Warning: Permanently added '10.128.1.30' (ECDSA) to the list of known hosts. 2022/04/20 03:17:11 fuzzer started 2022/04/20 03:17:11 dialing manager at 10.128.0.163:32835 2022/04/20 03:17:15 syscalls: 3480 2022/04/20 03:17:15 code coverage: enabled 2022/04/20 03:17:15 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2022/04/20 03:17:15 extra coverage: extra coverage is not supported by the kernel 2022/04/20 03:17:15 delay kcov mmap: mmap returned an invalid pointer 2022/04/20 03:17:15 setuid sandbox: enabled 2022/04/20 03:17:15 namespace sandbox: enabled 2022/04/20 03:17:15 Android sandbox: /sys/fs/selinux/policy does not exist 2022/04/20 03:17:15 fault injection: enabled 2022/04/20 03:17:15 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2022/04/20 03:17:15 net packet injection: enabled 2022/04/20 03:17:15 net device setup: enabled 2022/04/20 03:17:15 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/04/20 03:17:15 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/04/20 03:17:15 USB emulation: /dev/raw-gadget does not exist 2022/04/20 03:17:15 hci packet injection: enabled 2022/04/20 03:17:15 wifi device emulation: kernel 4.17 required (have 4.14.275-syzkaller) 2022/04/20 03:17:15 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2022/04/20 03:17:15 fetching corpus: 0, signal 0/2000 (executing program) 2022/04/20 03:17:15 fetching corpus: 50, signal 53820/57411 (executing program) 2022/04/20 03:17:15 fetching corpus: 100, signal 69757/74958 (executing program) 2022/04/20 03:17:15 fetching corpus: 150, signal 85162/91816 (executing program) 2022/04/20 03:17:16 fetching corpus: 200, signal 97798/105823 (executing program) 2022/04/20 03:17:16 fetching corpus: 249, signal 110761/120088 (executing program) 2022/04/20 03:17:16 fetching corpus: 299, signal 120114/130704 (executing program) 2022/04/20 03:17:16 fetching corpus: 349, signal 126555/138440 (executing program) 2022/04/20 03:17:16 fetching corpus: 399, signal 134148/147229 (executing program) 2022/04/20 03:17:16 fetching corpus: 449, signal 140223/154514 (executing program) 2022/04/20 03:17:16 fetching corpus: 499, signal 147567/162961 (executing program) 2022/04/20 03:17:16 fetching corpus: 547, signal 154742/171158 (executing program) 2022/04/20 03:17:16 fetching corpus: 595, signal 159396/176929 (executing program) 2022/04/20 03:17:17 fetching corpus: 644, signal 165069/183618 (executing program) 2022/04/20 03:17:17 fetching corpus: 692, signal 172221/191675 (executing program) 2022/04/20 03:17:17 fetching corpus: 742, signal 178105/198459 (executing program) 2022/04/20 03:17:17 fetching corpus: 790, signal 183983/205196 (executing program) 2022/04/20 03:17:17 fetching corpus: 837, signal 188069/210199 (executing program) 2022/04/20 03:17:17 fetching corpus: 887, signal 193648/216519 (executing program) 2022/04/20 03:17:17 fetching corpus: 937, signal 198743/222409 (executing program) 2022/04/20 03:17:17 fetching corpus: 987, signal 203327/227737 (executing program) 2022/04/20 03:17:18 fetching corpus: 1036, signal 207751/232883 (executing program) 2022/04/20 03:17:18 fetching corpus: 1084, signal 212079/237949 (executing program) 2022/04/20 03:17:18 fetching corpus: 1134, signal 217444/243913 (executing program) 2022/04/20 03:17:18 fetching corpus: 1184, signal 221074/248293 (executing program) 2022/04/20 03:17:18 fetching corpus: 1233, signal 225391/253213 (executing program) 2022/04/20 03:17:18 fetching corpus: 1283, signal 229481/257889 (executing program) 2022/04/20 03:17:18 fetching corpus: 1332, signal 233507/262517 (executing program) 2022/04/20 03:17:19 fetching corpus: 1381, signal 240678/269870 (executing program) 2022/04/20 03:17:19 fetching corpus: 1430, signal 244807/274470 (executing program) 2022/04/20 03:17:19 fetching corpus: 1480, signal 247896/278174 (executing program) 2022/04/20 03:17:19 fetching corpus: 1530, signal 252171/282866 (executing program) 2022/04/20 03:17:19 fetching corpus: 1579, signal 255379/286627 (executing program) 2022/04/20 03:17:19 fetching corpus: 1629, signal 258165/289965 (executing program) 2022/04/20 03:17:19 fetching corpus: 1679, signal 260521/292925 (executing program) 2022/04/20 03:17:19 fetching corpus: 1729, signal 264353/297119 (executing program) 2022/04/20 03:17:19 fetching corpus: 1778, signal 267572/300759 (executing program) 2022/04/20 03:17:20 fetching corpus: 1828, signal 270539/304166 (executing program) 2022/04/20 03:17:20 fetching corpus: 1877, signal 273289/307378 (executing program) 2022/04/20 03:17:20 fetching corpus: 1927, signal 275903/310469 (executing program) 2022/04/20 03:17:20 fetching corpus: 1977, signal 278555/313571 (executing program) 2022/04/20 03:17:20 fetching corpus: 2026, signal 280982/316428 (executing program) 2022/04/20 03:17:20 fetching corpus: 2076, signal 283318/319174 (executing program) 2022/04/20 03:17:20 fetching corpus: 2125, signal 286577/322676 (executing program) 2022/04/20 03:17:21 fetching corpus: 2175, signal 288595/325130 (executing program) 2022/04/20 03:17:21 fetching corpus: 2224, signal 290746/327737 (executing program) 2022/04/20 03:17:21 fetching corpus: 2273, signal 292655/330096 (executing program) 2022/04/20 03:17:21 fetching corpus: 2322, signal 294459/332351 (executing program) 2022/04/20 03:17:21 fetching corpus: 2372, signal 297003/335179 (executing program) 2022/04/20 03:17:21 fetching corpus: 2421, signal 299660/338077 (executing program) 2022/04/20 03:17:21 fetching corpus: 2471, signal 301503/340322 (executing program) 2022/04/20 03:17:21 fetching corpus: 2520, signal 303920/342969 (executing program) 2022/04/20 03:17:22 fetching corpus: 2569, signal 305729/345168 (executing program) 2022/04/20 03:17:22 fetching corpus: 2617, signal 307813/347578 (executing program) 2022/04/20 03:17:22 fetching corpus: 2666, signal 309750/349808 (executing program) 2022/04/20 03:17:22 fetching corpus: 2716, signal 312229/352515 (executing program) 2022/04/20 03:17:22 fetching corpus: 2764, signal 314362/354852 (executing program) 2022/04/20 03:17:23 fetching corpus: 2814, signal 316594/357316 (executing program) 2022/04/20 03:17:23 fetching corpus: 2863, signal 318608/359559 (executing program) 2022/04/20 03:17:23 fetching corpus: 2911, signal 320600/361803 (executing program) 2022/04/20 03:17:23 fetching corpus: 2959, signal 322322/363786 (executing program) 2022/04/20 03:17:23 fetching corpus: 3008, signal 324712/366258 (executing program) 2022/04/20 03:17:23 fetching corpus: 3058, signal 327296/368817 (executing program) 2022/04/20 03:17:23 fetching corpus: 3106, signal 328726/370525 (executing program) 2022/04/20 03:17:23 fetching corpus: 3155, signal 330414/372400 (executing program) 2022/04/20 03:17:24 fetching corpus: 3201, signal 332373/374474 (executing program) 2022/04/20 03:17:24 fetching corpus: 3249, signal 333884/376250 (executing program) 2022/04/20 03:17:24 fetching corpus: 3299, signal 335823/378291 (executing program) 2022/04/20 03:17:24 fetching corpus: 3348, signal 337345/380008 (executing program) 2022/04/20 03:17:24 fetching corpus: 3397, signal 338673/381567 (executing program) 2022/04/20 03:17:24 fetching corpus: 3447, signal 340184/383263 (executing program) 2022/04/20 03:17:24 fetching corpus: 3492, signal 341571/384833 (executing program) 2022/04/20 03:17:24 fetching corpus: 3541, signal 342959/386363 (executing program) 2022/04/20 03:17:25 fetching corpus: 3591, signal 344628/388117 (executing program) 2022/04/20 03:17:25 fetching corpus: 3640, signal 346504/389959 (executing program) 2022/04/20 03:17:25 fetching corpus: 3688, signal 347718/391349 (executing program) 2022/04/20 03:17:25 fetching corpus: 3738, signal 349370/393076 (executing program) 2022/04/20 03:17:25 fetching corpus: 3786, signal 350833/394660 (executing program) 2022/04/20 03:17:25 fetching corpus: 3835, signal 352067/396050 (executing program) 2022/04/20 03:17:25 fetching corpus: 3885, signal 353500/397578 (executing program) 2022/04/20 03:17:25 fetching corpus: 3935, signal 355397/399405 (executing program) 2022/04/20 03:17:26 fetching corpus: 3985, signal 357197/401188 (executing program) 2022/04/20 03:17:26 fetching corpus: 4034, signal 358491/402553 (executing program) 2022/04/20 03:17:26 fetching corpus: 4080, signal 360507/404405 (executing program) 2022/04/20 03:17:26 fetching corpus: 4129, signal 361978/405885 (executing program) 2022/04/20 03:17:26 fetching corpus: 4178, signal 363288/407232 (executing program) 2022/04/20 03:17:26 fetching corpus: 4227, signal 364192/408301 (executing program) 2022/04/20 03:17:26 fetching corpus: 4277, signal 365638/409704 (executing program) 2022/04/20 03:17:26 fetching corpus: 4327, signal 366682/410845 (executing program) 2022/04/20 03:17:26 fetching corpus: 4377, signal 368250/412351 (executing program) 2022/04/20 03:17:27 fetching corpus: 4427, signal 369691/413730 (executing program) 2022/04/20 03:17:27 fetching corpus: 4476, signal 370810/414954 (executing program) 2022/04/20 03:17:27 fetching corpus: 4525, signal 372271/416358 (executing program) 2022/04/20 03:17:27 fetching corpus: 4575, signal 373565/417624 (executing program) 2022/04/20 03:17:27 fetching corpus: 4625, signal 374748/418812 (executing program) 2022/04/20 03:17:27 fetching corpus: 4675, signal 376040/420067 (executing program) 2022/04/20 03:17:27 fetching corpus: 4725, signal 377237/421203 (executing program) 2022/04/20 03:17:28 fetching corpus: 4775, signal 378462/422413 (executing program) 2022/04/20 03:17:28 fetching corpus: 4824, signal 379570/423510 (executing program) 2022/04/20 03:17:28 fetching corpus: 4871, signal 381059/424834 (executing program) 2022/04/20 03:17:28 fetching corpus: 4921, signal 382306/425952 (executing program) 2022/04/20 03:17:28 fetching corpus: 4970, signal 383569/427106 (executing program) 2022/04/20 03:17:28 fetching corpus: 5018, signal 384835/428261 (executing program) 2022/04/20 03:17:28 fetching corpus: 5067, signal 385603/429101 (executing program) 2022/04/20 03:17:28 fetching corpus: 5116, signal 386819/430196 (executing program) 2022/04/20 03:17:29 fetching corpus: 5164, signal 387992/431301 (executing program) 2022/04/20 03:17:29 fetching corpus: 5214, signal 389251/432361 (executing program) 2022/04/20 03:17:29 fetching corpus: 5262, signal 390834/433628 (executing program) 2022/04/20 03:17:29 fetching corpus: 5312, signal 392378/434806 (executing program) 2022/04/20 03:17:29 fetching corpus: 5359, signal 393783/435958 (executing program) 2022/04/20 03:17:29 fetching corpus: 5409, signal 395517/437289 (executing program) 2022/04/20 03:17:29 fetching corpus: 5458, signal 396381/438125 (executing program) 2022/04/20 03:17:30 fetching corpus: 5508, signal 397730/439189 (executing program) 2022/04/20 03:17:30 fetching corpus: 5557, signal 399058/440274 (executing program) 2022/04/20 03:17:30 fetching corpus: 5607, signal 402025/442189 (executing program) 2022/04/20 03:17:30 fetching corpus: 5656, signal 403105/443088 (executing program) 2022/04/20 03:17:30 fetching corpus: 5706, signal 404269/444022 (executing program) 2022/04/20 03:17:30 fetching corpus: 5755, signal 405106/444808 (executing program) 2022/04/20 03:17:30 fetching corpus: 5805, signal 406015/445652 (executing program) 2022/04/20 03:17:30 fetching corpus: 5855, signal 406878/446427 (executing program) 2022/04/20 03:17:31 fetching corpus: 5905, signal 408099/447362 (executing program) 2022/04/20 03:17:31 fetching corpus: 5955, signal 408982/448102 (executing program) 2022/04/20 03:17:31 fetching corpus: 6005, signal 410020/448874 (executing program) 2022/04/20 03:17:31 fetching corpus: 6054, signal 410988/449683 (executing program) 2022/04/20 03:17:31 fetching corpus: 6103, signal 412304/450601 (executing program) 2022/04/20 03:17:31 fetching corpus: 6153, signal 413689/451587 (executing program) 2022/04/20 03:17:31 fetching corpus: 6203, signal 414880/452430 (executing program) 2022/04/20 03:17:32 fetching corpus: 6253, signal 419802/455009 (executing program) 2022/04/20 03:17:32 fetching corpus: 6303, signal 420961/455854 (executing program) 2022/04/20 03:17:32 fetching corpus: 6353, signal 422033/456655 (executing program) 2022/04/20 03:17:32 fetching corpus: 6402, signal 423015/457336 (executing program) 2022/04/20 03:17:32 fetching corpus: 6452, signal 424351/458175 (executing program) 2022/04/20 03:17:32 fetching corpus: 6502, signal 425294/458807 (executing program) 2022/04/20 03:17:32 fetching corpus: 6552, signal 426196/459469 (executing program) 2022/04/20 03:17:33 fetching corpus: 6602, signal 426996/460022 (executing program) 2022/04/20 03:17:33 fetching corpus: 6652, signal 427731/460621 (executing program) 2022/04/20 03:17:33 fetching corpus: 6701, signal 428791/461344 (executing program) 2022/04/20 03:17:33 fetching corpus: 6751, signal 429687/461989 (executing program) 2022/04/20 03:17:33 fetching corpus: 6800, signal 430936/462813 (executing program) 2022/04/20 03:17:33 fetching corpus: 6850, signal 432205/463623 (executing program) 2022/04/20 03:17:33 fetching corpus: 6900, signal 432955/464159 (executing program) 2022/04/20 03:17:33 fetching corpus: 6950, signal 433829/464732 (executing program) 2022/04/20 03:17:34 fetching corpus: 7000, signal 434459/465196 (executing program) 2022/04/20 03:17:34 fetching corpus: 7050, signal 435409/465823 (executing program) 2022/04/20 03:17:34 fetching corpus: 7100, signal 436179/466363 (executing program) 2022/04/20 03:17:34 fetching corpus: 7150, signal 437017/466915 (executing program) 2022/04/20 03:17:34 fetching corpus: 7200, signal 437886/467484 (executing program) 2022/04/20 03:17:34 fetching corpus: 7249, signal 438576/467987 (executing program) 2022/04/20 03:17:34 fetching corpus: 7299, signal 439472/468536 (executing program) 2022/04/20 03:17:35 fetching corpus: 7346, signal 440361/469091 (executing program) 2022/04/20 03:17:35 fetching corpus: 7396, signal 441343/469676 (executing program) 2022/04/20 03:17:35 fetching corpus: 7446, signal 442512/470305 (executing program) 2022/04/20 03:17:35 fetching corpus: 7496, signal 443020/470665 (executing program) 2022/04/20 03:17:35 fetching corpus: 7545, signal 443905/471180 (executing program) 2022/04/20 03:17:35 fetching corpus: 7594, signal 444494/471606 (executing program) 2022/04/20 03:17:35 fetching corpus: 7644, signal 445139/472014 (executing program) 2022/04/20 03:17:35 fetching corpus: 7693, signal 445817/472405 (executing program) 2022/04/20 03:17:35 fetching corpus: 7743, signal 446688/472887 (executing program) 2022/04/20 03:17:36 fetching corpus: 7793, signal 447683/473399 (executing program) 2022/04/20 03:17:36 fetching corpus: 7841, signal 448289/473729 (executing program) 2022/04/20 03:17:36 fetching corpus: 7890, signal 449892/474472 (executing program) 2022/04/20 03:17:36 fetching corpus: 7940, signal 450770/474921 (executing program) 2022/04/20 03:17:36 fetching corpus: 7990, signal 451585/475343 (executing program) 2022/04/20 03:17:36 fetching corpus: 8039, signal 452249/475686 (executing program) 2022/04/20 03:17:36 fetching corpus: 8088, signal 452983/476099 (executing program) 2022/04/20 03:17:37 fetching corpus: 8138, signal 453830/476515 (executing program) 2022/04/20 03:17:37 fetching corpus: 8188, signal 454573/476896 (executing program) 2022/04/20 03:17:37 fetching corpus: 8237, signal 455475/477339 (executing program) 2022/04/20 03:17:37 fetching corpus: 8286, signal 456046/477651 (executing program) 2022/04/20 03:17:37 fetching corpus: 8336, signal 456914/478028 (executing program) 2022/04/20 03:17:37 fetching corpus: 8385, signal 457726/478421 (executing program) 2022/04/20 03:17:38 fetching corpus: 8435, signal 458687/478848 (executing program) 2022/04/20 03:17:38 fetching corpus: 8484, signal 459458/479174 (executing program) 2022/04/20 03:17:38 fetching corpus: 8534, signal 460043/479458 (executing program) 2022/04/20 03:17:38 fetching corpus: 8582, signal 460935/479802 (executing program) 2022/04/20 03:17:38 fetching corpus: 8632, signal 461706/480122 (executing program) 2022/04/20 03:17:39 fetching corpus: 8681, signal 462594/480496 (executing program) 2022/04/20 03:17:39 fetching corpus: 8731, signal 463360/480814 (executing program) 2022/04/20 03:17:39 fetching corpus: 8781, signal 463835/481049 (executing program) 2022/04/20 03:17:39 fetching corpus: 8828, signal 464769/481374 (executing program) 2022/04/20 03:17:39 fetching corpus: 8877, signal 465355/481626 (executing program) 2022/04/20 03:17:39 fetching corpus: 8927, signal 465927/481849 (executing program) 2022/04/20 03:17:39 fetching corpus: 8977, signal 466512/482079 (executing program) 2022/04/20 03:17:39 fetching corpus: 9026, signal 467330/482357 (executing program) 2022/04/20 03:17:40 fetching corpus: 9074, signal 468365/482665 (executing program) 2022/04/20 03:17:40 fetching corpus: 9122, signal 468935/482887 (executing program) 2022/04/20 03:17:40 fetching corpus: 9172, signal 469871/483194 (executing program) 2022/04/20 03:17:40 fetching corpus: 9222, signal 470730/483445 (executing program) 2022/04/20 03:17:40 fetching corpus: 9272, signal 471327/483663 (executing program) 2022/04/20 03:17:40 fetching corpus: 9322, signal 471822/483867 (executing program) 2022/04/20 03:17:41 fetching corpus: 9372, signal 472328/484035 (executing program) 2022/04/20 03:17:41 fetching corpus: 9422, signal 473150/484264 (executing program) 2022/04/20 03:17:41 fetching corpus: 9472, signal 473798/484442 (executing program) 2022/04/20 03:17:41 fetching corpus: 9521, signal 474362/484623 (executing program) 2022/04/20 03:17:41 fetching corpus: 9569, signal 475134/484841 (executing program) 2022/04/20 03:17:41 fetching corpus: 9619, signal 475660/484994 (executing program) 2022/04/20 03:17:41 fetching corpus: 9669, signal 476262/485144 (executing program) 2022/04/20 03:17:41 fetching corpus: 9719, signal 476961/485341 (executing program) 2022/04/20 03:17:42 fetching corpus: 9769, signal 477837/485534 (executing program) 2022/04/20 03:17:42 fetching corpus: 9819, signal 478503/485694 (executing program) 2022/04/20 03:17:42 fetching corpus: 9837, signal 478700/485760 (executing program) 2022/04/20 03:17:42 fetching corpus: 9837, signal 478700/485797 (executing program) 2022/04/20 03:17:42 fetching corpus: 9837, signal 478700/485836 (executing program) 2022/04/20 03:17:42 fetching corpus: 9837, signal 478700/485875 (executing program) 2022/04/20 03:17:42 fetching corpus: 9837, signal 478700/485906 (executing program) 2022/04/20 03:17:42 fetching corpus: 9837, signal 478700/485940 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478706/485982 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478706/486015 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478707/486050 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478707/486082 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478707/486126 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478707/486166 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478707/486198 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478709/486240 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478709/486271 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478709/486312 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478709/486344 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478709/486374 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478709/486412 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478709/486453 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478709/486475 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478709/486510 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478709/486536 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/486569 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/486604 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/486642 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/486684 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/486723 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/486753 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/486798 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/486838 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/486877 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/486911 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/486944 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/486983 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/487007 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/487044 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/487073 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/487124 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/487152 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/487184 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/487222 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/487260 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/487264 (executing program) 2022/04/20 03:17:42 fetching corpus: 9838, signal 478710/487264 (executing program) 2022/04/20 03:17:44 starting 6 fuzzer processes 03:17:44 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) r6 = getpgid(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000280)="8d", 0x1}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 03:17:44 executing program 5: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000000)={0x0, "151b5aee5ed87c58dba2b61ec55f0121180964be764794d42a5ad61ceb318d35", 0xffffffffffffffff}) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, 0x0) 03:17:44 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='devices.list\x00', 0x275a, 0x0) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000000)="fb7e7830e3f60aa1f6b5ad50b01cd68f0bb9b53e1d2da1a9158764ee9f575ae0beddbe6d9b2e558a1d0a0e468998aeff", 0x30}, {&(0x7f00000000c0)="382b533fe7f0ca25aef7381daee5de32e6", 0x11}], 0x2) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f00000000c0)=""/4079, &(0x7f0000000040)=0xfef) 03:17:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='auxv\x00') read$FUSE(r0, 0x0, 0x0) 03:17:44 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'gre0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @multicast2, @multicast1}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x7800, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}}) 03:17:44 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x1ff, 0x8002) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x7) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000080)={0x0, 0x0, "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"}) syzkaller login: [ 62.884456] IPVS: ftp: loaded support on port[0] = 21 [ 62.979969] IPVS: ftp: loaded support on port[0] = 21 [ 63.066803] chnl_net:caif_netlink_parms(): no params data found [ 63.086350] IPVS: ftp: loaded support on port[0] = 21 [ 63.164357] chnl_net:caif_netlink_parms(): no params data found [ 63.207737] IPVS: ftp: loaded support on port[0] = 21 [ 63.298464] chnl_net:caif_netlink_parms(): no params data found [ 63.352541] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.359656] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.367503] device bridge_slave_0 entered promiscuous mode [ 63.393156] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.399610] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.407121] device bridge_slave_0 entered promiscuous mode [ 63.413345] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.420503] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.427830] device bridge_slave_1 entered promiscuous mode [ 63.436700] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.440682] IPVS: ftp: loaded support on port[0] = 21 [ 63.443111] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.455712] device bridge_slave_1 entered promiscuous mode [ 63.491376] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.502151] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.519455] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.530994] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.570515] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.577958] team0: Port device team_slave_0 added [ 63.583145] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.592048] team0: Port device team_slave_0 added [ 63.601098] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.608417] team0: Port device team_slave_1 added [ 63.631050] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.638271] team0: Port device team_slave_1 added [ 63.704481] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 63.712940] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 63.738806] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 63.750472] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 63.756821] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 63.783535] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 63.797156] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.803507] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.810773] device bridge_slave_0 entered promiscuous mode [ 63.820267] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.826725] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.833625] device bridge_slave_1 entered promiscuous mode [ 63.840384] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 63.846671] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 63.872218] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 63.883212] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 63.889710] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 63.915092] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 63.928434] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.937992] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.951093] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.960872] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.968341] chnl_net:caif_netlink_parms(): no params data found [ 64.007995] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 64.026464] IPVS: ftp: loaded support on port[0] = 21 [ 64.044041] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 64.054709] device hsr_slave_0 entered promiscuous mode [ 64.060935] device hsr_slave_1 entered promiscuous mode [ 64.073940] device hsr_slave_0 entered promiscuous mode [ 64.079897] device hsr_slave_1 entered promiscuous mode [ 64.107887] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 64.114793] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 64.122194] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 64.134728] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 64.144341] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.152025] team0: Port device team_slave_0 added [ 64.163943] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.171458] team0: Port device team_slave_1 added [ 64.282375] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 64.289073] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.315223] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 64.329570] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 64.336751] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.362140] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 64.405140] chnl_net:caif_netlink_parms(): no params data found [ 64.413625] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.443346] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.449789] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.457828] device bridge_slave_0 entered promiscuous mode [ 64.468794] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 64.498648] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.505238] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.512110] device bridge_slave_1 entered promiscuous mode [ 64.542586] device hsr_slave_0 entered promiscuous mode [ 64.548559] device hsr_slave_1 entered promiscuous mode [ 64.575137] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 64.582980] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 64.613223] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 64.621211] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 64.717839] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.725897] team0: Port device team_slave_0 added [ 64.731457] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.739568] team0: Port device team_slave_1 added [ 64.758320] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 64.764567] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.790634] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 64.804188] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 64.810847] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.836669] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 64.847693] Bluetooth: hci2 command 0x0409 tx timeout [ 64.853112] Bluetooth: hci0 command 0x0409 tx timeout [ 64.923380] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.930331] Bluetooth: hci4 command 0x0409 tx timeout [ 64.935054] Bluetooth: hci5 command 0x0409 tx timeout [ 64.937625] Bluetooth: hci1 command 0x0409 tx timeout [ 64.940710] Bluetooth: hci3 command 0x0409 tx timeout [ 64.947325] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 64.969154] chnl_net:caif_netlink_parms(): no params data found [ 64.982987] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.019777] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.053399] device hsr_slave_0 entered promiscuous mode [ 65.061660] device hsr_slave_1 entered promiscuous mode [ 65.072828] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.079656] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.087080] device bridge_slave_0 entered promiscuous mode [ 65.093780] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.100852] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.107842] device bridge_slave_1 entered promiscuous mode [ 65.114742] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 65.122926] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 65.194241] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.231768] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 65.242780] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.261562] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 65.287099] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.293481] bridge0: port 1(bridge_slave_0) entered disabled state [ 65.303261] device bridge_slave_0 entered promiscuous mode [ 65.310485] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.317140] bridge0: port 2(bridge_slave_1) entered disabled state [ 65.324116] device bridge_slave_1 entered promiscuous mode [ 65.348468] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.356791] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.371157] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 65.378611] team0: Port device team_slave_0 added [ 65.401202] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.409229] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.419619] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 65.426288] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.440551] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 65.448661] team0: Port device team_slave_1 added [ 65.459675] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 65.468202] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 65.476086] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 65.490766] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 65.510282] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.517663] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.524493] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.533180] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 65.542487] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 65.549095] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.571052] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 65.578871] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.587946] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.596103] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.602481] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.609590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.617790] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.625439] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.631770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.639779] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 65.646205] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 65.671440] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 65.683985] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 65.690280] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 65.715753] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 65.727126] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 65.734184] team0: Port device team_slave_0 added [ 65.741881] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 65.749816] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 65.757544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.764528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.771921] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.779860] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.788123] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.794440] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.802578] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.810377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.818027] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.824355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.831919] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.843129] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.856806] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 65.863886] team0: Port device team_slave_1 added [ 65.870902] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 65.883791] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 65.901408] device hsr_slave_0 entered promiscuous mode [ 65.909792] device hsr_slave_1 entered promiscuous mode [ 65.917300] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 65.931564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 65.939468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 65.949322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 65.961129] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.971566] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.978738] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 65.986100] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 66.000124] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 66.006457] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 66.032336] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 66.044019] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 66.050890] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 66.076563] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 66.088422] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.096493] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.104018] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 66.112977] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 66.149306] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 66.157813] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 66.165997] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 66.173538] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.181782] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.191284] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 66.203446] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.215853] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 66.229618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.237403] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.245540] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 66.254167] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 66.263949] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 66.285826] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 66.300923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.308958] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.316896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.324317] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.335252] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 66.358663] device hsr_slave_0 entered promiscuous mode [ 66.364473] device hsr_slave_1 entered promiscuous mode [ 66.371164] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 66.380453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.388433] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.399696] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 66.407859] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 66.422428] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 66.430052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.437027] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.443772] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 66.451637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.459819] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 66.470262] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 66.477148] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 66.506036] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 66.513610] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.525352] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 66.532258] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.543089] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 66.549538] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 66.564461] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 66.573012] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 66.581395] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.593156] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 66.600725] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 66.620155] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 66.642586] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.650457] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.659171] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.665566] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.672776] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.682301] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 66.690241] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 66.699656] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.731403] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.739411] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.747323] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.753660] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.762830] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 66.795614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 66.803859] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 66.815944] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.824346] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 66.836436] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 66.843185] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 66.868965] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 66.878692] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 66.888607] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.897161] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 66.905774] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.912341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 66.921397] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 66.925350] Bluetooth: hci0 command 0x041b tx timeout [ 66.931857] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.942529] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.949938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.957342] Bluetooth: hci2 command 0x041b tx timeout [ 66.962782] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 66.971685] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 66.980822] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 66.990566] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.999466] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 67.005314] Bluetooth: hci5 command 0x041b tx timeout [ 67.006543] Bluetooth: hci1 command 0x041b tx timeout [ 67.011593] Bluetooth: hci4 command 0x041b tx timeout [ 67.019058] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.028797] Bluetooth: hci3 command 0x041b tx timeout [ 67.034503] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.042886] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.050838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 67.059498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.067744] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.074063] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.082267] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 67.092560] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 67.102998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.111328] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 67.121019] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 67.129544] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.138668] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.147250] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.154024] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.162584] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 67.173420] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 67.182049] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 67.190692] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 67.197873] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.204915] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.212727] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.222176] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.228549] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.236039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 67.243605] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.251533] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 67.259307] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 67.277484] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 67.285444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.296074] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 67.319436] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 67.327935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 67.337559] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 67.346044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 67.353699] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.361714] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.368101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.375676] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.383529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.395094] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 67.404476] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 67.413936] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 67.425705] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 67.432794] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 67.440457] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 67.449690] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 67.457245] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 67.465743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 67.473364] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 67.482078] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 67.490479] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.498823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.507140] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.513508] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.521138] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 67.530807] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 67.539997] 8021q: adding VLAN 0 to HW filter on device bond0 [ 67.549408] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 67.556627] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 67.569154] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 67.576644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.584425] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.592262] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 67.599923] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 67.607691] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.616013] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 67.622793] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 67.632267] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 67.639020] device veth0_vlan entered promiscuous mode [ 67.646863] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 67.654280] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 67.662396] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 67.670400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 67.677646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 67.684443] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 67.691680] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 67.699034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.707481] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.718025] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 67.724089] 8021q: adding VLAN 0 to HW filter on device team0 [ 67.731686] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 67.741339] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 67.749841] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 67.756906] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 67.765881] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 67.775377] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 67.782369] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.792591] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 67.800637] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.809117] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 67.817894] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.825854] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.832174] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.840070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.849146] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 67.867379] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 67.878224] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 67.891498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 67.899272] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 67.906981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.914735] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.922446] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.928844] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.936434] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.946256] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 67.955745] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 67.963985] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 67.971089] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 67.978469] device veth1_vlan entered promiscuous mode [ 67.984360] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 67.992661] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.000287] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 68.010719] device veth0_vlan entered promiscuous mode [ 68.017601] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 68.024844] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 68.031678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 68.039438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 68.047121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 68.055150] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.062613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 68.070828] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 68.077988] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 68.087252] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 68.096971] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 68.110957] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 68.123522] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 68.131569] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 68.139600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 68.147729] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 68.155431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.163460] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.173173] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 68.184434] device veth1_vlan entered promiscuous mode [ 68.190874] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 68.199446] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 68.207750] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 68.215567] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 68.222379] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 68.230109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 68.237959] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.245606] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.253625] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 68.262440] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 68.271810] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 68.282356] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 68.292782] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 68.300192] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 68.307300] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 68.314820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 68.322206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 68.330544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 68.341067] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 68.347248] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 68.357352] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 68.363394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 68.374059] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 68.384948] device veth0_macvtap entered promiscuous mode [ 68.391001] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 68.399575] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.407414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 68.416342] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 68.426628] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 68.435771] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 68.450891] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 68.459197] device veth1_macvtap entered promiscuous mode [ 68.466716] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 68.473908] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 68.482881] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 68.490284] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 68.498055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 68.507758] device veth0_macvtap entered promiscuous mode [ 68.513753] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 68.522228] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 68.533301] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 68.545845] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 68.554018] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 68.563877] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 68.575955] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 68.583189] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 68.591371] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 68.598459] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 68.605907] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 68.613576] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.622228] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 68.629341] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 68.637708] device veth1_macvtap entered promiscuous mode [ 68.643824] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 68.657607] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.666286] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 68.682299] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 68.723228] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 68.730788] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 68.744274] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 68.752772] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 68.761960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 68.772094] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 68.782283] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 68.791793] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 68.798789] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 68.808298] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 68.817454] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 68.829131] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 68.839301] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 68.849928] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.860217] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 68.867403] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 68.876599] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 68.883527] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 68.890305] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 68.900055] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 68.908328] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 68.921216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 68.929910] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 68.937991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 68.947655] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 68.957566] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 68.968685] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 68.975949] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 68.985249] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 68.992254] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 69.000965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 69.010556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 69.018904] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.019817] Bluetooth: hci2 command 0x040f tx timeout [ 69.032254] Bluetooth: hci0 command 0x040f tx timeout [ 69.033674] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.045175] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.064693] device veth0_vlan entered promiscuous mode [ 69.073841] device veth1_vlan entered promiscuous mode [ 69.081184] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 69.084971] Bluetooth: hci3 command 0x040f tx timeout [ 69.088825] Bluetooth: hci4 command 0x040f tx timeout [ 69.101447] Bluetooth: hci1 command 0x040f tx timeout [ 69.108191] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 69.121334] Bluetooth: hci5 command 0x040f tx timeout [ 69.140194] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 69.147934] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 69.154427] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 69.166875] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 69.176947] IPv6: ADDRCONF(NETDEV_UP): veth0_virt_wifi: link is not ready [ 69.187074] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 69.195845] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 69.203036] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 69.210739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 69.218381] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.228653] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 69.240328] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 69.250281] IPv6: ADDRCONF(NETDEV_UP): veth1_virt_wifi: link is not ready [ 69.258898] device veth0_vlan entered promiscuous mode [ 69.267194] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.274106] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.284256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 69.292577] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 69.300812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 69.308563] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 69.323341] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 69.337710] device veth1_vlan entered promiscuous mode [ 69.349051] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 69.360553] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 69.376475] device veth0_macvtap entered promiscuous mode [ 69.382717] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 69.394238] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 69.409415] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 69.417344] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 69.427816] device veth1_macvtap entered promiscuous mode [ 69.434068] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 69.443959] IPv6: ADDRCONF(NETDEV_UP): veth0_vlan: link is not ready [ 69.451592] IPv6: ADDRCONF(NETDEV_UP): vlan0: link is not ready [ 69.458808] IPv6: ADDRCONF(NETDEV_UP): vlan1: link is not ready [ 69.474421] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 69.484145] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 69.499022] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 69.507449] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 69.516093] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 69.523117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 69.531022] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.538844] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.546452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.555431] IPv6: ADDRCONF(NETDEV_UP): veth1_vlan: link is not ready [ 69.563678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 69.575619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 69.583002] device veth0_vlan entered promiscuous mode [ 69.593649] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 69.601426] device veth0_vlan entered promiscuous mode [ 69.610782] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 69.618429] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 69.625877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 69.633765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 69.643466] device veth1_vlan entered promiscuous mode [ 69.650613] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 69.660804] device veth0_macvtap entered promiscuous mode [ 69.672230] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 69.680756] device veth1_vlan entered promiscuous mode [ 69.692882] IPv6: ADDRCONF(NETDEV_UP): macvlan0: link is not ready [ 69.704036] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 69.717213] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 69.725259] device veth1_macvtap entered promiscuous mode [ 69.734245] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 69.745701] IPv6: ADDRCONF(NETDEV_UP): macvlan1: link is not ready [ 69.764085] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 69.773915] hrtimer: interrupt took 26501 ns [ 69.779275] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 69.791809] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 69.802426] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 69.813763] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 69.822266] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 69.844450] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready 03:17:52 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) r6 = getpgid(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000280)="8d", 0x1}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) [ 69.858448] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 69.871303] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 69.889060] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 69.896868] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 69.900369] blktrace: Concurrent blktraces are not allowed on sg0 [ 69.904102] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 69.925294] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 69.932488] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 69.945982] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 69.955956] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 69.966557] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 69.977171] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 69.987809] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 69.999053] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 70.006102] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 70.014945] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 70.023971] IPv6: ADDRCONF(NETDEV_UP): veth0_macvtap: link is not ready [ 70.033238] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 70.053842] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 03:17:52 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) r6 = getpgid(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000280)="8d", 0x1}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) [ 70.069384] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 70.079358] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 70.094040] device veth0_macvtap entered promiscuous mode [ 70.103172] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready 03:17:52 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'gre0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @multicast2, @multicast1}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x7800, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}}) [ 70.114281] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 70.127865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 70.140299] blktrace: Concurrent blktraces are not allowed on sg0 [ 70.143815] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 70.162768] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 70.171217] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 70.199373] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.209438] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 70.223727] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.236372] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 70.246727] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.257654] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 70.265680] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 70.274308] device veth1_macvtap entered promiscuous mode [ 70.282259] IPv6: ADDRCONF(NETDEV_UP): macsec0: link is not ready [ 70.293563] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 70.304917] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 70.312655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 70.320662] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 70.328533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 70.354235] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 03:17:52 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) r6 = getpgid(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000280)="8d", 0x1}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) [ 70.368087] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.379475] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 70.391708] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.397121] blktrace: Concurrent blktraces are not allowed on sg0 [ 70.407296] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 70.407333] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.411110] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 70.433650] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 70.461391] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 70.470636] device veth0_macvtap entered promiscuous mode [ 70.479609] IPv6: ADDRCONF(NETDEV_UP): macvtap0: link is not ready [ 70.487472] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 70.499461] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 70.507653] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 03:17:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'gre0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @multicast2, @multicast1}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x7800, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}}) 03:17:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'gre0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @multicast2, @multicast1}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x7800, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}}) [ 70.528237] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 70.571189] device veth1_macvtap entered promiscuous mode [ 70.612643] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 70.628272] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.637522] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 70.648220] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.658405] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 70.668618] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.678173] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 70.688595] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.700445] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 70.708239] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 70.722518] IPv6: ADDRCONF(NETDEV_UP): veth0_to_batadv: link is not ready [ 70.739033] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 70.747788] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 03:17:53 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'gre0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @multicast2, @multicast1}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x7800, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}}) [ 70.760045] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 70.770981] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.786302] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 70.796341] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.806957] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 70.817593] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.827353] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 70.837944] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.855542] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 70.862430] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 70.873477] IPv6: ADDRCONF(NETDEV_UP): veth1_to_batadv: link is not ready [ 70.885674] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 70.893635] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 70.918162] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 70.942148] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.952222] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 70.963568] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.973113] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 70.983275] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 70.992809] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 71.002937] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.012502] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 71.022602] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.033220] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_0: link is not ready [ 71.041101] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 71.053125] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 71.062159] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 71.077292] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 71.085018] Bluetooth: hci2 command 0x0419 tx timeout [ 71.091635] Bluetooth: hci0 command 0x0419 tx timeout [ 71.119607] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.129200] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 71.139071] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.148444] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 71.158255] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.168725] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 71.174719] Bluetooth: hci5 command 0x0419 tx timeout [ 71.178738] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.187914] Bluetooth: hci1 command 0x0419 tx timeout [ 71.192762] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 71.203147] Bluetooth: hci4 command 0x0419 tx timeout [ 71.207675] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 71.214061] Bluetooth: hci3 command 0x0419 tx timeout [ 71.223199] IPv6: ADDRCONF(NETDEV_UP): batadv_slave_1: link is not ready [ 71.235206] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 71.243186] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 71.255885] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 03:17:53 executing program 5: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000000)={0x0, "151b5aee5ed87c58dba2b61ec55f0121180964be764794d42a5ad61ceb318d35", 0xffffffffffffffff}) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, 0x0) 03:17:54 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='devices.list\x00', 0x275a, 0x0) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000000)="fb7e7830e3f60aa1f6b5ad50b01cd68f0bb9b53e1d2da1a9158764ee9f575ae0beddbe6d9b2e558a1d0a0e468998aeff", 0x30}, {&(0x7f00000000c0)="382b533fe7f0ca25aef7381daee5de32e6", 0x11}], 0x2) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f00000000c0)=""/4079, &(0x7f0000000040)=0xfef) 03:17:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='auxv\x00') read$FUSE(r0, 0x0, 0x0) 03:17:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'gre0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @multicast2, @multicast1}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x7800, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}}) 03:17:54 executing program 3: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) r6 = getpgid(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000280)="8d", 0x1}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 03:17:54 executing program 5: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000000)={0x0, "151b5aee5ed87c58dba2b61ec55f0121180964be764794d42a5ad61ceb318d35", 0xffffffffffffffff}) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, 0x0) 03:17:54 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x1ff, 0x8002) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x7) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000080)={0x0, 0x0, "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"}) 03:17:54 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='devices.list\x00', 0x275a, 0x0) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000000)="fb7e7830e3f60aa1f6b5ad50b01cd68f0bb9b53e1d2da1a9158764ee9f575ae0beddbe6d9b2e558a1d0a0e468998aeff", 0x30}, {&(0x7f00000000c0)="382b533fe7f0ca25aef7381daee5de32e6", 0x11}], 0x2) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f00000000c0)=""/4079, &(0x7f0000000040)=0xfef) 03:17:54 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x1ff, 0x8002) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x7) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000080)={0x0, 0x0, "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"}) 03:17:54 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x84) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='devices.list\x00', 0x275a, 0x0) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000000)="fb7e7830e3f60aa1f6b5ad50b01cd68f0bb9b53e1d2da1a9158764ee9f575ae0beddbe6d9b2e558a1d0a0e468998aeff", 0x30}, {&(0x7f00000000c0)="382b533fe7f0ca25aef7381daee5de32e6", 0x11}], 0x2) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r1, 0x0) getsockopt$bt_hci(r0, 0x84, 0x9, &(0x7f00000000c0)=""/4079, &(0x7f0000000040)=0xfef) 03:17:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='auxv\x00') read$FUSE(r0, 0x0, 0x0) 03:17:54 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x1ff, 0x8002) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x7) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000080)={0x0, 0x0, "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"}) 03:17:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='auxv\x00') read$FUSE(r0, 0x0, 0x0) 03:17:54 executing program 5: r0 = openat$sw_sync(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SW_SYNC_IOC_CREATE_FENCE(r0, 0xc0285700, &(0x7f0000000000)={0x0, "151b5aee5ed87c58dba2b61ec55f0121180964be764794d42a5ad61ceb318d35", 0xffffffffffffffff}) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, 0x0) 03:17:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='auxv\x00') read$FUSE(r0, 0x0, 0x0) [ 71.644352] blktrace: Concurrent blktraces are not allowed on sg0 03:17:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000100)={'gre0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @multicast2, @multicast1}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000040)={'gre0\x00', 0x0, 0x7800, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}}) 03:17:54 executing program 3: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) r6 = getpgid(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000280)="8d", 0x1}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 03:17:54 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x1ff, 0x8002) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x7) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000080)={0x0, 0x0, "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"}) 03:17:54 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) r6 = getpgid(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000280)="8d", 0x1}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 03:17:54 executing program 1: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) r6 = getpgid(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000280)="8d", 0x1}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 03:17:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='auxv\x00') read$FUSE(r0, 0x0, 0x0) 03:17:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='auxv\x00') read$FUSE(r0, 0x0, 0x0) 03:17:54 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x1ff, 0x8002) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x7) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000080)={0x0, 0x0, "ecbd9015222328169956c0b54031f60f217735c0bdebe646fec8cf9bd26f795fdd23f7a7a3431c6785af77b6a0dd3c4f0f2f1c75900d3ca71f162b81db01975c124d6906444b5aa46002f6540346ca5de06d18bb88205988ec74c70d630a2d0d23262e80855b684325dd7cf8f90285a4b9505f31685d4e6dc8be2f629ca159831737dc89ae3bb4d7b10a4d87d38b87635c3c7757cc42a2f4b6372e314132daa646337907b35a7347f267d8bd35c00def99f9ae07006f38ffde93f1dcb34baa42d7f6423ef2edbcb26a4dbe0d1dbbef3603f451cdb1087644f2863d75d925e191d90a1d0e3c821e193490b06b84dbbf3efefc26d4babe4db48f4b842b914828a1"}) [ 71.804929] blktrace: Concurrent blktraces are not allowed on sg0 [ 71.839335] blktrace: Concurrent blktraces are not allowed on sg0 03:17:54 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) r6 = getpgid(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000280)="8d", 0x1}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 03:17:54 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x1ff, 0x8002) ioctl$USBDEVFS_DROP_PRIVILEGES(r0, 0x4004551e, &(0x7f0000000000)=0x7) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000080)={0x0, 0x0, "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"}) 03:17:54 executing program 1: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) r6 = getpgid(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000280)="8d", 0x1}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 03:17:54 executing program 2: sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)}}], 0x1, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4), 0x4d9, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x15c, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @multicast1}, @in6=@dev}}, [@migrate={0x10c}]}, 0x15c}}, 0x0) [ 71.907188] blktrace: Concurrent blktraces are not allowed on sg0 03:17:54 executing program 3: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) r6 = getpgid(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000280)="8d", 0x1}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 03:17:54 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) r6 = getpgid(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000280)="8d", 0x1}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 03:17:54 executing program 2: sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)}}], 0x1, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4), 0x4d9, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x15c, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @multicast1}, @in6=@dev}}, [@migrate={0x10c}]}, 0x15c}}, 0x0) 03:17:54 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) mount$fuseblk(&(0x7f0000000140), &(0x7f0000002040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) [ 71.978149] blktrace: Concurrent blktraces are not allowed on sg0 [ 71.985839] blktrace: Concurrent blktraces are not allowed on sg0 03:17:54 executing program 2: sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)}}], 0x1, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4), 0x4d9, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x15c, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @multicast1}, @in6=@dev}}, [@migrate={0x10c}]}, 0x15c}}, 0x0) 03:17:54 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) mount$fuseblk(&(0x7f0000000140), &(0x7f0000002040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 03:17:54 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) r6 = getpgid(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000280)="8d", 0x1}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 03:17:54 executing program 1: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) r6 = getpgid(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000280)="8d", 0x1}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 03:17:54 executing program 5: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) r6 = getpgid(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000280)="8d", 0x1}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) [ 72.074014] blktrace: Concurrent blktraces are not allowed on sg0 [ 72.083555] blktrace: Concurrent blktraces are not allowed on sg0 [ 72.094348] blktrace: Concurrent blktraces are not allowed on sg0 03:17:54 executing program 2: sendmmsg(0xffffffffffffffff, &(0x7f0000000140)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)}}], 0x1, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={&(0x7f0000f4dff4), 0x4d9, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x15c, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @multicast1}, @in6=@dev}}, [@migrate={0x10c}]}, 0x15c}}, 0x0) 03:17:54 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='svcrdma_qp_error\x00'}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000040), 0x43) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 03:17:54 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000300), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='lock_acquire\x00', r4}, 0x10) r6 = getpgid(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000280)="8d", 0x1}], 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r3, {0x1}}, './file0\x00'}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 03:17:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r1, 0x40001) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendmmsg(r0, &(0x7f00000007c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="17", 0x1}], 0x1}}], 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r3) sendfile(r0, r1, 0x0, 0x100000000002) 03:17:54 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x5452, &(0x7f0000000040)={'geneve1\x00', @remote}) close(r1) 03:17:54 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) mount$fuseblk(&(0x7f0000000140), &(0x7f0000002040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 03:17:54 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r0, 0x40045109, 0xfffffffffffffffe) 03:17:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r1, 0x40001) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendmmsg(r0, &(0x7f00000007c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="17", 0x1}], 0x1}}], 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r3) sendfile(r0, r1, 0x0, 0x100000000002) 03:17:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r1, 0x40001) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendmmsg(r0, &(0x7f00000007c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="17", 0x1}], 0x1}}], 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r3) sendfile(r0, r1, 0x0, 0x100000000002) 03:17:54 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x5452, &(0x7f0000000040)={'geneve1\x00', @remote}) close(r1) 03:17:54 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r0, 0x40045109, 0xfffffffffffffffe) 03:17:54 executing program 4: creat(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) mount$fuseblk(&(0x7f0000000140), &(0x7f0000002040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) 03:17:54 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x5452, &(0x7f0000000040)={'geneve1\x00', @remote}) close(r1) 03:17:55 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r0, 0x40045109, 0xfffffffffffffffe) 03:17:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r1, 0x40001) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendmmsg(r0, &(0x7f00000007c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="17", 0x1}], 0x1}}], 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r3) sendfile(r0, r1, 0x0, 0x100000000002) 03:17:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r1, 0x40001) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendmmsg(r0, &(0x7f00000007c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="17", 0x1}], 0x1}}], 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r3) sendfile(r0, r1, 0x0, 0x100000000002) 03:17:55 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x5452, &(0x7f0000000040)={'geneve1\x00', @remote}) close(r1) 03:17:55 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='svcrdma_qp_error\x00'}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000040), 0x43) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 03:17:55 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x5452, &(0x7f0000000040)={'geneve1\x00', @remote}) close(r1) 03:17:55 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SNDCTL_SEQ_RESETSAMPLES(r0, 0x40045109, 0xfffffffffffffffe) 03:17:55 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x5452, &(0x7f0000000040)={'geneve1\x00', @remote}) close(r1) 03:17:55 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='svcrdma_qp_error\x00'}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000040), 0x43) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 03:17:55 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r1, 0x40001) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendmmsg(r0, &(0x7f00000007c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="17", 0x1}], 0x1}}], 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r3) sendfile(r0, r1, 0x0, 0x100000000002) 03:17:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = memfd_create(&(0x7f00005f8ffe)='#}\x00', 0x0) ftruncate(r1, 0x40001) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000e4effc)=0x4, 0x4) sendmmsg(r0, &(0x7f00000007c0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)="17", 0x1}], 0x1}}], 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r3) sendfile(r0, r1, 0x0, 0x100000000002) 03:17:55 executing program 4: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x5452, &(0x7f0000000040)={'geneve1\x00', @remote}) close(r1) 03:17:55 executing program 2: perf_event_open(&(0x7f0000003280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0xf787f9dc301e087f, 0x0, 0x0, {{@in6=@local, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@dev, 0x0, 0x33}, @in, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'digest_null\x00'}}}]}, 0x138}}, 0x0) 03:17:55 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000200), 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x19a, 0x0, 0x0) 03:17:55 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) 03:17:55 executing program 2: perf_event_open(&(0x7f0000003280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0xf787f9dc301e087f, 0x0, 0x0, {{@in6=@local, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@dev, 0x0, 0x33}, @in, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'digest_null\x00'}}}]}, 0x138}}, 0x0) 03:17:55 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='svcrdma_qp_error\x00'}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000040), 0x43) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 03:17:55 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) 03:17:55 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000200), 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x19a, 0x0, 0x0) 03:17:55 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c0000001800003ffc033c6a539d7caf72eb8e340f04fd03006c000008001000f79caffacefcaed2a86df8ffffff08000300ab994cb614a6812cd013a8dadc13532600006f7002"], 0x2c}}, 0x0) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x3}, 0x6) r1 = socket(0x11, 0x800000003, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r2, &(0x7f0000000400)=ANY=[@ANYRES32=r3, @ANYRES16=r1], 0x6db6e571) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r2, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0', "7a7925e639"}, 0x9) 03:17:55 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='svcrdma_qp_error\x00'}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000040), 0x43) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 03:17:55 executing program 2: perf_event_open(&(0x7f0000003280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0xf787f9dc301e087f, 0x0, 0x0, {{@in6=@local, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@dev, 0x0, 0x33}, @in, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'digest_null\x00'}}}]}, 0x138}}, 0x0) 03:17:55 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) 03:17:55 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000200), 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x19a, 0x0, 0x0) 03:17:55 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'IDLETIMER\x00'}, &(0x7f0000000040)=0x1e) 03:17:55 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c0000001800003ffc033c6a539d7caf72eb8e340f04fd03006c000008001000f79caffacefcaed2a86df8ffffff08000300ab994cb614a6812cd013a8dadc13532600006f7002"], 0x2c}}, 0x0) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x3}, 0x6) r1 = socket(0x11, 0x800000003, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r2, &(0x7f0000000400)=ANY=[@ANYRES32=r3, @ANYRES16=r1], 0x6db6e571) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r2, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0', "7a7925e639"}, 0x9) 03:17:55 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000200), 0x80, 0x0}}], 0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x19a, 0x0, 0x0) 03:17:55 executing program 2: perf_event_open(&(0x7f0000003280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000700)=@newsa={0x138, 0x10, 0xf787f9dc301e087f, 0x0, 0x0, {{@in6=@local, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@dev, 0x0, 0x33}, @in, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth={0x48, 0x1, {{'digest_null\x00'}}}]}, 0x138}}, 0x0) 03:17:55 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x84, 0x6b, 0x20000000, 0x4000000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x84, 0x3, 0x20000000, 0x4000000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'broute\x00', 0x0, 0x0, 0x0, [0x7, 0x7, 0x3, 0xffffffff, 0x8, 0x6]}, &(0x7f0000000100)=0x78) r3 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_mreq(r3, 0x29, 0x0, 0x0, &(0x7f0000002940)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x62, r4}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000001500)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x190, 0x260, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, &(0x7f00000014c0), {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d5], 0x7fffffff, 0x2, 0x7}}, @common=@srh1={{0x90}, {0x11, 0x40, 0x81, 0x3, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, [0xff000000, 0xff000000, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffff00], 0x1010, 0x820}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x7], 0x24d8e8c8, 0x4, 0x3}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 03:17:55 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='svcrdma_qp_error\x00'}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000040), 0x43) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 03:17:55 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) connect$pppl2tp(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x2, 0xffeffffd}}, 0x2e) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x4, 0x20002001, 0x4) 03:17:55 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) 03:17:55 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x43400) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.time_recursive\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='svcrdma_qp_error\x00'}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000040), 0x43) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) 03:17:55 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) connect$pppl2tp(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x2, 0xffeffffd}}, 0x2e) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x4, 0x20002001, 0x4) 03:17:55 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x84, 0x6b, 0x20000000, 0x4000000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x84, 0x3, 0x20000000, 0x4000000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'broute\x00', 0x0, 0x0, 0x0, [0x7, 0x7, 0x3, 0xffffffff, 0x8, 0x6]}, &(0x7f0000000100)=0x78) r3 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_mreq(r3, 0x29, 0x0, 0x0, &(0x7f0000002940)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x62, r4}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000001500)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x190, 0x260, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, &(0x7f00000014c0), {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d5], 0x7fffffff, 0x2, 0x7}}, @common=@srh1={{0x90}, {0x11, 0x40, 0x81, 0x3, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, [0xff000000, 0xff000000, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffff00], 0x1010, 0x820}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x7], 0x24d8e8c8, 0x4, 0x3}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 03:17:55 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c0000001800003ffc033c6a539d7caf72eb8e340f04fd03006c000008001000f79caffacefcaed2a86df8ffffff08000300ab994cb614a6812cd013a8dadc13532600006f7002"], 0x2c}}, 0x0) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x3}, 0x6) r1 = socket(0x11, 0x800000003, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r2, &(0x7f0000000400)=ANY=[@ANYRES32=r3, @ANYRES16=r1], 0x6db6e571) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r2, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0', "7a7925e639"}, 0x9) 03:17:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x84, 0x6b, 0x20000000, 0x4000000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x84, 0x3, 0x20000000, 0x4000000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'broute\x00', 0x0, 0x0, 0x0, [0x7, 0x7, 0x3, 0xffffffff, 0x8, 0x6]}, &(0x7f0000000100)=0x78) r3 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_mreq(r3, 0x29, 0x0, 0x0, &(0x7f0000002940)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x62, r4}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000001500)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x190, 0x260, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, &(0x7f00000014c0), {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d5], 0x7fffffff, 0x2, 0x7}}, @common=@srh1={{0x90}, {0x11, 0x40, 0x81, 0x3, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, [0xff000000, 0xff000000, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffff00], 0x1010, 0x820}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x7], 0x24d8e8c8, 0x4, 0x3}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 03:17:56 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) connect$pppl2tp(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x2, 0xffeffffd}}, 0x2e) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x4, 0x20002001, 0x4) 03:17:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x84, 0x6b, 0x20000000, 0x4000000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x84, 0x3, 0x20000000, 0x4000000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'broute\x00', 0x0, 0x0, 0x0, [0x7, 0x7, 0x3, 0xffffffff, 0x8, 0x6]}, &(0x7f0000000100)=0x78) r3 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_mreq(r3, 0x29, 0x0, 0x0, &(0x7f0000002940)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x62, r4}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000001500)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x190, 0x260, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, &(0x7f00000014c0), {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d5], 0x7fffffff, 0x2, 0x7}}, @common=@srh1={{0x90}, {0x11, 0x40, 0x81, 0x3, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, [0xff000000, 0xff000000, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffff00], 0x1010, 0x820}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x7], 0x24d8e8c8, 0x4, 0x3}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 03:17:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x84, 0x6b, 0x20000000, 0x4000000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x84, 0x3, 0x20000000, 0x4000000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'broute\x00', 0x0, 0x0, 0x0, [0x7, 0x7, 0x3, 0xffffffff, 0x8, 0x6]}, &(0x7f0000000100)=0x78) r3 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_mreq(r3, 0x29, 0x0, 0x0, &(0x7f0000002940)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x62, r4}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000001500)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x190, 0x260, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, &(0x7f00000014c0), {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d5], 0x7fffffff, 0x2, 0x7}}, @common=@srh1={{0x90}, {0x11, 0x40, 0x81, 0x3, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, [0xff000000, 0xff000000, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffff00], 0x1010, 0x820}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x7], 0x24d8e8c8, 0x4, 0x3}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 03:17:56 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c0000001800003ffc033c6a539d7caf72eb8e340f04fd03006c000008001000f79caffacefcaed2a86df8ffffff08000300ab994cb614a6812cd013a8dadc13532600006f7002"], 0x2c}}, 0x0) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffff, 0x3}, 0x6) r1 = socket(0x11, 0x800000003, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_percpu_sys\x00', 0x275a, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) write$binfmt_script(r2, &(0x7f0000000400)=ANY=[@ANYRES32=r3, @ANYRES16=r1], 0x6db6e571) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r2, 0x0) write$binfmt_misc(r0, &(0x7f0000000000)={'syz0', "7a7925e639"}, 0x9) 03:17:56 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r2, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) connect$pppl2tp(r0, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x3, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x2, 0xffeffffd}}, 0x2e) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x4, 0x20002001, 0x4) 03:17:56 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) 03:17:56 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x84, 0x6b, 0x20000000, 0x4000000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x84, 0x3, 0x20000000, 0x4000000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'broute\x00', 0x0, 0x0, 0x0, [0x7, 0x7, 0x3, 0xffffffff, 0x8, 0x6]}, &(0x7f0000000100)=0x78) r3 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_mreq(r3, 0x29, 0x0, 0x0, &(0x7f0000002940)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x62, r4}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000001500)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x190, 0x260, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, &(0x7f00000014c0), {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d5], 0x7fffffff, 0x2, 0x7}}, @common=@srh1={{0x90}, {0x11, 0x40, 0x81, 0x3, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, [0xff000000, 0xff000000, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffff00], 0x1010, 0x820}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x7], 0x24d8e8c8, 0x4, 0x3}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 03:17:56 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x84, 0x6b, 0x20000000, 0x4000000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x84, 0x3, 0x20000000, 0x4000000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'broute\x00', 0x0, 0x0, 0x0, [0x7, 0x7, 0x3, 0xffffffff, 0x8, 0x6]}, &(0x7f0000000100)=0x78) r3 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_mreq(r3, 0x29, 0x0, 0x0, &(0x7f0000002940)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x62, r4}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000001500)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x190, 0x260, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, &(0x7f00000014c0), {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d5], 0x7fffffff, 0x2, 0x7}}, @common=@srh1={{0x90}, {0x11, 0x40, 0x81, 0x3, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, [0xff000000, 0xff000000, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffff00], 0x1010, 0x820}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x7], 0x24d8e8c8, 0x4, 0x3}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 03:17:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x84, 0x6b, 0x20000000, 0x4000000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x84, 0x3, 0x20000000, 0x4000000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'broute\x00', 0x0, 0x0, 0x0, [0x7, 0x7, 0x3, 0xffffffff, 0x8, 0x6]}, &(0x7f0000000100)=0x78) r3 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_mreq(r3, 0x29, 0x0, 0x0, &(0x7f0000002940)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x62, r4}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000001500)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x190, 0x260, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, &(0x7f00000014c0), {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d5], 0x7fffffff, 0x2, 0x7}}, @common=@srh1={{0x90}, {0x11, 0x40, 0x81, 0x3, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, [0xff000000, 0xff000000, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffff00], 0x1010, 0x820}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x7], 0x24d8e8c8, 0x4, 0x3}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 03:17:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x9, 0x3, 0x1c0, 0x98, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x128, 0xffffffff, 0xffffffff, 0x128, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@ip={@multicast1, @broadcast, 0x0, 0x0, 'veth0_virt_wifi\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x9, 0x3, 0x1c0, 0x98, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x128, 0xffffffff, 0xffffffff, 0x128, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@ip={@multicast1, @broadcast, 0x0, 0x0, 'veth0_virt_wifi\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) 03:17:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="04594b3e57e8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x7000}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:17:56 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x84, 0x6b, 0x20000000, 0x4000000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x84, 0x3, 0x20000000, 0x4000000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'broute\x00', 0x0, 0x0, 0x0, [0x7, 0x7, 0x3, 0xffffffff, 0x8, 0x6]}, &(0x7f0000000100)=0x78) r3 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_mreq(r3, 0x29, 0x0, 0x0, &(0x7f0000002940)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x62, r4}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000001500)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x190, 0x260, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, &(0x7f00000014c0), {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d5], 0x7fffffff, 0x2, 0x7}}, @common=@srh1={{0x90}, {0x11, 0x40, 0x81, 0x3, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, [0xff000000, 0xff000000, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffff00], 0x1010, 0x820}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x7], 0x24d8e8c8, 0x4, 0x3}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 03:17:56 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x84, 0x6b, 0x20000000, 0x4000000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x84, 0x3, 0x20000000, 0x4000000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'broute\x00', 0x0, 0x0, 0x0, [0x7, 0x7, 0x3, 0xffffffff, 0x8, 0x6]}, &(0x7f0000000100)=0x78) r3 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_mreq(r3, 0x29, 0x0, 0x0, &(0x7f0000002940)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x62, r4}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000001500)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x190, 0x260, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, &(0x7f00000014c0), {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d5], 0x7fffffff, 0x2, 0x7}}, @common=@srh1={{0x90}, {0x11, 0x40, 0x81, 0x3, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, [0xff000000, 0xff000000, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffff00], 0x1010, 0x820}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x7], 0x24d8e8c8, 0x4, 0x3}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 03:17:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x9, 0x3, 0x1c0, 0x98, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x128, 0xffffffff, 0xffffffff, 0x128, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@ip={@multicast1, @broadcast, 0x0, 0x0, 'veth0_virt_wifi\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x9, 0x3, 0x1c0, 0x98, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x128, 0xffffffff, 0xffffffff, 0x128, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@ip={@multicast1, @broadcast, 0x0, 0x0, 'veth0_virt_wifi\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) [ 74.086713] ip_tables: iptables: counters copy to user failed while replacing table 03:17:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x84, 0x6b, 0x20000000, 0x4000000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x84, 0x3, 0x20000000, 0x4000000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'broute\x00', 0x0, 0x0, 0x0, [0x7, 0x7, 0x3, 0xffffffff, 0x8, 0x6]}, &(0x7f0000000100)=0x78) r3 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_mreq(r3, 0x29, 0x0, 0x0, &(0x7f0000002940)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x62, r4}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000001500)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x190, 0x260, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, &(0x7f00000014c0), {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d5], 0x7fffffff, 0x2, 0x7}}, @common=@srh1={{0x90}, {0x11, 0x40, 0x81, 0x3, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, [0xff000000, 0xff000000, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffff00], 0x1010, 0x820}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x7], 0x24d8e8c8, 0x4, 0x3}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 03:17:56 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x84, 0x6b, 0x20000000, 0x4000000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x84, 0x3, 0x20000000, 0x4000000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'broute\x00', 0x0, 0x0, 0x0, [0x7, 0x7, 0x3, 0xffffffff, 0x8, 0x6]}, &(0x7f0000000100)=0x78) r3 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_mreq(r3, 0x29, 0x0, 0x0, &(0x7f0000002940)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x62, r4}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000001500)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x190, 0x260, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, &(0x7f00000014c0), {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d5], 0x7fffffff, 0x2, 0x7}}, @common=@srh1={{0x90}, {0x11, 0x40, 0x81, 0x3, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, [0xff000000, 0xff000000, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffff00], 0x1010, 0x820}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x7], 0x24d8e8c8, 0x4, 0x3}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) 03:17:56 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x84, 0x6b, 0x20000000, 0x4000000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x84, 0x3, 0x20000000, 0x4000000) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000080)={'broute\x00', 0x0, 0x0, 0x0, [0x7, 0x7, 0x3, 0xffffffff, 0x8, 0x6]}, &(0x7f0000000100)=0x78) r3 = socket$l2tp6(0xa, 0x2, 0x73) getsockopt$inet6_mreq(r3, 0x29, 0x0, 0x0, &(0x7f0000002940)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x62, r4}) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000001500)=@filter={'filter\x00', 0xe, 0x4, 0x430, 0xffffffff, 0x0, 0x190, 0x260, 0xffffffff, 0xffffffff, 0x360, 0x360, 0x360, 0xffffffff, 0x4, &(0x7f00000014c0), {[{{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@ah={{0x30}, {[0x4d5, 0x4d5], 0x7fffffff, 0x2, 0x7}}, @common=@srh1={{0x90}, {0x11, 0x40, 0x81, 0x3, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @private2={0xfc, 0x2, '\x00', 0x1}, [0xff000000, 0xff000000, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffffff], [0x0, 0xffffff00, 0xff, 0xffffff00], 0x1010, 0x820}}]}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x8}}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@frag={{0x30}, {[0x7], 0x24d8e8c8, 0x4, 0x3}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x2}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x490) [ 74.096124] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 74.096382] ip_tables: iptables: counters copy to user failed while replacing table [ 74.178552] ip_tables: iptables: counters copy to user failed while replacing table [ 74.185403] ip_tables: iptables: counters copy to user failed while replacing table [ 74.220847] kvm: emulating exchange as write 03:17:57 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) 03:17:57 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x9, 0x3, 0x1c0, 0x98, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x128, 0xffffffff, 0xffffffff, 0x128, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@ip={@multicast1, @broadcast, 0x0, 0x0, 'veth0_virt_wifi\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x9, 0x3, 0x1c0, 0x98, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x128, 0xffffffff, 0xffffffff, 0x128, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@ip={@multicast1, @broadcast, 0x0, 0x0, 'veth0_virt_wifi\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) 03:17:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x9, 0x3, 0x1c0, 0x98, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x128, 0xffffffff, 0xffffffff, 0x128, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@ip={@multicast1, @broadcast, 0x0, 0x0, 'veth0_virt_wifi\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x9, 0x3, 0x1c0, 0x98, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x128, 0xffffffff, 0xffffffff, 0x128, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@ip={@multicast1, @broadcast, 0x0, 0x0, 'veth0_virt_wifi\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) 03:17:57 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) 03:17:57 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) 03:17:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="04594b3e57e8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x7000}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:17:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x9, 0x3, 0x1c0, 0x98, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x128, 0xffffffff, 0xffffffff, 0x128, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@ip={@multicast1, @broadcast, 0x0, 0x0, 'veth0_virt_wifi\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x9, 0x3, 0x1c0, 0x98, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x128, 0xffffffff, 0xffffffff, 0x128, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@ip={@multicast1, @broadcast, 0x0, 0x0, 'veth0_virt_wifi\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) 03:17:57 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x9, 0x3, 0x1c0, 0x98, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x128, 0xffffffff, 0xffffffff, 0x128, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@ip={@multicast1, @broadcast, 0x0, 0x0, 'veth0_virt_wifi\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x9, 0x3, 0x1c0, 0x98, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x128, 0xffffffff, 0xffffffff, 0x128, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@ip={@multicast1, @broadcast, 0x0, 0x0, 'veth0_virt_wifi\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) [ 75.040784] ip_tables: iptables: counters copy to user failed while replacing table [ 75.044407] ip_tables: iptables: counters copy to user failed while replacing table [ 75.065694] ip_tables: iptables: counters copy to user failed while replacing table [ 75.076803] ip_tables: iptables: counters copy to user failed while replacing table [ 75.110470] ip_tables: iptables: counters copy to user failed while replacing table [ 75.112487] ip_tables: iptables: counters copy to user failed while replacing table 03:17:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x9, 0x3, 0x1c0, 0x98, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x128, 0xffffffff, 0xffffffff, 0x128, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@ip={@multicast1, @broadcast, 0x0, 0x0, 'veth0_virt_wifi\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x9, 0x3, 0x1c0, 0x98, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x128, 0xffffffff, 0xffffffff, 0x128, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0xffffffffffffffff}, {0xffffffffffffffff}}}}, {{@ip={@multicast1, @broadcast, 0x0, 0x0, 'veth0_virt_wifi\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0x90}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x220) 03:17:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="04594b3e57e8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x7000}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:17:58 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) 03:17:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="04594b3e57e8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x7000}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:17:59 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) 03:17:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="04594b3e57e8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x7000}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:17:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="04594b3e57e8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x7000}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:17:59 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) 03:17:59 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) 03:17:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="04594b3e57e8"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x7000}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:17:59 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) 03:17:59 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) 03:17:59 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) 03:18:00 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) 03:18:00 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) 03:18:00 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) 03:18:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1200}, [@RTA_METRICS={0x8, 0x8, 0x0, 0x1, "f9a0e13d"}]}, 0x24}}, 0x0) 03:18:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1200}, [@RTA_METRICS={0x8, 0x8, 0x0, 0x1, "f9a0e13d"}]}, 0x24}}, 0x0) 03:18:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1200}, [@RTA_METRICS={0x8, 0x8, 0x0, 0x1, "f9a0e13d"}]}, 0x24}}, 0x0) [ 78.088380] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 78.088405] IPv6: NLM_F_CREATE should be set when creating new route 03:18:00 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) [ 78.135434] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 03:18:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=@ipv6_newroute={0x24, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1200}, [@RTA_METRICS={0x8, 0x8, 0x0, 0x1, "f9a0e13d"}]}, 0x24}}, 0x0) [ 78.271638] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 03:18:00 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x16, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) [ 78.318651] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE 03:18:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x16, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 03:18:01 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x16, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 03:18:01 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) 03:18:02 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) 03:18:02 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x16, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 03:18:02 executing program 2: setfsgid(0xee00) setfsgid(0xee00) 03:18:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'veth1_macvtap\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="2000000010000104000100"/20, @ANYRES32=r1, @ANYBLOB="82"], 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x2280b}}, 0x20}}, 0x0) 03:18:02 executing program 5: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 03:18:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'veth1_macvtap\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="2000000010000104000100"/20, @ANYRES32=r1, @ANYBLOB="82"], 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x2280b}}, 0x20}}, 0x0) [ 79.501285] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 79.501464] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 79.547340] [ 79.547343] ====================================================== [ 79.547346] WARNING: possible circular locking dependency detected [ 79.547350] 4.14.275-syzkaller #0 Not tainted [ 79.547353] ------------------------------------------------------ [ 79.547356] syz-executor.5/10039 is trying to acquire lock: [ 79.547358] (sb_writers#6){.+.+}, at: [] vfs_fallocate+0x5c1/0x790 [ 79.547379] [ 79.547379] but task is already holding lock: [ 79.547381] (ashmem_mutex){+.+.}, at: [] ashmem_ioctl+0x27e/0xd00 [ 79.547396] [ 79.547396] which lock already depends on the new lock. [ 79.547396] [ 79.547398] [ 79.547398] the existing dependency chain (in reverse order) is: [ 79.547400] [ 79.547400] -> #3 (ashmem_mutex){+.+.}: [ 79.547416] __mutex_lock+0xc4/0x1310 [ 79.547423] ashmem_mmap+0x50/0x5c0 [ 79.547430] mmap_region+0xa1a/0x1220 [ 79.547436] do_mmap+0x5b3/0xcb0 [ 79.547442] vm_mmap_pgoff+0x14e/0x1a0 [ 79.547448] SyS_mmap_pgoff+0x249/0x510 [ 79.547455] do_syscall_64+0x1d5/0x640 [ 79.547462] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 79.547463] [ 79.547463] -> #2 (&mm->mmap_sem){++++}: [ 79.547474] __might_fault+0x137/0x1b0 [ 79.547482] _copy_to_user+0x27/0xd0 [ 79.547488] filldir+0x1d5/0x390 [ 79.547494] dcache_readdir+0x180/0x860 [ 79.547499] iterate_dir+0x1a0/0x5e0 [ 79.547504] SyS_getdents+0x125/0x240 [ 79.547510] do_syscall_64+0x1d5/0x640 [ 79.547515] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 79.547517] [ 79.547517] -> #1 (&type->i_mutex_dir_key#5){++++}: [ 79.547532] down_write+0x34/0x90 [ 79.547539] path_openat+0xde2/0x2970 [ 79.547546] do_filp_open+0x179/0x3c0 [ 79.547552] do_sys_open+0x296/0x410 [ 79.547557] do_syscall_64+0x1d5/0x640 [ 79.547564] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 79.547566] [ 79.547566] -> #0 (sb_writers#6){.+.+}: [ 79.547580] lock_acquire+0x170/0x3f0 [ 79.547588] __sb_start_write+0x64/0x260 [ 79.547593] vfs_fallocate+0x5c1/0x790 [ 79.547600] ashmem_shrink_scan.part.0+0x135/0x3d0 [ 79.547606] ashmem_ioctl+0x294/0xd00 [ 79.547611] do_vfs_ioctl+0x75a/0xff0 [ 79.547616] SyS_ioctl+0x7f/0xb0 [ 79.547622] do_syscall_64+0x1d5/0x640 [ 79.547629] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 79.547631] [ 79.547631] other info that might help us debug this: [ 79.547631] [ 79.547633] Chain exists of: [ 79.547633] sb_writers#6 --> &mm->mmap_sem --> ashmem_mutex [ 79.547633] [ 79.547645] Possible unsafe locking scenario: [ 79.547645] [ 79.547647] CPU0 CPU1 [ 79.547649] ---- ---- [ 79.547650] lock(ashmem_mutex); [ 79.547655] lock(&mm->mmap_sem); [ 79.547660] lock(ashmem_mutex); [ 79.547664] lock(sb_writers#6); [ 79.547671] [ 79.547671] *** DEADLOCK *** [ 79.547671] [ 79.547675] 1 lock held by syz-executor.5/10039: [ 79.547677] #0: (ashmem_mutex){+.+.}, at: [] ashmem_ioctl+0x27e/0xd00 [ 79.547690] [ 79.547690] stack backtrace: [ 79.547698] CPU: 0 PID: 10039 Comm: syz-executor.5 Not tainted 4.14.275-syzkaller #0 [ 79.547702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.547705] Call Trace: [ 79.547714] dump_stack+0x1b2/0x281 [ 79.547727] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 79.547737] __lock_acquire+0x2e0e/0x3f20 [ 79.547749] ? aa_file_perm+0x304/0xab0 [ 79.547757] ? __lock_acquire+0x5fc/0x3f20 [ 79.547765] ? trace_hardirqs_on+0x10/0x10 [ 79.547774] ? aa_path_link+0x3a0/0x3a0 [ 79.547781] ? _raw_spin_unlock_irqrestore+0xaf/0xe0 [ 79.547790] ? try_to_wake_up+0x6de/0x1100 [ 79.547798] ? trace_hardirqs_on+0x10/0x10 [ 79.547806] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 79.547815] lock_acquire+0x170/0x3f0 [ 79.547821] ? vfs_fallocate+0x5c1/0x790 [ 79.547832] __sb_start_write+0x64/0x260 [ 79.547838] ? vfs_fallocate+0x5c1/0x790 [ 79.547845] ? shmem_evict_inode+0x8b0/0x8b0 [ 79.547851] vfs_fallocate+0x5c1/0x790 [ 79.547859] ashmem_shrink_scan.part.0+0x135/0x3d0 [ 79.547867] ? mutex_trylock+0x152/0x1a0 [ 79.547874] ? ashmem_ioctl+0x27e/0xd00 [ 79.547882] ashmem_ioctl+0x294/0xd00 [ 79.547890] ? trace_hardirqs_on+0x10/0x10 [ 79.547897] ? lock_downgrade+0x740/0x740 [ 79.547904] ? ashmem_shrink_scan+0x80/0x80 [ 79.547912] ? futex_exit_release+0x220/0x220 [ 79.547922] ? ashmem_shrink_scan+0x80/0x80 [ 79.547928] do_vfs_ioctl+0x75a/0xff0 [ 79.547935] ? lock_acquire+0x170/0x3f0 [ 79.547941] ? ioctl_preallocate+0x1a0/0x1a0 [ 79.547949] ? __fget+0x265/0x3e0 [ 79.547956] ? do_vfs_ioctl+0xff0/0xff0 [ 79.547965] ? security_file_ioctl+0x83/0xb0 [ 79.547972] SyS_ioctl+0x7f/0xb0 [ 79.547978] ? do_vfs_ioctl+0xff0/0xff0 [ 79.547986] do_syscall_64+0x1d5/0x640 [ 79.547995] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 79.548001] RIP: 0033:0x7fc66f7a50e9 [ 79.548005] RSP: 002b:00007fc66e11a168 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 79.548014] RAX: ffffffffffffffda RBX: 00007fc66f8b7f60 RCX: 00007fc66f7a50e9 [ 79.548018] RDX: 0000000000000000 RSI: 000000000000770a RDI: 0000000000000005 [ 79.548022] RBP: 00007fc66f7ff08d R08: 0000000000000000 R09: 0000000000000000 03:18:02 executing program 2: setfsgid(0xee00) setfsgid(0xee00) 03:18:02 executing program 5: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 03:18:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'veth1_macvtap\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="2000000010000104000100"/20, @ANYRES32=r1, @ANYBLOB="82"], 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x2280b}}, 0x20}}, 0x0) 03:18:02 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) listen(r1, 0xda8c) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x8800) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x40046f41, 0x20000000) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x33, @private=0xa010100, 0x4e22, 0x0, 'sed\x00', 0x4, 0x7fff}, 0x2c) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000040)={0x0, 'team0\x00', {}, 0x7f}) accept4(r1, 0x0, 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0xd474718650f97f0d) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e21, 0x5, @private2, 0x5}}, 0x0, 0x0, 0x19, 0x0, "cd791a176bd16a4a3d769f75e1f10b939053829c8f7f60af67de314dbb4a082bdb34f4416bcdb80af8abc4c471eb6ad8e57ff5debab21c62a7df5473fdea61a70a0da6eea0211cbfaa1fded48553fc42"}, 0xd8) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400, 0x100}}) ioctl$TIOCL_PASTESEL(r4, 0x541c, &(0x7f0000000040)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x7) 03:18:02 executing program 4: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) [ 79.548027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 79.548032] R13: 00007ffd856288df R14: 00007fc66e11a300 R15: 0000000000022000 03:18:02 executing program 2: setfsgid(0xee00) setfsgid(0xee00) 03:18:04 executing program 5: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 03:18:04 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000280)={'veth1_macvtap\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="2000000010000104000100"/20, @ANYRES32=r1, @ANYBLOB="82"], 0x20}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newlink={0x20, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r1, 0x2280b}}, 0x20}}, 0x0) 03:18:04 executing program 2: setfsgid(0xee00) setfsgid(0xee00) 03:18:04 executing program 4: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 03:18:04 executing program 0: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 03:18:04 executing program 2: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 03:18:04 executing program 5: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 03:18:04 executing program 0: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 03:18:04 executing program 3: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) [ 81.568211] IPv6: ADDRCONF(NETDEV_UP): veth1_macvtap: link is not ready [ 81.588726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 03:18:04 executing program 4: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 03:18:04 executing program 2: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 03:18:04 executing program 1: setfsgid(0xee00) setfsgid(0xee00) 03:18:04 executing program 1: setfsgid(0xee00) setfsgid(0xee00) 03:18:04 executing program 2: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 03:18:04 executing program 0: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 03:18:04 executing program 3: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 03:18:04 executing program 5: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000bc0)={0x0, 0x80, 0x0, 0xff, 0x0, 0x40, 0x0, 0x6, 0x20000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7fc0000, 0x0, @perf_config_ext, 0xa04, 0x9, 0xffffffff, 0x4, 0x3ff, 0x0, 0xf8, 0x0, 0x8, 0x0, 0x1000}, 0x0, 0x4, r1, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000002000)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB, @ANYBLOB, @ANYBLOB="000000001c00ba92f553000001", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="03dcffff000000000000b7b581ed4c1a42cba4ffb93e4aaa9c942de27fd38bad531330978a4f04302a37060000000000000002c86c5f8ec7a99cea8b765bf4daec3b2c2b7a91a83470d156dd1b515f7e740ed1fe801e78b4a973697acb6c6b8a65c94b816d21029a0a569825bade49c1d11ec36695034cea"], 0x60}}, {{0x0, 0x0, &(0x7f0000003b00)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003d00)}}], 0x4, 0x40000001, 0x0) r2 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000b80)='./file0\x00', 0x101c0, 0x0) pselect6(0x40, &(0x7f0000000e00)={0x6, 0x4, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, &(0x7f0000000e80)={0x5, 0x0, 0x1ff, 0x0, 0x6, 0x0, 0x73, 0xfffffffffffffff9}, &(0x7f0000000f00), &(0x7f0000000f80)={&(0x7f0000000f40)={[0x2]}, 0x8}) perf_event_open(&(0x7f0000000640)={0x3, 0x80, 0x8, 0x1, 0x8, 0x7f, 0x0, 0x4, 0x20800, 0x5, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffe00, 0x4, @perf_bp={&(0x7f0000000600), 0xa}, 0x2040, 0x0, 0x9, 0x1, 0x5, 0xfe, 0x1, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xf, r0, 0x2) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000380)={0x7fffffffffffffff, 0x7}) getdents64(r2, &(0x7f0000000100)=""/241, 0xffd1) r3 = syz_mount_image$squashfs(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f00000000c0)=ANY=[]) r4 = openat(r3, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) syz_mount_image$squashfs(0x0, &(0x7f0000000240)='./file1\x00', 0x8, 0x7, &(0x7f0000000a80)=[{0x0}, {&(0x7f0000000780)="19abf382eecbc34896d96119e6e9aa68a0cc24c8a33b46bd55d27fc6e7fbae6451c3a6f186fe0058ea794e25549cd5f5b01d3870d50a94a5a6678f58b3ad9321c2ebe0f2508fb820c7d9c23f6f8882c8b6e768819e55a4d158f8195bfc25b79e2d6ee4175a6c50b20bfd70ce05d41113d960cc0f9befb6a1deccacc4c47b0f8dd914", 0x82, 0x10001}, {&(0x7f0000000840)="95810f", 0x3, 0x5}, {&(0x7f0000000880)="0b2f901f593b15dc11097f48b8b8ebc7459098ae7c59e4c3d07c41749549b78ba58d207f83e7226a8c58925fa87a791cb3cce5402a3d87f00042326b90686ce40fac5332f911b59316600b4dfb5e7b32c5891baf442eaff87e3fe675f6a8b7d92211fb398e64735c048ba0b729cb3ef66051ce83454903b95ada5db4b9d713", 0x7f, 0x7}, {&(0x7f0000000900)="9770a5df2fe1fe0ffe0d54591bcd16af2c3e82ce305289bc18eb658d5f546f091ecc5bd7e05778421a443862fe", 0x2d}, {0x0, 0x0, 0x8}, {0x0, 0x0, 0x8}], 0x2008080, &(0x7f0000000b40)={[{':(\\:..I{^*:!'}, {')\xc1&..}m'}, {'\x1e.%'}], [{@subj_user={'subj_user', 0x3d, '['}}]}) readv(r4, &(0x7f0000000740)=[{&(0x7f0000000280)=""/203, 0xcb}], 0x1) 03:18:04 executing program 1: setfsgid(0xee00) setfsgid(0xee00) 03:18:04 executing program 1: syz_mount_image$udf(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000, 0x1c, &(0x7f0000000200)=[{&(0x7f0000010000)="0042454130310100"/32, 0x20, 0x8000}, {&(0x7f0000010100)="004e535230330100"/32, 0x20, 0x9000}, {&(0x7f0000010200)="0054454130310100"/32, 0x20, 0xa000}, {&(0x7f0000010300)="01000300d8000100d600f0010c0000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e757855444600"/128, 0x80, 0xc000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1c1b5609002a4c696e7578205544464653000000000000000000000004050000", 0xe0, 0xc0c0}, {&(0x7f0000010500)="00000000000000000100"/32, 0x20, 0xc1e0}, {&(0x7f0000010600)="06000300eb000100e441ae010d00000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000", 0x60, 0xd000}, {&(0x7f0000010700)="000000000000000000000000000000000000000900100000002a4f5354412055444620436f6d706c69616e74000000000102000000000000001000000100000000000000000000000600000001000000002a4c696e75782055444646530000000000000000000000040500"/128, 0x80, 0xd0c0}, {&(0x7f0000010800)="0000000000000000000000000000000000100000120000000106010000000000", 0x20, 0xd1a0}, {&(0x7f0000010900)="05000300d5000100cefff0010e0000000500000001000000002b4e53523033000000000000000000000000000000000000000000000000000000000000000000001000"/96, 0x60, 0xe000}, {&(0x7f0000010a00)="000000000000000000000000000000000000000000000000040000001300000028000000002a4c696e7578205544464653000000000000000000000004050000", 0x40, 0xe0a0}, {&(0x7f0000010b00)="070003002a000100d42c10000f0000000600000001000000004000003b000000", 0x20, 0xf000}, {&(0x7f0000010c00)="04000300a20001003168f0011000000004000000002a554446204c5620496e666f00000000000000000000000102040500000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000", 0x80, 0x10000}, {&(0x7f0000010d00)="0000000000000000000000000000000000000009084c696e7578206d6b756466667320322e32000000000000000000000000000000000012084c696e757820756466746f6f6c7320322e3200000000000000000000000000000000130868747470733a2f2f6769746875622e636f6d2f70616c692f756466746f6f6c732f0022002a4c696e757820554446465300000000000000000000000405000000000000", 0xa0, 0x100e0}, {&(0x7f0000010e00)="080003000e0001000000f0011100"/32, 0x20, 0x11000}, {&(0x7f0000010f00)="09000300a30001002ce27600120000000010e4070913122c1c3f1c1d0100000000000000000000001700000000000000000000000000000000000000000000000000000000000000010000002e0000001b00000028000000002a4c696e757820554446465300000000000000000000000405000000000000050000000200000001020102010200"/160, 0xa0, 0x12000}, {&(0x7f0000011000)="08010300e5000100f7d9080000000000280000000500000000e0ffffff000000", 0x20, 0x13000}, {&(0x7f0000011100)="00010300fd00010019edf001010000007810e4070913142c1c1b56090300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e757855444600000000000000", 0x80, 0x14000}, {&(0x7f0000011200)="00000000000000000000000000000009004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000000000000000000000000000000000000000000908436f707972696768740000000000000000000000000000000000000000000a084162737472616374000000000000000000000000000000000000000000000900100000030000000000000000000000002a4f5354412055444620436f6d706c69616e7400000000010200000000000000000000000000000000000000000000001000000200"/256, 0x100, 0x140e0}, {&(0x7f0000011300)="0a010300c80001005671f0000200000000000000040000000100000d00000000000003000000000000000000a57c000001000000000000002800000000000000280000000000000000000000000000007810e4070913142c1c1b56097810e4070913142c1c1b56097810e4070913142c1c1b56097810e4070913142c1c1b560901000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e75782055444646530000000000000000000000040500000000000000000000000000000000000028000000010103000600010024c218000200000001000a00001000000200"/256, 0x100, 0x15000}, {&(0x7f0000011400)="0a0103002e000100c883d0010300000000000000040000000100000400000000000003000000000000000000a53c000002000000000000000801000000000000080100000000000000000000000000000010e4070913122c1c1b56090010e4070913122c1c3e22540010e4070913122c1c1b56090010e4070913122c1c3e225401000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e75782055444646530000000000000000000000040500000000000000000000000000000000000008010000010103008b000100006a18000300000001000a00001000000300000000000000000000000000000001010300d00001003c6f1c0003000000010002060010000004000000000000001000000000000866696c65300101030045000100b46c1c0003000000010000060010000007000000000000001300000000000866696c653101010300c20001003c611c0003000000010000060010000008000000000000001400000000000866696c653201010300ff00010068721c0003000000010000060010000008000000000000001500000000000866696c65330101030073000100ab9f2000030000000100000a001000000c000000000000001600000000000866696c652e636f6c64", 0x1e0, 0x16000}, {&(0x7f0000011600)="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", 0x160, 0x17000}, {&(0x7f0000011800)="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"/1280, 0x500, 0x18000}, {&(0x7f0000011d00)="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"/288, 0x120, 0x19000}, {&(0x7f0000011f00)="0a010300c3000100b625d2000700000000000000040000000100000500000000000003000000000000000000a57c000001000000000000000a000000000000000a0000000000000000000000000000000010e4070913122c1c3e22540010e4070913122c1c3e22540010e4070913122c1c3e22540010e4070913122c1c3e225401000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578205544464653000000000000000000000004050000000000001300000000000000000000000a00000073797a6b616c6c65727300"/256, 0x100, 0x1a000}, {&(0x7f0000012000)="0a01030041000100a4aed8000800000000000000040000000100000500000000000001000000000000000000a57c000002000000000000002823000000000000282300000000000003000000000000000010e4070913122c1c3e22540010e4070913122c1c3e22540010e4070913122c1c3e22540010e4070913122c1c3e225401000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e757820554446465300000000000000000000000405000000000000140000000000000000000000100000002823000009000000", 0xe0, 0x1b000}, {&(0x7f0000012100)="0a01030065000100d04d2c010c00000000000000040000000100000500000000000003000000000000000000a57c000001000000000000006400000000000000640000000000000000000000000000000010e4070913122c1c3e22540010e4070913122c1c3e22540010e4070913122c1c3e22540010e4070913122c1c3e225401000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578205544464653000000000000000000000004050000000000001600000000000000000000006400000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c65727300000000", 0x140, 0x1f000}, {&(0x7f0000012300)="020003006a0001001d17f0013f000000006000000c000000006000000c000000", 0x20, 0x3f000}], 0x0, &(0x7f0000012400)) 03:18:04 executing program 5: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000bc0)={0x0, 0x80, 0x0, 0xff, 0x0, 0x40, 0x0, 0x6, 0x20000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7fc0000, 0x0, @perf_config_ext, 0xa04, 0x9, 0xffffffff, 0x4, 0x3ff, 0x0, 0xf8, 0x0, 0x8, 0x0, 0x1000}, 0x0, 0x4, r1, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000002000)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB, @ANYBLOB, @ANYBLOB="000000001c00ba92f553000001", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="03dcffff000000000000b7b581ed4c1a42cba4ffb93e4aaa9c942de27fd38bad531330978a4f04302a37060000000000000002c86c5f8ec7a99cea8b765bf4daec3b2c2b7a91a83470d156dd1b515f7e740ed1fe801e78b4a973697acb6c6b8a65c94b816d21029a0a569825bade49c1d11ec36695034cea"], 0x60}}, {{0x0, 0x0, &(0x7f0000003b00)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003d00)}}], 0x4, 0x40000001, 0x0) r2 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000b80)='./file0\x00', 0x101c0, 0x0) pselect6(0x40, &(0x7f0000000e00)={0x6, 0x4, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, &(0x7f0000000e80)={0x5, 0x0, 0x1ff, 0x0, 0x6, 0x0, 0x73, 0xfffffffffffffff9}, &(0x7f0000000f00), &(0x7f0000000f80)={&(0x7f0000000f40)={[0x2]}, 0x8}) perf_event_open(&(0x7f0000000640)={0x3, 0x80, 0x8, 0x1, 0x8, 0x7f, 0x0, 0x4, 0x20800, 0x5, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffe00, 0x4, @perf_bp={&(0x7f0000000600), 0xa}, 0x2040, 0x0, 0x9, 0x1, 0x5, 0xfe, 0x1, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xf, r0, 0x2) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000380)={0x7fffffffffffffff, 0x7}) getdents64(r2, &(0x7f0000000100)=""/241, 0xffd1) r3 = syz_mount_image$squashfs(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f00000000c0)=ANY=[]) r4 = openat(r3, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) syz_mount_image$squashfs(0x0, &(0x7f0000000240)='./file1\x00', 0x8, 0x7, &(0x7f0000000a80)=[{0x0}, {&(0x7f0000000780)="19abf382eecbc34896d96119e6e9aa68a0cc24c8a33b46bd55d27fc6e7fbae6451c3a6f186fe0058ea794e25549cd5f5b01d3870d50a94a5a6678f58b3ad9321c2ebe0f2508fb820c7d9c23f6f8882c8b6e768819e55a4d158f8195bfc25b79e2d6ee4175a6c50b20bfd70ce05d41113d960cc0f9befb6a1deccacc4c47b0f8dd914", 0x82, 0x10001}, {&(0x7f0000000840)="95810f", 0x3, 0x5}, {&(0x7f0000000880)="0b2f901f593b15dc11097f48b8b8ebc7459098ae7c59e4c3d07c41749549b78ba58d207f83e7226a8c58925fa87a791cb3cce5402a3d87f00042326b90686ce40fac5332f911b59316600b4dfb5e7b32c5891baf442eaff87e3fe675f6a8b7d92211fb398e64735c048ba0b729cb3ef66051ce83454903b95ada5db4b9d713", 0x7f, 0x7}, {&(0x7f0000000900)="9770a5df2fe1fe0ffe0d54591bcd16af2c3e82ce305289bc18eb658d5f546f091ecc5bd7e05778421a443862fe", 0x2d}, {0x0, 0x0, 0x8}, {0x0, 0x0, 0x8}], 0x2008080, &(0x7f0000000b40)={[{':(\\:..I{^*:!'}, {')\xc1&..}m'}, {'\x1e.%'}], [{@subj_user={'subj_user', 0x3d, '['}}]}) readv(r4, &(0x7f0000000740)=[{&(0x7f0000000280)=""/203, 0xcb}], 0x1) 03:18:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x7, 0x4) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) memfd_create(&(0x7f0000000200)='G\x84\xe7R\xb5\xbc\xeal\x01\x86\x01\xff\xff\xff\xff\x00\x00\x00\x00\x1bX\x93\xbbqz\x01o\x81\xa6\x02Wq\x8c\xbfx\xdd\xd4\xf1\aQu8\x99:\x06\xb9\xbe\f&Ws\x83\xd6&s3\v7n0Oj\xff0\xea(\xeb\x986\x14\a\x95:\xeb\xf9A\xfb\x13k\xed{\xed*\xa5p37m\xa8\xa7\x95&\xb0\x93p\xa3\xa7\xda\xf2H\x9f\xf5D\xae\b\x81=\xdb]\xcb\x10\xb7\x89\x8e\x8a\x9a\x80^k\xc9t\x1c\x00\x1a\x1d.\xe5\x18I\aRW\x99\x1f\xb1#\x1efv\xb7\xe8\x01\x03\t\b\x95\xa9Q\x8a\xe2\xbeq\x1e=\xebh\xd1S\x18\xff\xb7\xae\x9c\x9d#\xf7o\xcf\xf3\xeb@\x97\xdc\x9c\r0\xe4^f\xf59g\xa0\xe5\xe4\x1bN\xc6\xff7\xb3\x10\'\xc0\x04\xd5\xef\a70\x8e\xfb\x1e\x15\v\x12Ms7\x03\xa4\xbfv\xaf\xf8\x13F!\x17c\xde$\x1de(\xfb)\xc9\xaam\xad\xda\x03\x16.\xdb,\x86E~gO {J\x17*\x8bX\xb4/\xf9\xa6\xea\x9c\x12\x01\x91\x16\xff}\xa4\x95s\x87vH\xd8f\x01\x1f\xde\x8d0\"\xa3jM\xbb\xd65\xc2\n\x90\xdbP\xe8\xb1\xec\xd4\b\xba\x83\xd1)\x95\x06\xb9\xc1\xd3', 0x0) r1 = dup(0xffffffffffffffff) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180)={0xffffffbe}, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000340)={'vcan0\x00'}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') rmdir(&(0x7f00000001c0)='./file0\x00') mkdir(&(0x7f0000000f00)='./file0\x00', 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x204900, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.cpus\x00', 0x2, 0x0) writev(r3, &(0x7f00000027c0)=[{&(0x7f0000000100)='0', 0x1}], 0x1) 03:18:04 executing program 3: sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000e80)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x8000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4004880}, 0x4000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4820c, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, 0xffffffffffffffff, 0x0) r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000380)) write$binfmt_script(r0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c65302f66696c6530257667e3fb9657ab17637c6661740020152a3a5e2d5b217b5e3ad92e2c212b252d2c2b207666617400202076666174000a94ed27c175ab027e2fb4ccd710f4930f9d6f8f1a5657da82d9bbfa37cea9a37f65a11392f1a71496c52b0eda11ca28822eea122dcadff03f04d1126e72955aade202ad3f572ddad92e19ffae630b"], 0x8c) openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000080), 0x42040, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0xfffffffe) capget(&(0x7f0000000240), 0x0) mmap(&(0x7f0000701000/0x1000)=nil, 0x1000, 0x0, 0x12, r1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000580), 0x10, &(0x7f0000000640)={&(0x7f00000006c0)=ANY=[@ANYBLOB="01000000120a00"/16, @ANYRESDEC=r1, @ANYRES32, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYBLOB="0000220001000000000000000000000085b6c30aa4862f4991640a0c720100000000000000198f05cd14b53f63a5b33e16aa0d20820ec89d1ad108b986da48ea9a"], 0x80}}, 0x4040006) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000480)={@private2={0xfc, 0x2, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, 0x3f, 0x6378, 0x200, 0x0, 0x3f, 0x200}) ioctl$ASHMEM_SET_NAME(r1, 0x40087708, &(0x7f00000007c0)='\x00\x00\x03\x06\x00\x00\x00\x05\x00x\x92\x12\xac\x06^\xbewV\xf3\"\xc4\x04\xbb\x0642\x9c\x1a\xd1\xcb{\xb0\xd6\x1e\x00gQ\xca\x0eU\xf7\'\x8c\xc1\xc6\xbb\xc5\x1c\xf7\xaf\x95\x83=\t7\x96\x1a\xad\xd0\xd0\xee\x9c\x962\bu\xba\xfc\xae\xc2\x19\xeb\x91\xc9\t\xbc\xc1\xcb\xba\xe3\x8e\xf6\x89\xc2\'\xdfn(Q=v-<\r\xd1?$\x8b\x17Bn\x17h\x1b\xac\xfc\x82\x1c\xf4\xd0\xf5\xd5\x80\xc0\xb4a \x15\x9a\x9f\xf0:\xfd$\xad\xbb\x9a|c\xfc\"\xee\xc4\x93Q\x82\x16\xbf\xe3c\x8d \x0f\xb1\xe9\xf2o \x00\x00\x00\x00\x00\x00\x00H\xaf\t\x18\xc8\x1b\x1e\xbe\xd8>\xec\x9f~\xa7\xf7\xafdd\xf1\xdbjE\x01\xd1sD\x89\x94&\\U\f\x18\x99]\xaba\xe93\x01\xa23\xc9hP1\xdc-\'\xd0\x9e}\x89\xff\x8c\xec^\x84\x19\x9f_D\xbdt/\'\xf6\xc3\x8c\xb8\vS\x80\xad\xf8\xbf\xa2\xa0\x99\xc2\x16=\xcc\xb0\x1b7\xe3-\'\x02\x16\xf5\xe6\x93\x02E\n\xe8\x00\x00\x8c\xed\x11\xf7\xf2J\xf6\x90A@\x01\x13\xc7`g\xcb\xd7\xdb\x1e\xb2\xc9\xfd\xf7\xa9\x96\xf8/0Xd\xcf\xb9\xa2\x1d\x13\x8fC\xd2&\xd8\x9d\x8b\xe0E\xd2\xc6\x1a\xf3\xa8\x0e\xba\xecOv$\xc8\"\a\xd7T\xfb\xfc\xfauT\xf8\x9e\x86\xef.\xf6<\xbfB\xe7\x80\x1a\a\t+x_B=\xe7\xa5\x89\xfb\xa2\xc6\x97\xeb\xdecY{\x0e\xc2\x00\x00\x00\x00\x00\x00\x00\a\xf4\x88\x06\xe3\xcb\xc8\xe0\xcc\vE\x18\"\x87\xa0\xa9:\xceY\xf0\xa2\xe0\x9d\x8c\x8e\x11\xb7\x98\xa5\xda$\x94D\xb4\xf2>\x01\x00+\xfa\xa9 \xe1\x13Y\x86\xd8\xbfH\xc6\x9c\x8cs4\r\xcd\xd1\x83JT\xf9\xa2\x83?\xb3\x0f\xc6&\x1d\xa3\xc4\xc3\xd2\xfd\xad\xa35o\xe8\xcd^/\xd8\xf4[n\x9fJ\xf4\n\x92c\xaa\xddT&L<+\x19R\a\xfc\xf2\x17\xb8$\xa9]\xc2\\\xda<\xc8d.w\x9c\xaf4\xbb\xe8Co\xb3\xd8\x82\x92\xba+\x99PXB\xdc\xbay\xa0s<\x92k\vJTRW\xc26\x06\x10\x92\xc7\xa55\x9fZ\xff*ir\x1e\xe8\a\x00\x00\x00\x00\x00\x00\x00\x88\x19\xf7\xdd\xa8\xef\xa0\x98\xcd\x81\x10>\xc7{\x84\xb9\xc0B\xe1\t\x00\xbaQj\x81\xc8\xf8\x146%Z\x83H\xabF\x18<\x86h\x01=\x03i\xc4\t\x8e/\x12\a\xdf\xe7zU\x1d\x15\x0e\xc1?\xeau\xb4\x84x\x00\x00X\xf4\xe9\x1f\xcd\x05\x0fz_\x8d,^\xde\xfd\xd1\xbed\xed\xa1\xf5\xc6(p\xb4;\x0e\x18\xf7/A\xfd\x92\xd0}ur\xaag\xdb&e$\f\rrT\xd8\x88~\x13\xc22t\xf6\xf4Fs\xc1\x05\xfa\x99\x15\x87\x14\x13$\t\xa8?\xee\x94W\x8e\xe1\xcc\xc3U\x84\xc6]:\x9a|W\xec\x84\x18\bb\x82\x8f\xc0\xab\xe3a\x99\x17\x85\x9a\x05\xb1\x12K\\\xf2\xd5\b^[D~~\x84\\\xe4\x00') ioctl$ASHMEM_PURGE_ALL_CACHES(r1, 0x770a, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000001c0)='./file0\x00', 0x0, 0x4, &(0x7f0000000500)=[{&(0x7f00000000c0)="eb3c906d6b66732e66617400020101000240008000f801", 0x17}, {&(0x7f0000000740)="00000200006300230000000000000800000000000000000000000000000055aaf8ff", 0x22, 0x1e4}, {&(0x7f0000000140)="53595a4b414c4c45522020080000e680325132510000e680325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000ace670325132510000e670325103", 0x5b, 0x600}, {&(0x7f0000000400)="2ebc9c5d9d2020202020201000ace668325132510000667032510300000000002e2e202020200c202020201000ace670324132510000e670325100a686b3660041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530", 0x65, 0x1000}], 0x0, &(0x7f0000010d00)=ANY=[]) unlink(&(0x7f0000000100)='./file0/file0/file0\x00') timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f0000000000)={{0x77359400}}, 0x0) fadvise64(0xffffffffffffffff, 0xec, 0x1ff, 0x1) 03:18:04 executing program 0: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000bc0)={0x0, 0x80, 0x0, 0xff, 0x0, 0x40, 0x0, 0x6, 0x20000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7fc0000, 0x0, @perf_config_ext, 0xa04, 0x9, 0xffffffff, 0x4, 0x3ff, 0x0, 0xf8, 0x0, 0x8, 0x0, 0x1000}, 0x0, 0x4, r1, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000002000)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB, @ANYBLOB, @ANYBLOB="000000001c00ba92f553000001", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="03dcffff000000000000b7b581ed4c1a42cba4ffb93e4aaa9c942de27fd38bad531330978a4f04302a37060000000000000002c86c5f8ec7a99cea8b765bf4daec3b2c2b7a91a83470d156dd1b515f7e740ed1fe801e78b4a973697acb6c6b8a65c94b816d21029a0a569825bade49c1d11ec36695034cea"], 0x60}}, {{0x0, 0x0, &(0x7f0000003b00)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003d00)}}], 0x4, 0x40000001, 0x0) r2 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000b80)='./file0\x00', 0x101c0, 0x0) pselect6(0x40, &(0x7f0000000e00)={0x6, 0x4, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, &(0x7f0000000e80)={0x5, 0x0, 0x1ff, 0x0, 0x6, 0x0, 0x73, 0xfffffffffffffff9}, &(0x7f0000000f00), &(0x7f0000000f80)={&(0x7f0000000f40)={[0x2]}, 0x8}) perf_event_open(&(0x7f0000000640)={0x3, 0x80, 0x8, 0x1, 0x8, 0x7f, 0x0, 0x4, 0x20800, 0x5, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffe00, 0x4, @perf_bp={&(0x7f0000000600), 0xa}, 0x2040, 0x0, 0x9, 0x1, 0x5, 0xfe, 0x1, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xf, r0, 0x2) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000380)={0x7fffffffffffffff, 0x7}) getdents64(r2, &(0x7f0000000100)=""/241, 0xffd1) r3 = syz_mount_image$squashfs(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f00000000c0)=ANY=[]) r4 = openat(r3, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) syz_mount_image$squashfs(0x0, &(0x7f0000000240)='./file1\x00', 0x8, 0x7, &(0x7f0000000a80)=[{0x0}, {&(0x7f0000000780)="19abf382eecbc34896d96119e6e9aa68a0cc24c8a33b46bd55d27fc6e7fbae6451c3a6f186fe0058ea794e25549cd5f5b01d3870d50a94a5a6678f58b3ad9321c2ebe0f2508fb820c7d9c23f6f8882c8b6e768819e55a4d158f8195bfc25b79e2d6ee4175a6c50b20bfd70ce05d41113d960cc0f9befb6a1deccacc4c47b0f8dd914", 0x82, 0x10001}, {&(0x7f0000000840)="95810f", 0x3, 0x5}, {&(0x7f0000000880)="0b2f901f593b15dc11097f48b8b8ebc7459098ae7c59e4c3d07c41749549b78ba58d207f83e7226a8c58925fa87a791cb3cce5402a3d87f00042326b90686ce40fac5332f911b59316600b4dfb5e7b32c5891baf442eaff87e3fe675f6a8b7d92211fb398e64735c048ba0b729cb3ef66051ce83454903b95ada5db4b9d713", 0x7f, 0x7}, {&(0x7f0000000900)="9770a5df2fe1fe0ffe0d54591bcd16af2c3e82ce305289bc18eb658d5f546f091ecc5bd7e05778421a443862fe", 0x2d}, {0x0, 0x0, 0x8}, {0x0, 0x0, 0x8}], 0x2008080, &(0x7f0000000b40)={[{':(\\:..I{^*:!'}, {')\xc1&..}m'}, {'\x1e.%'}], [{@subj_user={'subj_user', 0x3d, '['}}]}) readv(r4, &(0x7f0000000740)=[{&(0x7f0000000280)=""/203, 0xcb}], 0x1) 03:18:04 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x7, 0x4) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) memfd_create(&(0x7f0000000200)='G\x84\xe7R\xb5\xbc\xeal\x01\x86\x01\xff\xff\xff\xff\x00\x00\x00\x00\x1bX\x93\xbbqz\x01o\x81\xa6\x02Wq\x8c\xbfx\xdd\xd4\xf1\aQu8\x99:\x06\xb9\xbe\f&Ws\x83\xd6&s3\v7n0Oj\xff0\xea(\xeb\x986\x14\a\x95:\xeb\xf9A\xfb\x13k\xed{\xed*\xa5p37m\xa8\xa7\x95&\xb0\x93p\xa3\xa7\xda\xf2H\x9f\xf5D\xae\b\x81=\xdb]\xcb\x10\xb7\x89\x8e\x8a\x9a\x80^k\xc9t\x1c\x00\x1a\x1d.\xe5\x18I\aRW\x99\x1f\xb1#\x1efv\xb7\xe8\x01\x03\t\b\x95\xa9Q\x8a\xe2\xbeq\x1e=\xebh\xd1S\x18\xff\xb7\xae\x9c\x9d#\xf7o\xcf\xf3\xeb@\x97\xdc\x9c\r0\xe4^f\xf59g\xa0\xe5\xe4\x1bN\xc6\xff7\xb3\x10\'\xc0\x04\xd5\xef\a70\x8e\xfb\x1e\x15\v\x12Ms7\x03\xa4\xbfv\xaf\xf8\x13F!\x17c\xde$\x1de(\xfb)\xc9\xaam\xad\xda\x03\x16.\xdb,\x86E~gO {J\x17*\x8bX\xb4/\xf9\xa6\xea\x9c\x12\x01\x91\x16\xff}\xa4\x95s\x87vH\xd8f\x01\x1f\xde\x8d0\"\xa3jM\xbb\xd65\xc2\n\x90\xdbP\xe8\xb1\xec\xd4\b\xba\x83\xd1)\x95\x06\xb9\xc1\xd3', 0x0) r1 = dup(0xffffffffffffffff) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180)={0xffffffbe}, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000340)={'vcan0\x00'}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') rmdir(&(0x7f00000001c0)='./file0\x00') mkdir(&(0x7f0000000f00)='./file0\x00', 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x204900, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.cpus\x00', 0x2, 0x0) writev(r3, &(0x7f00000027c0)=[{&(0x7f0000000100)='0', 0x1}], 0x1) 03:18:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x7, 0x4) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) memfd_create(&(0x7f0000000200)='G\x84\xe7R\xb5\xbc\xeal\x01\x86\x01\xff\xff\xff\xff\x00\x00\x00\x00\x1bX\x93\xbbqz\x01o\x81\xa6\x02Wq\x8c\xbfx\xdd\xd4\xf1\aQu8\x99:\x06\xb9\xbe\f&Ws\x83\xd6&s3\v7n0Oj\xff0\xea(\xeb\x986\x14\a\x95:\xeb\xf9A\xfb\x13k\xed{\xed*\xa5p37m\xa8\xa7\x95&\xb0\x93p\xa3\xa7\xda\xf2H\x9f\xf5D\xae\b\x81=\xdb]\xcb\x10\xb7\x89\x8e\x8a\x9a\x80^k\xc9t\x1c\x00\x1a\x1d.\xe5\x18I\aRW\x99\x1f\xb1#\x1efv\xb7\xe8\x01\x03\t\b\x95\xa9Q\x8a\xe2\xbeq\x1e=\xebh\xd1S\x18\xff\xb7\xae\x9c\x9d#\xf7o\xcf\xf3\xeb@\x97\xdc\x9c\r0\xe4^f\xf59g\xa0\xe5\xe4\x1bN\xc6\xff7\xb3\x10\'\xc0\x04\xd5\xef\a70\x8e\xfb\x1e\x15\v\x12Ms7\x03\xa4\xbfv\xaf\xf8\x13F!\x17c\xde$\x1de(\xfb)\xc9\xaam\xad\xda\x03\x16.\xdb,\x86E~gO {J\x17*\x8bX\xb4/\xf9\xa6\xea\x9c\x12\x01\x91\x16\xff}\xa4\x95s\x87vH\xd8f\x01\x1f\xde\x8d0\"\xa3jM\xbb\xd65\xc2\n\x90\xdbP\xe8\xb1\xec\xd4\b\xba\x83\xd1)\x95\x06\xb9\xc1\xd3', 0x0) r1 = dup(0xffffffffffffffff) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180)={0xffffffbe}, 0x4) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000340)={'vcan0\x00'}) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') rmdir(&(0x7f00000001c0)='./file0\x00') mkdir(&(0x7f0000000f00)='./file0\x00', 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x204900, 0x0) r3 = openat$cgroup_int(r2, &(0x7f00000000c0)='cpuset.cpus\x00', 0x2, 0x0) writev(r3, &(0x7f00000027c0)=[{&(0x7f0000000100)='0', 0x1}], 0x1) [ 81.999105] new mount options do not match the existing superblock, will be ignored 03:18:04 executing program 0: r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) perf_event_open(&(0x7f0000000bc0)={0x0, 0x80, 0x0, 0xff, 0x0, 0x40, 0x0, 0x6, 0x20000, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7fc0000, 0x0, @perf_config_ext, 0xa04, 0x9, 0xffffffff, 0x4, 0x3ff, 0x0, 0xf8, 0x0, 0x8, 0x0, 0x1000}, 0x0, 0x4, r1, 0x1) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000002000)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB, @ANYBLOB, @ANYBLOB="000000001c00ba92f553000001", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="03dcffff000000000000b7b581ed4c1a42cba4ffb93e4aaa9c942de27fd38bad531330978a4f04302a37060000000000000002c86c5f8ec7a99cea8b765bf4daec3b2c2b7a91a83470d156dd1b515f7e740ed1fe801e78b4a973697acb6c6b8a65c94b816d21029a0a569825bade49c1d11ec36695034cea"], 0x60}}, {{0x0, 0x0, &(0x7f0000003b00)}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000003d00)}}], 0x4, 0x40000001, 0x0) r2 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000b80)='./file0\x00', 0x101c0, 0x0) pselect6(0x40, &(0x7f0000000e00)={0x6, 0x4, 0x0, 0x0, 0x8, 0x0, 0x2}, 0x0, &(0x7f0000000e80)={0x5, 0x0, 0x1ff, 0x0, 0x6, 0x0, 0x73, 0xfffffffffffffff9}, &(0x7f0000000f00), &(0x7f0000000f80)={&(0x7f0000000f40)={[0x2]}, 0x8}) perf_event_open(&(0x7f0000000640)={0x3, 0x80, 0x8, 0x1, 0x8, 0x7f, 0x0, 0x4, 0x20800, 0x5, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffe00, 0x4, @perf_bp={&(0x7f0000000600), 0xa}, 0x2040, 0x0, 0x9, 0x1, 0x5, 0xfe, 0x1, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xf, r0, 0x2) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000380)={0x7fffffffffffffff, 0x7}) getdents64(r2, &(0x7f0000000100)=""/241, 0xffd1) r3 = syz_mount_image$squashfs(&(0x7f00000002c0), &(0x7f0000000100)='./file0\x00', 0x100000001, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x200}], 0x0, &(0x7f00000000c0)=ANY=[]) r4 = openat(r3, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) syz_mount_image$squashfs(0x0, &(0x7f0000000240)='./file1\x00', 0x8, 0x7, &(0x7f0000000a80)=[{0x0}, {&(0x7f0000000780)="19abf382eecbc34896d96119e6e9aa68a0cc24c8a33b46bd55d27fc6e7fbae6451c3a6f186fe0058ea794e25549cd5f5b01d3870d50a94a5a6678f58b3ad9321c2ebe0f2508fb820c7d9c23f6f8882c8b6e768819e55a4d158f8195bfc25b79e2d6ee4175a6c50b20bfd70ce05d41113d960cc0f9befb6a1deccacc4c47b0f8dd914", 0x82, 0x10001}, {&(0x7f0000000840)="95810f", 0x3, 0x5}, {&(0x7f0000000880)="0b2f901f593b15dc11097f48b8b8ebc7459098ae7c59e4c3d07c41749549b78ba58d207f83e7226a8c58925fa87a791cb3cce5402a3d87f00042326b90686ce40fac5332f911b59316600b4dfb5e7b32c5891baf442eaff87e3fe675f6a8b7d92211fb398e64735c048ba0b729cb3ef66051ce83454903b95ada5db4b9d713", 0x7f, 0x7}, {&(0x7f0000000900)="9770a5df2fe1fe0ffe0d54591bcd16af2c3e82ce305289bc18eb658d5f546f091ecc5bd7e05778421a443862fe", 0x2d}, {0x0, 0x0, 0x8}, {0x0, 0x0, 0x8}], 0x2008080, &(0x7f0000000b40)={[{':(\\:..I{^*:!'}, {')\xc1&..}m'}, {'\x1e.%'}], [{@subj_user={'subj_user', 0x3d, '['}}]}) readv(r4, &(0x7f0000000740)=[{&(0x7f0000000280)=""/203, 0xcb}], 0x1) [ 82.095349] UDF-fs: warning (device loop1): udf_load_vrs: No VRS found [ 82.110791] UDF-fs: Scanning with blocksize 512 failed [ 82.129344] new mount options do not match the existing superblock, will be ignored 03:18:04 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x7, 0x4) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) memfd_create(&(0x7f0000000200)='G\x84\xe7R\xb5\xbc\xeal\x01\x86\x01\xff\xff\xff\xff\x00\x00\x00\x00\x1bX\x93\xbbqz\x01o\x81\xa6\x02Wq\x8c\xbfx\xdd\xd4\xf1\aQu8\x99:\x06\xb9\xbe\f&Ws\x83\xd6&s3\v7n0Oj\xff0\xea(\xeb\x986\x14\a\x95:\xeb\xf9A\xfb\x13k\xed{\xed*\xa5p37m\xa8\xa7\x95&\xb0\x93p\xa3\xa7\xda\xf2H\x9f\xf5D\xae\b\x81=\xdb]\xcb\x10\xb7\x89\x8e\x8a\x9a\x80^k\xc9t\x1c\x00\x1a\x1d.\xe5\x18I\aRW\x99\x1f