)) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000800)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000a00)=ANY=[], 0x0, 0x3) socket$alg(0x26, 0x5, 0x0) 12:29:43 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x5) connect$inet6(r0, &(0x7f0000000040), 0x1c) write$binfmt_elf64(r0, &(0x7f00000004c0)=ANY=[], 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0xfffffffffffffffe, 0x10031, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000001500)) 12:29:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xf) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000140)=@generic) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e3e3) fcntl$getflags(0xffffffffffffffff, 0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x0, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000300)) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x8000, 0x0) 12:29:43 executing program 4: 12:29:43 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:29:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x1ff) bind$alg(0xffffffffffffffff, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x2000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xf}, 0x2c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r4, r3, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000300)=[@text32={0x20, &(0x7f0000000280)="66baf80cb84859ae87ef66bafc0c66b8354766ef0fc75c3af0b9dc0b0000b801000000ba000000000f3026d9eb66b8dc000f00d8b805000000b9a044f55b0f01d966baa00066b8b62e66ef0f96f1c4e23d073a3e66660fea7e0d", 0x5a}], 0x1, 0x0, &(0x7f0000000740), 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000001540)=0xaa15e714dcbff792) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000500)={0x0, @broadcast, 0x0, 0x3, 'dh\x00'}, 0x2c) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(0xffffffffffffffff, 0x4010ae74, &(0x7f00000004c0)) openat$cgroup_procs(r0, &(0x7f0000000440)='cgroup.threads\x00', 0x2, 0x0) getegid() fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) ioctl$BINDER_SET_MAX_THREADS(0xffffffffffffffff, 0x40046205, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0), 0x0) 12:29:43 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) socket$inet_dccp(0x2, 0x6, 0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:29:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:29:44 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) socket$inet_dccp(0x2, 0x6, 0x0) eventfd(0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 262.119557] QAT: Invalid ioctl [ 262.173442] QAT: Invalid ioctl [ 262.176754] QAT: Invalid ioctl [ 262.179989] QAT: Invalid ioctl 12:29:44 executing program 3: [ 262.262092] QAT: Invalid ioctl [ 262.265391] QAT: Invalid ioctl [ 262.268625] QAT: Invalid ioctl [ 262.339546] QAT: Invalid ioctl [ 262.364891] QAT: Invalid ioctl [ 262.395092] QAT: Invalid ioctl [ 262.436373] QAT: Invalid ioctl [ 262.444595] QAT: Invalid ioctl [ 262.482988] QAT: Invalid ioctl [ 262.486542] QAT: Invalid ioctl [ 262.505456] QAT: Invalid ioctl [ 262.522900] QAT: Invalid ioctl 12:29:44 executing program 3: [ 262.534465] QAT: Invalid ioctl [ 262.545068] QAT: Invalid ioctl [ 262.579524] QAT: Invalid ioctl [ 262.600183] QAT: Invalid ioctl [ 262.604239] QAT: Invalid ioctl [ 262.608111] QAT: Invalid ioctl [ 262.613368] QAT: Invalid ioctl [ 262.617278] QAT: Invalid ioctl [ 262.621126] QAT: Invalid ioctl 12:29:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) [ 262.653301] QAT: Invalid ioctl [ 262.686339] QAT: Invalid ioctl [ 262.756401] QAT: Invalid ioctl [ 262.790240] QAT: Invalid ioctl 12:29:44 executing program 1: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000680)) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000800)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000a00)=ANY=[], 0x0, 0x3) socket$alg(0x26, 0x5, 0x0) 12:29:44 executing program 3: 12:29:45 executing program 0: 12:29:45 executing program 3: 12:29:45 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:29:45 executing program 0: 12:29:45 executing program 4: 12:29:45 executing program 3: 12:29:45 executing program 5: 12:29:46 executing program 0: 12:29:46 executing program 4: 12:29:46 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:29:46 executing program 1: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000680)) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000800)) setxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='system.posix_acl_default\x00', &(0x7f0000000a00)=ANY=[], 0x0, 0x3) 12:29:46 executing program 3: 12:29:46 executing program 5: 12:29:46 executing program 4: 12:29:46 executing program 0: 12:29:46 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:29:47 executing program 0: 12:29:47 executing program 3: 12:29:47 executing program 4: 12:29:47 executing program 5: 12:29:47 executing program 0: 12:29:47 executing program 4: 12:29:48 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:29:48 executing program 3: 12:29:48 executing program 0: 12:29:48 executing program 1: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000680)) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000800)) 12:29:48 executing program 5: 12:29:48 executing program 4: 12:29:48 executing program 4: 12:29:48 executing program 5: 12:29:48 executing program 0: 12:29:48 executing program 3: 12:29:48 executing program 4: 12:29:49 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), r1, 0x0, 0x2, 0x4}}, 0x20) 12:29:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:29:49 executing program 5: socketpair$inet6(0xa, 0x805, 0x9, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept$packet(0xffffffffffffff9c, &(0x7f0000000140), &(0x7f0000000240)=0x14) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/udplite\x00') ioctl$KVM_SET_XSAVE(r2, 0x5000aea5, &(0x7f0000000600)={"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"}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={@dev={0xfe, 0x80, [], 0xc}, 0x1c}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f0000000000)={'bpq0\x00', {0x2, 0x0, @multicast2}}) bind$inet6(0xffffffffffffffff, &(0x7f0000ef8cfd)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) socket$inet6(0xa, 0x0, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$tun(r4, &(0x7f0000000040)=ANY=[@ANYRES16=r1], 0x1) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x3) close(r5) 12:29:49 executing program 1: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000680)) 12:29:49 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2}}}, 0x88) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) sigaltstack(&(0x7f00004b5000/0x3000)=nil, &(0x7f0000000000)) read(r1, &(0x7f0000910000)=""/100, 0x64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.effective_mems\x00', 0x0, 0x0) 12:29:49 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x200000006, 0x70, 0x2, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x880, 0x0) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000600)) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='/dev/zero\x00'}, 0x10) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f00000004c0)={0x5, 0x401, 0x3ff, 0x6, 0x7, 0x3f}) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000180)=ANY=[], 0x0) pwrite64(r0, &(0x7f0000000780)="3fe4dc7faa11e29fb38ebed06a87133207a5b5614941ec4dec9f45f0cc153c7040958d022e3ba47dc44f72f209e0d33dba3ca5723618f2c6ee2a3ec1e772a50213d5cb941228552c62864921c8070dcfcf3017103333a63ae51027a35e9de346a0995418f14aa205c6eef52b54773e25dc2b564e07e27c1118e44296e01b3af1e4f7fbe26b6a98366b260b", 0x8b, 0x2) getpid() sched_rr_get_interval(0x0, &(0x7f0000000740)) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/zero\x00', 0x0, 0x0) sendto$unix(r4, &(0x7f00000001c0), 0xfffffffffffffd6f, 0x0, &(0x7f00000002c0)=@abs, 0xfffffffffffffe22) r5 = socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBLED(r3, 0x4b65, 0x8001) times(&(0x7f00000000c0)) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x800, 0x0) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r6, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/234, 0xea}], 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r5, 0x29, 0x44, &(0x7f0000000380)={'HL\x00'}, &(0x7f00000003c0)=0xfe6d) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000700)) socket(0x4000200001, 0x80a, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x0, &(0x7f0000000140)={@loopback}, &(0x7f0000000180)=0x14) timerfd_create(0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1ffffd) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000e40)=ANY=[]}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) sendto$inet(r1, &(0x7f000099bf26), 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000940)="e8b7ef78f293b81121abbac9e2b7b5a7", 0x10, 0x200000004008000, 0x0, 0x0) 12:29:49 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) socket$inet_dccp(0x2, 0x6, 0x0) eventfd(0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x101000) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 12:29:49 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:29:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ip6_flowlabel\x00') bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, &(0x7f0000000000), 0x7ff) [ 268.113836] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 12:29:50 executing program 5: 12:29:50 executing program 4: 12:29:50 executing program 5: 12:29:50 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:29:50 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x200000006, 0x70, 0x2, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x880, 0x0) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000600)) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='/dev/zero\x00'}, 0x10) ioctl$VT_RESIZEX(r3, 0x560a, &(0x7f00000004c0)={0x5, 0x401, 0x3ff, 0x6, 0x7, 0x3f}) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr}, 0x10) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000180)=ANY=[], 0x0) pwrite64(r0, &(0x7f0000000780)="3fe4dc7faa11e29fb38ebed06a87133207a5b5614941ec4dec9f45f0cc153c7040958d022e3ba47dc44f72f209e0d33dba3ca5723618f2c6ee2a3ec1e772a50213d5cb941228552c62864921c8070dcfcf3017103333a63ae51027a35e9de346a0995418f14aa205c6eef52b54773e25dc2b564e07e27c1118e44296e01b3af1e4f7fbe26b6a98366b260b", 0x8b, 0x2) getpid() sched_rr_get_interval(0x0, &(0x7f0000000740)) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/zero\x00', 0x0, 0x0) sendto$unix(r4, &(0x7f00000001c0), 0xfffffffffffffd6f, 0x0, &(0x7f00000002c0)=@abs, 0xfffffffffffffe22) r5 = socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBLED(r3, 0x4b65, 0x8001) times(&(0x7f00000000c0)) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x800, 0x0) epoll_create1(0x80000) perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r6, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/234, 0xea}], 0x1, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r5, 0x29, 0x44, &(0x7f0000000380)={'HL\x00'}, &(0x7f00000003c0)=0xfe6d) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000700)) socket(0x4000200001, 0x80a, 0x0) getsockopt$inet6_mreq(r6, 0x29, 0x0, &(0x7f0000000140)={@loopback}, &(0x7f0000000180)=0x14) timerfd_create(0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x1ffffd) sendmsg$nl_route(r2, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000e00)={&(0x7f0000000e40)=ANY=[]}}, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) sendto$inet(r1, &(0x7f000099bf26), 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000940)="e8b7ef78f293b81121abbac9e2b7b5a7", 0x10, 0x200000004008000, 0x0, 0x0) 12:29:51 executing program 4: 12:29:51 executing program 1: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) 12:29:51 executing program 0: 12:29:51 executing program 5: 12:29:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = dup2(r0, 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:29:51 executing program 4: 12:29:51 executing program 3: 12:29:51 executing program 0: 12:29:51 executing program 5: 12:29:52 executing program 4: 12:29:52 executing program 3: 12:29:52 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = dup2(r0, 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:29:52 executing program 5: 12:29:53 executing program 1: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:29:53 executing program 4: 12:29:53 executing program 3: 12:29:53 executing program 0: 12:29:53 executing program 5: 12:29:53 executing program 3: 12:29:53 executing program 5: 12:29:53 executing program 0: 12:29:53 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = dup2(r0, 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:29:53 executing program 4: openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) socket$inet_dccp(0x2, 0x6, 0x0) eventfd(0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) unshare(0x2000400) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 12:29:53 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000340), 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup2(r1, r1) write$P9_RREADDIR(r2, &(0x7f0000000000)=ANY=[], 0x10000006b) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000500)=""/113, 0x71}], 0x1, &(0x7f00000002c0)=""/73, 0xfffffffffffffdd0}}], 0x1, 0x0, 0x0) 12:29:53 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f00000000c0), 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) [ 271.853980] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 271.860788] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 12:29:54 executing program 1: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) 12:29:54 executing program 5: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x859, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x8003, &(0x7f0000000080)=0xbf207ff, 0x100, 0x1) 12:29:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000000240)=""/254, 0xfe, 0x0, 0x0, 0x0) 12:29:54 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:29:54 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:29:54 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = dup2(r0, 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:29:55 executing program 0: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) 12:29:55 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:29:55 executing program 5: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) 12:29:55 executing program 4: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000680)) 12:29:56 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:29:58 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:30:15 executing program 1: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) 12:30:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:30:15 executing program 4: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000680)) 12:30:15 executing program 0: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) 12:30:15 executing program 5: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) 12:30:16 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:30:17 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:30:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:30:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:30:22 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:30:25 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:30:27 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:30:34 executing program 1: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) 12:30:34 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:30:34 executing program 4: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000680)) 12:30:35 executing program 0: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) 12:30:35 executing program 5: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) 12:30:35 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) 12:30:35 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:30:36 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:30:38 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:30:39 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:30:40 executing program 4: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) 12:30:42 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:30:53 executing program 1: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:30:53 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:30:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) readlink(&(0x7f0000001580)='./file0/file0\x00', &(0x7f0000000480)=""/4096, 0x1000) write$FUSE_DIRENT(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="90000000000000000200000000000000010000000045000000000000000000000b08956d069e0000000020a17b3059fc2c28de66ce654d316e6f646576656d3100f9ff00000000000000000000000000000000000001000000000000002c00000000000008000000000000000000000000000000001c00000000000051a717000418b9b3cc002b737973741600000065"], 0x90) mount$fuseblk(&(0x7f00000002c0)="2f6465762f6c6f6f703004", &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='fuseblk\x00', 0x21, &(0x7f0000001600)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 12:30:53 executing program 0: 12:30:53 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) 12:30:54 executing program 5: 12:30:54 executing program 0: 12:30:54 executing program 4: r0 = epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r1 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r1, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) dup3(0xffffffffffffffff, r0, 0x80000) 12:30:54 executing program 2: bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r1 = dup2(0xffffffffffffffff, r0) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:30:54 executing program 5: 12:30:55 executing program 0: 12:30:55 executing program 5: 12:30:57 executing program 1: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:30:57 executing program 0: 12:30:57 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:30:57 executing program 5: 12:30:57 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) 12:30:57 executing program 0: 12:30:57 executing program 5: 12:30:58 executing program 4: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:30:58 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:30:58 executing program 0: 12:30:58 executing program 5: 12:30:59 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) eventfd(0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 12:31:00 executing program 1: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x800}, 0x1c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x0, 0x0) accept4(r1, &(0x7f0000000080)=@alg, &(0x7f0000000200)=0x80, 0x80000) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000001c0)=0x5) listen(r0, 0xa) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000080), 0x0, 0x20000004, &(0x7f0000000140)={0xa, 0x4e22}, 0x1c) readv(r2, &(0x7f0000000700)=[{&(0x7f0000000440)=""/132, 0x84}], 0x1) getsockname$inet6(r2, &(0x7f0000000280), &(0x7f0000000240)=0x15d) r3 = accept4(r0, 0x0, &(0x7f0000000000)=0xfffffffffffffefa, 0x0) shutdown(r2, 0x1) setsockopt(r2, 0x0, 0x1, &(0x7f0000000100)='x', 0x1) sendto$inet6(r3, &(0x7f0000000500)="41465a39a172dd651d1f01fcdb315cb1fc1ea8470b32103a9a9ee1d40be9106bc3fedaf3e877113460132182cb1ecd0354db37f72e11b95aa592e5ada4368d91d5502919a4523d017b370f57eed68d0d2bf06798038d0d1e551ebe5b8583ae90b8d3daf27d656dcf5409fe52c6167c96e8cc0498db874c39c7e317ff08cbfe4e2888391c83288cb1ef54ce7231b42e923793cf99e68338f10fee42c601e2016ab984f67a3a285eecc4f670f486ce30db87f9b75852fdc7baab50cbdae084648e0a1750036d89b0a92dea89bb37a79bfc728201ec9a8bd433", 0xd8, 0x0, 0x0, 0x0) 12:31:00 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:00 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) 12:31:00 executing program 4: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) 12:31:00 executing program 5: clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) socket$alg(0x26, 0x5, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000980)=ANY=[], 0x0) 12:31:01 executing program 0: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000913000)={{&(0x7f00004b3000/0x5000)=nil, 0x5000}, 0x1}) clone(0x0, &(0x7f0000001f37), &(0x7f0000001ffc), &(0x7f0000001000), &(0x7f0000001000)) sigaltstack(&(0x7f00004b5000/0x3000)=nil, &(0x7f0000000000)) read(r0, &(0x7f0000910000)=""/100, 0x64) 12:31:01 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x8, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e22, @local}, {0x2, 0x4e24, @broadcast}, 0xfd, 0x101, 0x2, 0x3, 0x1, 0x0, 0xd4, 0xfd00, 0x8001}) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x20, 0x10000) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) seccomp(0x1, 0x1, &(0x7f0000000180)={0x7, &(0x7f0000000040)=[{0x1000, 0x212f, 0x0, 0xf682}, {0xa7, 0x3, 0x9}, {0x2, 0x0, 0x1}, {0xad, 0x8000, 0x8, 0x2}, {0x6, 0x9d, 0x6, 0x9}, {0x9, 0x1ff, 0x80000000, 0x3}, {0x0, 0x8, 0xd74}]}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000340)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000380)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000003c0)={r2, r3, 0x80}) membarrier(0x10, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast2, @in6=@dev, 0x0, 0x8000, 0x4e24, 0x1, 0x9, 0x20, 0x80}, {0x712, 0x2, 0x0, 0xffffffff00000000, 0x7f, 0x6, 0x4, 0x1}, {0x401, 0x100000000, 0x7, 0xccf3}, 0x0, 0x4, 0x0, 0x1, 0x3, 0x3}, {{@in=@local, 0x4d4}, 0xa, @in=@local, 0x3504, 0x2, 0x3, 0x7fffffff, 0xfffffffffffffffc, 0x7, 0x7f}}, 0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000580)=0x100, 0x4) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000700)={0x0, 0x1, 0x6, @dev={[], 0xd}}, 0x10) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000600), &(0x7f0000000640)=0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x1ff) sendto$inet(r0, &(0x7f0000000000), 0xc3c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 12:31:02 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:02 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) 12:31:03 executing program 1: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:03 executing program 4: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) 12:31:03 executing program 0: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) 12:31:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x8, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e22, @local}, {0x2, 0x4e24, @broadcast}, 0xfd, 0x101, 0x2, 0x3, 0x1, 0x0, 0xd4, 0xfd00, 0x8001}) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x20, 0x10000) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) seccomp(0x1, 0x1, &(0x7f0000000180)={0x7, &(0x7f0000000040)=[{0x1000, 0x212f, 0x0, 0xf682}, {0xa7, 0x3, 0x9}, {0x2, 0x0, 0x1}, {0xad, 0x8000, 0x8, 0x2}, {0x6, 0x9d, 0x6, 0x9}, {0x9, 0x1ff, 0x80000000, 0x3}, {0x0, 0x8, 0xd74}]}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000340)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000380)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000003c0)={r2, r3, 0x80}) membarrier(0x10, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast2, @in6=@dev, 0x0, 0x8000, 0x4e24, 0x1, 0x9, 0x20, 0x80}, {0x712, 0x2, 0x0, 0xffffffff00000000, 0x7f, 0x6, 0x4, 0x1}, {0x401, 0x100000000, 0x7, 0xccf3}, 0x0, 0x4, 0x0, 0x1, 0x3, 0x3}, {{@in=@local, 0x4d4}, 0xa, @in=@local, 0x3504, 0x2, 0x3, 0x7fffffff, 0xfffffffffffffffc, 0x7, 0x7f}}, 0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000580)=0x100, 0x4) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000700)={0x0, 0x1, 0x6, @dev={[], 0xd}}, 0x10) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000600), &(0x7f0000000640)=0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x1ff) sendto$inet(r0, &(0x7f0000000000), 0xc3c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 12:31:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x8, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e22, @local}, {0x2, 0x4e24, @broadcast}, 0xfd, 0x101, 0x2, 0x3, 0x1, 0x0, 0xd4, 0xfd00, 0x8001}) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x20, 0x10000) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) seccomp(0x1, 0x1, &(0x7f0000000180)={0x7, &(0x7f0000000040)=[{0x1000, 0x212f, 0x0, 0xf682}, {0xa7, 0x3, 0x9}, {0x2, 0x0, 0x1}, {0xad, 0x8000, 0x8, 0x2}, {0x6, 0x9d, 0x6, 0x9}, {0x9, 0x1ff, 0x80000000, 0x3}, {0x0, 0x8, 0xd74}]}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000340)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000380)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000003c0)={r2, r3, 0x80}) membarrier(0x10, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast2, @in6=@dev, 0x0, 0x8000, 0x4e24, 0x1, 0x9, 0x20, 0x80}, {0x712, 0x2, 0x0, 0xffffffff00000000, 0x7f, 0x6, 0x4, 0x1}, {0x401, 0x100000000, 0x7, 0xccf3}, 0x0, 0x4, 0x0, 0x1, 0x3, 0x3}, {{@in=@local, 0x4d4}, 0xa, @in=@local, 0x3504, 0x2, 0x3, 0x7fffffff, 0xfffffffffffffffc, 0x7, 0x7f}}, 0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000580)=0x100, 0x4) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000700)={0x0, 0x1, 0x6, @dev={[], 0xd}}, 0x10) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000600), &(0x7f0000000640)=0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x1ff) sendto$inet(r0, &(0x7f0000000000), 0xc3c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 12:31:05 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x8, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e22, @local}, {0x2, 0x4e24, @broadcast}, 0xfd, 0x101, 0x2, 0x3, 0x1, 0x0, 0xd4, 0xfd00, 0x8001}) r1 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x20, 0x10000) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@multicast1}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) seccomp(0x1, 0x1, &(0x7f0000000180)={0x7, &(0x7f0000000040)=[{0x1000, 0x212f, 0x0, 0xf682}, {0xa7, 0x3, 0x9}, {0x2, 0x0, 0x1}, {0xad, 0x8000, 0x8, 0x2}, {0x6, 0x9d, 0x6, 0x9}, {0x9, 0x1ff, 0x80000000, 0x3}, {0x0, 0x8, 0xd74}]}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000340)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000380)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000003c0)={r2, r3, 0x80}) membarrier(0x10, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in=@multicast2, @in6=@dev, 0x0, 0x8000, 0x4e24, 0x1, 0x9, 0x20, 0x80}, {0x712, 0x2, 0x0, 0xffffffff00000000, 0x7f, 0x6, 0x4, 0x1}, {0x401, 0x100000000, 0x7, 0xccf3}, 0x0, 0x4, 0x0, 0x1, 0x3, 0x3}, {{@in=@local, 0x4d4}, 0xa, @in=@local, 0x3504, 0x2, 0x3, 0x7fffffff, 0xfffffffffffffffc, 0x7, 0x7f}}, 0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0xc) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000580)=0x100, 0x4) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000700)={0x0, 0x1, 0x6, @dev={[], 0xd}}, 0x10) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000600), &(0x7f0000000640)=0x4) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000740)='./cgroup/syz1\x00', 0x1ff) sendto$inet(r0, &(0x7f0000000000), 0xc3c, 0x0, &(0x7f00000000c0)={0x2, 0x0, @dev}, 0x10) 12:31:06 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) 12:31:06 executing program 4: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) 12:31:06 executing program 1: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:06 executing program 0: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) 12:31:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:07 executing program 5: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:08 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:08 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) 12:31:08 executing program 0: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) 12:31:09 executing program 1: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:09 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:09 executing program 5: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:10 executing program 4: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) 12:31:10 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x0, &(0x7f00006dc000)}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x0, &(0x7f00006dc000)}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:13 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) 12:31:14 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x0, &(0x7f00006dc000)}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:14 executing program 1: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x0, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:18 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x0, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:21 executing program 0: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) 12:31:21 executing program 5: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:21 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x0, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:21 executing program 4: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) 12:31:22 executing program 1: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:22 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) 12:31:22 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:23 executing program 5: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:23 executing program 1: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:23 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) 12:31:23 executing program 4: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) 12:31:23 executing program 0: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:24 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:24 executing program 1: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:25 executing program 5: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001d80)={0x0, 0x401, 0x6}, &(0x7f0000001dc0)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x4, 0x8, 0x4}, &(0x7f00000004c0)=0x364) 12:31:25 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:25 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) 12:31:26 executing program 4: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) 12:31:26 executing program 0: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:26 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:26 executing program 1: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:27 executing program 5: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:27 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) 12:31:27 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:27 executing program 4: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) 12:31:28 executing program 0: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) 12:31:28 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:28 executing program 1: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:28 executing program 5: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) fcntl$addseals(r0, 0x409, 0x8) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000100)={0x0, 0x0, 0x1}) 12:31:29 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) 12:31:29 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:30 executing program 1: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:30 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000dfdfee)='/dev/input/event#\x00', 0x0, 0x2) r1 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) readv(r1, &(0x7f0000001400)=[{&(0x7f0000000000)=""/46, 0x2e}], 0x1) dup2(r0, r1) 12:31:30 executing program 1: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:30 executing program 4: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) 12:31:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:31 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) 12:31:31 executing program 5: 12:31:31 executing program 0: 12:31:31 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:31 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) 12:31:31 executing program 1: epoll_create1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:32 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000440), 0x10) sendmsg$can_bcm(r0, &(0x7f0000000140)={&(0x7f0000000000), 0x10, &(0x7f0000000040)={&(0x7f00000000c0)={0x5, 0x0, 0x0, {0x0, 0x2710}, {0x77359400}, {}, 0x8, @can={{}, 0x0, 0x0, 0x0, 0x0, "c4d981ae211e6951"}}, 0x20000108}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$can_bcm(r0, &(0x7f0000000280)={&(0x7f0000000300), 0x10, &(0x7f00000007c0)={&(0x7f0000000740)={0x5, 0x800, 0x0, {}, {}, {}, 0x1, @canfd={{}, 0x0, 0x0, 0x0, 0x0, "60c5ccffa454a890d2ec450e6abaa884541ed0e2f1ac30d2a17c29c9a2978af3fcec4fc145068250bca3ce15790eb7ed09a5cf0029adf82777d2d0a7ddcb3ea4"}}, 0x80}}, 0x0) sendmsg$can_bcm(r0, &(0x7f00000002c0)={&(0x7f0000000080), 0x10, &(0x7f0000000240)={&(0x7f00000001c0)={0x6, 0x0, 0x0, {0x77359400}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "c61f2323d752075b"}}, 0x48}}, 0x0) 12:31:32 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffeaf, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f}}, 0xfffffe78) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback={0xfe80000000000000}}, {0xa, 0x0, 0x0, @dev}, r1}}, 0x48) 12:31:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:32 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x40002017}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, &(0x7f0000000fe0)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000003c0)={0x10000005}) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, &(0x7f00009d2000), 0x8) 12:31:33 executing program 4: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) r0 = memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) write$binfmt_misc(r0, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) 12:31:33 executing program 3: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) 12:31:33 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmmsg(0xffffffffffffffff, &(0x7f0000003140), 0x0, 0x0, &(0x7f0000003280)={0x0, 0x1c9c380}) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ptype\x00') r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000200)={0x3, 0x0, [{}, {}, {}]}) r4 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) preadv(r5, &(0x7f0000001ac0)=[{&(0x7f00000008c0)=""/153, 0x99}, {&(0x7f0000001a00)=""/138, 0x8a}], 0x2, 0x0) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000340)={0x0, 0x1, 0x6, @remote}, 0x10) finit_module(r3, &(0x7f00000005c0)='mime_typeInodev)vboxnet1nodev#nodev\\vmnet1/\x00', 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x3ec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00003e2000/0x2000)=nil, 0x2000}}) prctl$intptr(0x1, 0x0) clone(0x0, &(0x7f0000000240), &(0x7f00000001c0), &(0x7f0000000140), &(0x7f0000000200)) ioctl$UI_GET_VERSION(r4, 0x8004552d, &(0x7f0000000100)) semget$private(0x0, 0x0, 0x40) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) clock_gettime(0x0, &(0x7f00000001c0)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) 12:31:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) 12:31:33 executing program 3: epoll_create1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) 12:31:34 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:35 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) 12:31:35 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000340), 0x0) r1 = accept$alg(r0, 0x0, 0x0) r2 = dup2(r1, r1) write$P9_RREADDIR(r2, &(0x7f0000000000)=ANY=[], 0x10000006b) recvmmsg(r1, &(0x7f0000000140)=[{{&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000500)=""/113, 0x34000}], 0x1, &(0x7f00000002c0)=""/73, 0xfffffffffffffdd0}}], 0x1, 0x0, 0x0) 12:31:36 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:38 executing program 4: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) 12:31:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha512\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x228, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) 12:31:38 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e399aa4eedc3d6bd8ebd65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546465a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0x82, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:39 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0xa, 0x6, 0xffffffffffffffff}, 0x14}}, 0x0) 12:31:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x10, 0x0, &(0x7f0000000140)=[@increfs, @decrefs], 0x0, 0x0, &(0x7f0000000380)}) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f0000000500)) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000140), 0xffffffffffffffff, 0x0, 0x2, 0x4}}, 0x20) [ 377.585489] binder: 8829:8830 IncRefs 0 refcount change on invalid ref 0 ret -22 [ 377.641837] binder: 8829:8830 DecRefs 0 refcount change on invalid ref 0 ret -22 12:31:46 executing program 3: epoll_create1(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) memfd_create(&(0x7f0000000140)="2b8b8a16114fdddf6b284699df92d53e6f4a02759b9461ac", 0x3) 12:31:46 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000000440), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000001040), 0x0, 0x0, &(0x7f0000e66000)={0x2, 0x0, @multicast2}, 0x10) recvmmsg(r0, &(0x7f0000002940)=[{{&(0x7f0000002200)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000002480)=""/112, 0x2e}}], 0x6e, 0x0, &(0x7f0000002a80)={0x0, 0x989680}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000640)='/dev/full\x00', 0x0, 0x0) r2 = dup2(r0, r1) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000480)={&(0x7f00000003c0), 0xc, &(0x7f0000000440)={&(0x7f0000000680)={0x6e4}, 0x6e4}}, 0x8001) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 12:31:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) 12:31:46 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x34000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x1c, 0x29, 0x82d, 0x0, 0x0, {0x1}, [@generic="526c4f6104"]}, 0x1c}}, 0x0) 12:31:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000100)={0x0, @aes256, 0x3, "be56c7353fc59594"}) r0 = socket$kcm(0x2, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0x2, &(0x7f0000000180), 0x8) sendmsg$kcm(r0, &(0x7f0000001600)={&(0x7f0000000000)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x18}}, 0x80, &(0x7f0000001340)=[{&(0x7f0000000080)="e5", 0x1}], 0x1, &(0x7f00000013c0)}, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 12:31:46 executing program 4: epoll_create1(0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x0, 0x81, 0x0, 0x0, 0xef4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000000580), &(0x7f00000001c0), &(0x7f0000000380), &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@loopback, @in=@local}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) [ 384.819559] ================================================================== [ 384.826998] BUG: KMSAN: uninit-value in tipc_nl_compat_dumpit+0x478/0x820 [ 384.833944] CPU: 0 PID: 8850 Comm: syz-executor0 Not tainted 4.19.0-rc7+ #69 [ 384.841131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 384.850487] Call Trace: [ 384.853107] dump_stack+0x306/0x460 [ 384.856740] ? _raw_spin_lock_irqsave+0x227/0x340 [ 384.861593] ? tipc_nl_compat_dumpit+0x478/0x820 [ 384.866364] kmsan_report+0x1a2/0x2e0 [ 384.870173] __msan_warning+0x7c/0xe0 [ 384.873998] tipc_nl_compat_dumpit+0x478/0x820 [ 384.878608] ? kmsan_set_origin+0x83/0x140 [ 384.882861] tipc_nl_compat_recv+0x1402/0x2760 [ 384.887450] ? INIT_BOOL+0xc/0x30 [ 384.890918] ? tipc_nl_node_reset_link_stats+0x5e0/0x5e0 [ 384.896372] ? tipc_nl_compat_link_stat_dump+0x2750/0x2750 [ 384.902005] ? tipc_netlink_compat_stop+0x40/0x40 [ 384.906852] genl_rcv_msg+0x185c/0x1a20 [ 384.910853] ? kmsan_set_origin+0x83/0x140 [ 384.915111] netlink_rcv_skb+0x394/0x640 [ 384.919185] ? genl_unbind+0x380/0x380 [ 384.923087] genl_rcv+0x63/0x80 [ 384.926388] netlink_unicast+0x166d/0x1720 [ 384.930642] ? genl_pernet_exit+0x90/0x90 [ 384.934804] netlink_sendmsg+0x1391/0x1420 [ 384.939064] ___sys_sendmsg+0xe47/0x1200 [ 384.943141] ? netlink_getsockopt+0x1560/0x1560 [ 384.947822] ? __fget+0x8f7/0x940 [ 384.951303] ? __fdget+0x318/0x430 [ 384.954869] __se_sys_sendmsg+0x307/0x460 [ 384.959043] __x64_sys_sendmsg+0x4a/0x70 [ 384.963107] do_syscall_64+0xbe/0x100 [ 384.966920] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 384.972115] RIP: 0033:0x457569 [ 384.975332] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 384.994505] RSP: 002b:00007f3c30ccfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 385.002226] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 385.009503] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 385.016783] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 385.024161] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3c30cd06d4 [ 385.031440] R13: 00000000004c387d R14: 00000000004d56d0 R15: 00000000ffffffff [ 385.038723] [ 385.040351] Uninit was created at: [ 385.043902] kmsan_internal_poison_shadow+0xc8/0x1d0 [ 385.049010] kmsan_kmalloc+0xa4/0x120 [ 385.052819] kmsan_slab_alloc+0x10/0x20 [ 385.056808] __kmalloc_node_track_caller+0xb43/0x1400 [ 385.062010] __alloc_skb+0x422/0xe90 [ 385.065728] netlink_sendmsg+0xcaf/0x1420 [ 385.069874] ___sys_sendmsg+0xe47/0x1200 [ 385.073941] __se_sys_sendmsg+0x307/0x460 [ 385.078095] __x64_sys_sendmsg+0x4a/0x70 [ 385.082160] do_syscall_64+0xbe/0x100 [ 385.085966] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 385.091153] ================================================================== [ 385.098612] Disabling lock debugging due to kernel taint [ 385.104071] Kernel panic - not syncing: panic_on_warn set ... [ 385.104071] [ 385.111451] CPU: 0 PID: 8850 Comm: syz-executor0 Tainted: G B 4.19.0-rc7+ #69 [ 385.120057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 385.129408] Call Trace: [ 385.132018] dump_stack+0x306/0x460 [ 385.135673] panic+0x54c/0xafa [ 385.138904] kmsan_report+0x2d3/0x2e0 [ 385.142744] __msan_warning+0x7c/0xe0 [ 385.146565] tipc_nl_compat_dumpit+0x478/0x820 [ 385.151164] ? kmsan_set_origin+0x83/0x140 [ 385.155426] tipc_nl_compat_recv+0x1402/0x2760 [ 385.160038] ? INIT_BOOL+0xc/0x30 [ 385.163505] ? tipc_nl_node_reset_link_stats+0x5e0/0x5e0 [ 385.168989] ? tipc_nl_compat_link_stat_dump+0x2750/0x2750 [ 385.174641] ? tipc_netlink_compat_stop+0x40/0x40 [ 385.179492] genl_rcv_msg+0x185c/0x1a20 [ 385.183498] ? kmsan_set_origin+0x83/0x140 [ 385.187775] netlink_rcv_skb+0x394/0x640 [ 385.191857] ? genl_unbind+0x380/0x380 [ 385.195769] genl_rcv+0x63/0x80 [ 385.199063] netlink_unicast+0x166d/0x1720 [ 385.203331] ? genl_pernet_exit+0x90/0x90 [ 385.207506] netlink_sendmsg+0x1391/0x1420 [ 385.211771] ___sys_sendmsg+0xe47/0x1200 [ 385.215855] ? netlink_getsockopt+0x1560/0x1560 [ 385.220532] ? __fget+0x8f7/0x940 [ 385.224020] ? __fdget+0x318/0x430 [ 385.227570] __se_sys_sendmsg+0x307/0x460 [ 385.231752] __x64_sys_sendmsg+0x4a/0x70 [ 385.235842] do_syscall_64+0xbe/0x100 [ 385.239681] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 385.244898] RIP: 0033:0x457569 [ 385.248117] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 385.267035] RSP: 002b:00007f3c30ccfc78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 385.274751] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 385.282029] RDX: 0000000000000000 RSI: 0000000020000100 RDI: 0000000000000003 [ 385.289315] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 385.296600] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3c30cd06d4 [ 385.303870] R13: 00000000004c387d R14: 00000000004d56d0 R15: 00000000ffffffff [ 385.312368] Kernel Offset: disabled [ 385.315994] Rebooting in 86400 seconds..