, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1442.138484] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pig=17563 comm=syz-executor0 19:23:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1442.875099] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pig=17567 comm=syz-executor0 19:23:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1443.693360] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pig=17570 comm=syz-executor0 19:23:07 executing program 5: time(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x35b1d8ad8428f4d4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0xfffffffa) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000005240), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='asymmetric\x00', &(0x7f0000005400)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) exit(0x2) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x5, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {&(0x7f0000004dc0)=""/72, 0x48}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005200)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005700)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000005280)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x2100}, 0xc, &(0x7f0000000280)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) fchmod(r0, 0x180) setsockopt$inet_tcp_buf(r2, 0x6, 0xe, &(0x7f0000005380)="d09406254b8a0b8a1b46eb0c0a479781095aa5f3d9ca5c6b00f4a746ef08f95181cb801a9c9c532f0f8044159276802e81b45631f79e", 0x36) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f00000052c0), &(0x7f0000005300)=0x40) connect$inet(r0, &(0x7f0000000240)={0x2, 0x1004e20, @empty}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005ac0)='team\x00') ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'bond_slave_0\x00'}) getpeername(r2, &(0x7f0000005500)=@xdp, &(0x7f00000007c0)=0xffffffffffffff74) accept$packet(r4, &(0x7f00000055c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x14) accept$packet(r3, &(0x7f0000005880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000058c0)=0x14) getpeername$packet(r2, &(0x7f0000005180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005680)=0x188) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000005c40)={'team0\x00'}) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005100)=ANY=[@ANYBLOB="48f4e7000000000040000100248001006c625f686173680000001200000000000000080003000b000000080004000047e7aacdf5f128c35e8da90000000000000000004ac51ed4163be8351de3180000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 19:23:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1444.853218] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25964 sclass=netlink_route_socket pig=17574 comm=syz-executor0 19:23:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1445.698117] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pig=17582 comm=syz-executor0 [ 1445.858336] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pig=17584 comm=syz-executor1 19:23:09 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1446.310761] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pig=17592 comm=syz-executor0 19:23:09 executing program 3: time(0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x102, 0x35b1d8ad8428f4d4) bind$inet(r0, &(0x7f0000942000)={0x2, 0x4e20, @multicast1}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000040), &(0x7f00000000c0)=0xfffffffa) mlockall(0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000005240), 0xffffffffffffffff) r1 = add_key(&(0x7f00000053c0)='asymmetric\x00', &(0x7f0000005400)={'syz', 0x0}, &(0x7f0000005440)="f84e0cad4f825044c5b3ce49e3b957cc3997c30212fea77bbce9f3d7851d4d53fc4b6e9f1d822a65d07444d2bcf953b6827a4d0cda715fb3a32c410404bc5d", 0x3f, 0xffffffffffffffff) keyctl$clear(0x7, r1) r2 = open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x99) exit(0x2) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000300)=""/206, 0xce}, {&(0x7f0000000400)=""/173, 0xad}, {&(0x7f00000004c0)=""/69, 0x45}, {&(0x7f0000000540)=""/101, 0x65}], 0x5, &(0x7f0000000640)=""/231, 0xe7, 0xfc}, 0x1}, {{0x0, 0x0, &(0x7f0000000e40)=[{0x0}, {&(0x7f0000000840)=""/220, 0xdc}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/173, 0xad}, {&(0x7f0000000c40)=""/223, 0xdf}, {&(0x7f0000000b00)=""/125, 0x7d}, {&(0x7f0000000d40)=""/219, 0xdb}], 0x7, &(0x7f0000000ec0)=""/157, 0x9d, 0x6}, 0x1}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f00000011c0)=[{&(0x7f0000001000)=""/139, 0x8b}, {&(0x7f0000001100)=""/181, 0xb5}, {&(0x7f0000000b80)=""/32, 0x20}], 0x3, &(0x7f0000001200)=""/32, 0x20, 0x80000000}, 0x2}, {{&(0x7f0000001240)=@ipx, 0x80, &(0x7f0000001440)=[{&(0x7f00000012c0)=""/71, 0x47}, {&(0x7f0000001340)=""/226, 0xe2}], 0x2, &(0x7f0000001480)=""/148, 0x94, 0x3}, 0x4}, {{&(0x7f0000001540)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f00000015c0)=""/212, 0xd4}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/4096, 0x1000}], 0x3, 0x0, 0x0, 0x20}, 0x946}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003700)=""/173, 0xad}], 0x1, 0x0, 0x0, 0x4}, 0x8}, {{&(0x7f0000003800)=@ipx, 0x80, &(0x7f0000003980)=[{&(0x7f0000003880)=""/42, 0x2a}, {&(0x7f00000038c0)=""/174, 0xae}], 0x2, &(0x7f00000039c0)=""/3, 0x3, 0x8}, 0x6}, {{&(0x7f0000003a00)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000003c80)=[{&(0x7f0000003a80)=""/74, 0x4a}, {&(0x7f0000003b00)=""/103, 0x67}, {&(0x7f0000003b80)=""/245, 0xf5}], 0x3, &(0x7f0000003cc0)=""/4096, 0x1000, 0x3}, 0x2}, {{&(0x7f0000004cc0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000004e40)=[{&(0x7f0000004d40)=""/12, 0xc}, {&(0x7f0000004d80)=""/16, 0x10}, {&(0x7f0000004dc0)=""/72, 0x48}], 0x3, &(0x7f0000004e80)=""/38, 0x26}}], 0x9, 0x2, &(0x7f0000005200)={0x0, 0x989680}) syz_genetlink_get_family_id$ipvs(&(0x7f0000005700)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000005280)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x2100}, 0xc, &(0x7f0000000280)={&(0x7f00000060c0)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x3) accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x0) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000d4effc)=0x1, 0x4) fchmod(r0, 0x180) setsockopt$inet_tcp_buf(r2, 0x6, 0xe, &(0x7f0000005380)="d09406254b8a0b8a1b46eb0c0a479781095aa5f3d9ca5c6b00f4a746ef08f95181cb801a9c9c532f0f8044159276802e81b45631f79e", 0x36) munmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f00000052c0), &(0x7f0000005300)=0x40) connect$inet(r0, &(0x7f0000000240)={0x2, 0x1004e20, @empty}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000005ac0)='team\x00') ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000054c0)={'bond_slave_0\x00'}) getpeername(r2, &(0x7f0000005500)=@xdp, &(0x7f00000007c0)=0xffffffffffffff74) accept$packet(r4, &(0x7f00000055c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x14) accept$packet(r3, &(0x7f0000005880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000058c0)=0x14) getpeername$packet(r2, &(0x7f0000005180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005680)=0x188) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000005980)={{{@in=@multicast2}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000005a80)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000005c40)={'team0\x00'}) accept$packet(r3, &(0x7f0000005c80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000005cc0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000006080)={&(0x7f00000051c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000006040)={&(0x7f0000005100)=ANY=[@ANYBLOB="48f4e7000000000040000100248001006c625f686173680000001200000000000000080003000b000000080004000047e7aacdf5f128c35e8da90000000000000000004ac51ed4163be8351de3180000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg(r0, &(0x7f00000010c0)=[{{&(0x7f0000000bc0)=@in6={0xa, 0x0, 0x0, @mcast1}, 0x80, &(0x7f0000000d40), 0x2fb, &(0x7f0000000d80)}}], 0x4000000000001b4, 0x40400d4) ioctl$TIOCEXCL(r2, 0x540c) 19:23:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1447.106527] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pig=17599 comm=syz-executor1 [ 1447.149010] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pig=17603 comm=syz-executor2 [ 1447.156670] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pig=17604 comm=syz-executor4 [ 1447.183918] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pig=17605 comm=syz-executor0 19:23:10 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1447.633697] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pig=17616 comm=syz-executor1 [ 1447.696582] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pig=17617 comm=syz-executor0 19:23:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1449.229378] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 19:23:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1449.348348] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pig=17626 comm=syz-executor0 19:23:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:12 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:13 executing program 2: r0 = gettid() ioprio_set$pid(0x3, r0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) read(0xffffffffffffffff, &(0x7f0000000240)=""/100, 0x64) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/member\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100), 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 19:23:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:13 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) [ 1450.592568] protocol 88fb is buggy, dev hsr_slave_0 [ 1450.599300] protocol 88fb is buggy, dev hsr_slave_1 [ 1450.609132] netlink: 12 bytes leftover after parsing attributes in process `syz-executor4'. 19:23:13 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 19:23:13 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) 19:23:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000000040)="2400000002021f001cfffd946fa2be914514821bc78a020002e700000012a3a2", 0x20}], 0x1}, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) lstat(&(0x7f0000000140)='./file0/file0\x00', &(0x7f00000006c0)) setxattr$security_capability(&(0x7f0000000900)='./file0/file0\x00', &(0x7f0000000940)='security.capability\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000001a00)='bpf\x00', 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x588e, &(0x7f0000000c00)=ANY=[]) setreuid(0x0, 0x0) mkdir(0x0, 0x400000) memfd_create(&(0x7f0000000440)='\x03\x00\xff\xda', 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x200, 0x122) getpeername(r0, &(0x7f0000000200)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000340)={@local, 0x5f, r2}) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) [ 1450.798720] selinux_nlmsg_perm: 13 callbacks suppressed [ 1450.798742] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pig=17683 comm=syz-executor0 [ 1450.800909] IPVS: ftp: loaded support on port[0] = 21 [ 1450.847993] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=514 sclass=netlink_route_socket pig=17685 comm=syz-executor3 19:23:14 executing program 5: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000080)) setsockopt$sock_attach_bpf(r0, 0x6, 0xe, &(0x7f00000002c0), 0x4) 19:23:14 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) 19:23:14 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) 19:23:14 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) 19:23:14 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x87) sendmsg(r0, &(0x7f00000012c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x3}, 0x4}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000200)="e46d1db6dbcc", 0x6}], 0x1}, 0x0) [ 1451.317353] protocol 88fb is buggy, dev hsr_slave_0 [ 1451.322530] protocol 88fb is buggy, dev hsr_slave_1 [ 1451.398006] protocol 88fb is buggy, dev hsr_slave_0 [ 1451.403200] protocol 88fb is buggy, dev hsr_slave_1 [ 1451.478758] protocol 88fb is buggy, dev hsr_slave_0 [ 1451.483957] protocol 88fb is buggy, dev hsr_slave_1 [ 1451.559486] protocol 88fb is buggy, dev hsr_slave_0 [ 1451.564626] protocol 88fb is buggy, dev hsr_slave_1 [ 1451.681735] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1451.722005] netlink: 12 bytes leftover after parsing attributes in process `syz-executor4'. [ 1451.869474] IPVS: ftp: loaded support on port[0] = 21 19:23:15 executing program 2: r0 = gettid() ioprio_set$pid(0x3, r0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) read(0xffffffffffffffff, &(0x7f0000000240)=""/100, 0x64) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/member\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100), 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 19:23:15 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) 19:23:15 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x87) sendmsg(r0, &(0x7f00000012c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x3}, 0x4}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000200)="e46d1db6dbcc", 0x6}], 0x1}, 0x0) [ 1452.148353] bridge0: port 2(bridge_slave_1) entered blocking state [ 1452.154836] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1452.161470] bridge0: port 1(bridge_slave_0) entered blocking state [ 1452.167905] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1452.361093] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1452.391704] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1452.423072] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1452.534926] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1452.665650] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1452.702386] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1452.719874] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 19:23:17 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) 19:23:17 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x87) sendmsg(r0, &(0x7f00000012c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x3}, 0x4}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000200)="e46d1db6dbcc", 0x6}], 0x1}, 0x0) 19:23:17 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) 19:23:17 executing program 3: r0 = gettid() ioprio_set$pid(0x3, r0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) read(0xffffffffffffffff, &(0x7f0000000240)=""/100, 0x64) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/member\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100), 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 19:23:17 executing program 5: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000080)) setsockopt$sock_attach_bpf(r0, 0x6, 0xe, &(0x7f00000002c0), 0x4) 19:23:17 executing program 2: r0 = gettid() ioprio_set$pid(0x3, r0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) read(0xffffffffffffffff, &(0x7f0000000240)=""/100, 0x64) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/member\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100), 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 19:23:17 executing program 5: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000080)) setsockopt$sock_attach_bpf(r0, 0x6, 0xe, &(0x7f00000002c0), 0x4) 19:23:17 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x87) sendmsg(r0, &(0x7f00000012c0)={&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x3}, 0x4}, 0x80, &(0x7f0000001a80)=[{&(0x7f0000000200)="e46d1db6dbcc", 0x6}], 0x1}, 0x0) [ 1454.400527] netlink: 12 bytes leftover after parsing attributes in process `syz-executor4'. 19:23:17 executing program 1: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x0) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) [ 1454.585247] IPVS: ftp: loaded support on port[0] = 21 19:23:17 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) [ 1454.747887] netlink: 12 bytes leftover after parsing attributes in process `syz-executor0'. [ 1454.837324] IPVS: ftp: loaded support on port[0] = 21 19:23:18 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) [ 1455.158500] netlink: 12 bytes leftover after parsing attributes in process `syz-executor1'. [ 1455.253322] IPVS: ftp: loaded support on port[0] = 21 [ 1455.675710] net_ratelimit: 14 callbacks suppressed [ 1455.675720] protocol 88fb is buggy, dev hsr_slave_0 [ 1455.685872] protocol 88fb is buggy, dev hsr_slave_1 [ 1455.756437] protocol 88fb is buggy, dev hsr_slave_0 [ 1455.761620] protocol 88fb is buggy, dev hsr_slave_1 [ 1456.178122] bridge0: port 1(bridge_slave_0) entered disabled state [ 1456.188601] bridge0: port 1(bridge_slave_0) entered blocking state [ 1456.195129] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1456.205098] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 19:23:19 executing program 5: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000080)) setsockopt$sock_attach_bpf(r0, 0x6, 0xe, &(0x7f00000002c0), 0x4) [ 1456.223628] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1456.292278] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1456.343782] bridge0: port 2(bridge_slave_1) entered blocking state [ 1456.350256] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1456.357023] bridge0: port 1(bridge_slave_0) entered blocking state [ 1456.363447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1456.377647] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1456.384626] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1456.392727] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1456.406338] 8021q: adding VLAN 0 to HW filter on device team0 [ 1456.442432] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1456.514560] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1456.598566] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1456.644671] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1456.695883] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1456.816438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 19:23:23 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) 19:23:23 executing program 3: r0 = gettid() ioprio_set$pid(0x3, r0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) read(0xffffffffffffffff, &(0x7f0000000240)=""/100, 0x64) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/member\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100), 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 19:23:23 executing program 2: r0 = gettid() ioprio_set$pid(0x3, r0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) read(0xffffffffffffffff, &(0x7f0000000240)=""/100, 0x64) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/member\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100), 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 19:23:23 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) 19:23:23 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) [ 1460.136309] netlink: 12 bytes leftover after parsing attributes in process `syz-executor5'. [ 1460.253722] IPVS: ftp: loaded support on port[0] = 21 [ 1460.269183] netlink: 12 bytes leftover after parsing attributes in process `syz-executor4'. [ 1460.309744] netlink: 12 bytes leftover after parsing attributes in process `syz-executor1'. 19:23:23 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) [ 1460.515328] IPVS: ftp: loaded support on port[0] = 21 [ 1460.599040] protocol 88fb is buggy, dev hsr_slave_0 [ 1460.604223] protocol 88fb is buggy, dev hsr_slave_1 [ 1460.745791] netlink: 12 bytes leftover after parsing attributes in process `syz-executor0'. [ 1460.819757] IPVS: ftp: loaded support on port[0] = 21 [ 1460.841723] protocol 88fb is buggy, dev hsr_slave_0 [ 1460.847713] protocol 88fb is buggy, dev hsr_slave_1 [ 1461.084881] protocol 88fb is buggy, dev hsr_slave_0 [ 1461.091587] protocol 88fb is buggy, dev hsr_slave_1 [ 1461.178734] IPVS: ftp: loaded support on port[0] = 21 [ 1461.810618] protocol 88fb is buggy, dev hsr_slave_0 [ 1461.816440] protocol 88fb is buggy, dev hsr_slave_1 [ 1461.890340] protocol 88fb is buggy, dev hsr_slave_0 [ 1461.895514] protocol 88fb is buggy, dev hsr_slave_1 [ 1461.971797] protocol 88fb is buggy, dev hsr_slave_0 [ 1461.977674] protocol 88fb is buggy, dev hsr_slave_1 [ 1462.697099] bridge0: port 1(bridge_slave_0) entered disabled state [ 1462.725433] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1462.747171] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 19:23:25 executing program 3: r0 = gettid() ioprio_set$pid(0x3, r0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) read(0xffffffffffffffff, &(0x7f0000000240)=""/100, 0x64) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/member\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100), 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 19:23:25 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) [ 1462.959099] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1462.987836] netlink: 12 bytes leftover after parsing attributes in process `syz-executor2'. [ 1463.018228] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1463.196323] IPVS: ftp: loaded support on port[0] = 21 [ 1463.250405] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1463.374169] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1463.391173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1463.428869] bridge0: port 1(bridge_slave_0) entered blocking state [ 1463.435364] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1464.206948] bridge0: port 1(bridge_slave_0) entered disabled state [ 1464.222882] bridge0: port 1(bridge_slave_0) entered blocking state [ 1464.229275] bridge0: port 1(bridge_slave_0) entered forwarding state 19:23:27 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) [ 1464.388025] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. [ 1464.444110] bridge0: port 2(bridge_slave_1) entered blocking state [ 1464.446634] IPVS: ftp: loaded support on port[0] = 21 [ 1464.450553] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1464.462542] bridge0: port 1(bridge_slave_0) entered blocking state [ 1464.468977] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1464.544596] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1464.562475] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1464.582946] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1464.614568] device team0 left promiscuous mode [ 1464.619282] device team_slave_0 left promiscuous mode [ 1464.644752] device team_slave_1 left promiscuous mode [ 1464.675453] 8021q: adding VLAN 0 to HW filter on device team0 [ 1465.302164] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1465.363515] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1465.584128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 19:23:31 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) [ 1468.565478] netlink: 12 bytes leftover after parsing attributes in process `syz-executor4'. [ 1468.775228] IPVS: ftp: loaded support on port[0] = 21 [ 1470.310351] net_ratelimit: 18 callbacks suppressed [ 1470.310410] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 19:23:33 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) [ 1470.739691] netlink: 12 bytes leftover after parsing attributes in process `syz-executor5'. 19:23:33 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) [ 1470.962836] IPVS: ftp: loaded support on port[0] = 21 19:23:33 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) [ 1471.103254] netlink: 12 bytes leftover after parsing attributes in process `syz-executor4'. [ 1471.205291] netlink: 12 bytes leftover after parsing attributes in process `syz-executor2'. [ 1471.340878] IPVS: ftp: loaded support on port[0] = 21 [ 1471.627201] IPVS: ftp: loaded support on port[0] = 21 [ 1472.941478] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 19:23:36 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) [ 1473.099660] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 1473.267732] netlink: 12 bytes leftover after parsing attributes in process `syz-executor5'. [ 1473.555528] IPVS: ftp: loaded support on port[0] = 21 19:23:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) [ 1474.693571] netlink: 12 bytes leftover after parsing attributes in process `syz-executor2'. 19:23:38 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) [ 1475.266845] IPVS: ftp: loaded support on port[0] = 21 [ 1475.357054] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. [ 1475.518033] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 1475.665672] IPVS: ftp: loaded support on port[0] = 21 [ 1477.482044] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1477.620857] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 19:23:50 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) [ 1488.041875] netlink: 12 bytes leftover after parsing attributes in process `syz-executor1'. [ 1488.270305] IPVS: ftp: loaded support on port[0] = 21 19:23:51 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) 19:23:51 executing program 5: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000080)) setsockopt$sock_attach_bpf(r0, 0x6, 0xe, &(0x7f00000002c0), 0x4) 19:23:51 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) 19:23:51 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) [ 1488.764330] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. [ 1488.795151] netlink: 12 bytes leftover after parsing attributes in process `syz-executor4'. 19:23:51 executing program 5: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000080)) setsockopt$sock_attach_bpf(r0, 0x6, 0xe, &(0x7f00000002c0), 0x4) [ 1488.827990] netlink: 12 bytes leftover after parsing attributes in process `syz-executor0'. [ 1488.972099] IPVS: ftp: loaded support on port[0] = 21 [ 1489.010224] IPVS: ftp: loaded support on port[0] = 21 [ 1489.026586] IPVS: ftp: loaded support on port[0] = 21 [ 1489.065840] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1489.181352] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 19:23:52 executing program 5: r0 = socket$kcm(0x2b, 0x200000000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$kcm(r0, &(0x7f0000002900)={&(0x7f0000000000)=@in={0x2, 0x0, @remote}, 0x80, 0x0}, 0x20000054) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x5452, &(0x7f0000000080)) setsockopt$sock_attach_bpf(r0, 0x6, 0xe, &(0x7f00000002c0), 0x4) [ 1489.733906] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. 19:23:52 executing program 5: r0 = gettid() ioprio_set$pid(0x3, r0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) read(0xffffffffffffffff, &(0x7f0000000240)=""/100, 0x64) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/member\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100), 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 1489.977511] protocol 88fb is buggy, dev hsr_slave_0 [ 1489.982646] protocol 88fb is buggy, dev hsr_slave_1 19:23:52 executing program 1: r0 = gettid() ioprio_set$pid(0x3, r0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) read(0xffffffffffffffff, &(0x7f0000000240)=""/100, 0x64) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/member\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100), 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 1490.222950] protocol 88fb is buggy, dev hsr_slave_0 [ 1490.229085] protocol 88fb is buggy, dev hsr_slave_1 [ 1490.311886] bridge0: port 1(bridge_slave_0) entered disabled state [ 1490.415994] bridge0: port 1(bridge_slave_0) entered blocking state [ 1490.422513] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1490.487619] protocol 88fb is buggy, dev hsr_slave_0 [ 1490.493580] protocol 88fb is buggy, dev hsr_slave_1 19:23:53 executing program 5: r0 = gettid() ioprio_set$pid(0x3, r0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) read(0xffffffffffffffff, &(0x7f0000000240)=""/100, 0x64) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/member\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100), 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 1491.189443] protocol 88fb is buggy, dev hsr_slave_0 [ 1491.195373] protocol 88fb is buggy, dev hsr_slave_1 [ 1491.815261] bridge0: port 1(bridge_slave_0) entered disabled state [ 1491.833569] bridge0: port 1(bridge_slave_0) entered blocking state [ 1491.840044] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1491.862020] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1491.939966] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1492.052362] bridge0: port 1(bridge_slave_0) entered disabled state [ 1492.071371] bridge0: port 1(bridge_slave_0) entered blocking state [ 1492.077864] bridge0: port 1(bridge_slave_0) entered forwarding state 19:23:58 executing program 5: r0 = gettid() ioprio_set$pid(0x3, r0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) read(0xffffffffffffffff, &(0x7f0000000240)=""/100, 0x64) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/member\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100), 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 19:23:58 executing program 1: r0 = gettid() ioprio_set$pid(0x3, r0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) read(0xffffffffffffffff, &(0x7f0000000240)=""/100, 0x64) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/member\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100), 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 19:23:58 executing program 2: r0 = gettid() ioprio_set$pid(0x3, r0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) read(0xffffffffffffffff, &(0x7f0000000240)=""/100, 0x64) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/member\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100), 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 1496.275254] net_ratelimit: 10 callbacks suppressed [ 1496.275299] protocol 88fb is buggy, dev hsr_slave_0 [ 1496.286297] protocol 88fb is buggy, dev hsr_slave_1 [ 1496.515669] protocol 88fb is buggy, dev hsr_slave_0 [ 1496.521394] protocol 88fb is buggy, dev hsr_slave_1 [ 1496.758037] protocol 88fb is buggy, dev hsr_slave_0 [ 1496.763542] protocol 88fb is buggy, dev hsr_slave_1 [ 1497.340609] bridge0: port 1(bridge_slave_0) entered disabled state [ 1497.349869] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1497.361892] bridge0: port 1(bridge_slave_0) entered disabled state [ 1497.493670] protocol 88fb is buggy, dev hsr_slave_0 [ 1497.498813] protocol 88fb is buggy, dev hsr_slave_1 [ 1497.564441] protocol 88fb is buggy, dev hsr_slave_0 [ 1497.569571] protocol 88fb is buggy, dev hsr_slave_1 [ 1497.839479] bridge0: port 1(bridge_slave_0) entered disabled state [ 1497.848578] bridge0: port 1(bridge_slave_0) entered blocking state [ 1497.854975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1497.863781] bridge0: port 1(bridge_slave_0) entered blocking state [ 1497.870226] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1497.897299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1497.917908] bridge0: port 1(bridge_slave_0) entered blocking state [ 1497.924320] bridge0: port 1(bridge_slave_0) entered forwarding state 19:24:01 executing program 1: r0 = gettid() ioprio_set$pid(0x3, r0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) read(0xffffffffffffffff, &(0x7f0000000240)=""/100, 0x64) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/member\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100), 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 19:24:01 executing program 5: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) 19:24:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setrlimit(0x40000000000008, &(0x7f0000000000)) mlock2(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0) [ 1499.026879] bridge0: port 1(bridge_slave_0) entered disabled state [ 1499.042569] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1499.066054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1499.076365] bridge0: port 1(bridge_slave_0) entered blocking state [ 1499.082842] bridge0: port 1(bridge_slave_0) entered forwarding state 19:24:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r4, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf32(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="7f"], 0x1) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f00000001c0)={0x20}, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) 19:24:01 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.mems\x00', 0x2, 0x0) syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7ff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) getpgid(0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000640)='memory.events\x00\x8a\xaaE\x90\x14S\x81N\b\xee\x14-2%r\x91d\xedwz\xcb\x1d\xf4\x00}M\xa7\xb5\xb5\xdb!&\xfb\xafc\xed\x9e\xed(RR\xbd3g\xcd^\xae\xf0_\xd8\r\x15i+\xaa\x01\x0fR\xf0&\xeb\xafn#\x18\x85@\xcay\x84\xaa\x0e\xf7\x90\b\xa9D\xe7\xe4\x18\xfd\xc3\xd3\x94\x02s\xde\xe4\xdez\xe01\xc5[\xd4\xbeT\xb5\xb6x\x9b\xab{\xfb\xd4dUht\"\b%H:v?x\xd4\xa2l\xe3\xf2\xcd\xf1\xeb\fl\x04\xdb+\x1f$\x86I\t@\x83\xd7!z\x00z\xda\x11t\xaa\xd7\x8b\xedZ/v}1V,W\xe6\t\a\xeba', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000600)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000300)=0x4, 0x260) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth1_to_bond\x00', 0x2}, 0x18) ioctl(r2, 0x800000000008982, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x20, 0x20, 0x1, 0x0, 0x0, {0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], 0x12) mount(&(0x7f0000000880)=ANY=[], &(0x7f0000000800)='./file0//ile0\x00', &(0x7f0000000200)='cgrQup2\x00', 0x2, 0x0) ioctl$TIOCNXCL(r1, 0x540d) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x40000000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$pptp(0x18, 0x1, 0x2) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={&(0x7f00000000c0)={0x20000010, 0x0, 0x2000000000000}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000a80)=ANY=[], &(0x7f0000000140)) ioctl$SG_GET_PACK_ID(r4, 0x227c, &(0x7f0000000400)) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r4, 0x84, 0x79, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x900000000000) syz_open_dev$usbmon(&(0x7f0000000380)='/dev/usbmon#\x00', 0x0, 0x400880) 19:24:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setrlimit(0x40000000000008, &(0x7f0000000000)) mlock2(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0) 19:24:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000), 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003500)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000001c0)="e5346e8e1deb17eeedb5a59043c31516", 0x10}], 0x1}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) 19:24:01 executing program 2: r0 = gettid() ioprio_set$pid(0x3, r0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) read(0xffffffffffffffff, &(0x7f0000000240)=""/100, 0x64) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/member\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100), 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) 19:24:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setrlimit(0x40000000000008, &(0x7f0000000000)) mlock2(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0) 19:24:01 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000), 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003500)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000001c0)="e5346e8e1deb17eeedb5a59043c31516", 0x10}], 0x1}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) [ 1499.369109] netlink: 12 bytes leftover after parsing attributes in process `syz-executor4'. 19:24:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000), 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003500)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000001c0)="e5346e8e1deb17eeedb5a59043c31516", 0x10}], 0x1}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) 19:24:02 executing program 5: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) [ 1499.573653] IPVS: ftp: loaded support on port[0] = 21 19:24:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000), 0x1c) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000003500)=[{&(0x7f0000000100)=""/170, 0xaa}], 0x1}, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)=[{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000001c0)="e5346e8e1deb17eeedb5a59043c31516", 0x10}], 0x1}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000240)=[{{0x0, 0x0, &(0x7f0000002d40), 0x2bc}}, {{0x0, 0x0, &(0x7f0000000040), 0x361, &(0x7f0000000140)}}], 0x40001ab, 0x0) 19:24:02 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0x0, 0x7) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x6000)=nil, 0x6000, 0x7, 0x11, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x3) madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x9) write(r0, &(0x7f0000000240)="8c", 0x1) 19:24:02 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0x0, 0x7) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x6000)=nil, 0x6000, 0x7, 0x11, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x3) madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x9) write(r0, &(0x7f0000000240)="8c", 0x1) [ 1500.469405] bridge0: port 1(bridge_slave_0) entered disabled state [ 1500.478421] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 19:24:03 executing program 2: r0 = gettid() ioprio_set$pid(0x3, r0, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) read(0xffffffffffffffff, &(0x7f0000000240)=""/100, 0x64) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/member\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000100), 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'bridge_slave_0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000080)={'bridge_slave_0\x00', 0x2000000c0ffffff}) [ 1500.535081] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 1500.652856] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1500.660761] bridge0: port 1(bridge_slave_0) entered blocking state [ 1500.667198] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1501.554800] bridge0: port 1(bridge_slave_0) entered disabled state [ 1501.563463] bridge0: port 1(bridge_slave_0) entered blocking state [ 1501.569943] bridge0: port 1(bridge_slave_0) entered forwarding state 19:24:04 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setrlimit(0x40000000000008, &(0x7f0000000000)) mlock2(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x0) 19:24:04 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0x0, 0x7) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x6000)=nil, 0x6000, 0x7, 0x11, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x3) madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x9) write(r0, &(0x7f0000000240)="8c", 0x1) 19:24:04 executing program 5: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) 19:24:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r4, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf32(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="7f"], 0x1) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f00000001c0)={0x20}, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) 19:24:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r4, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf32(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="7f"], 0x1) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f00000001c0)={0x20}, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) 19:24:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r4, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf32(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="7f"], 0x1) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f00000001c0)={0x20}, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) 19:24:04 executing program 0: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0x0, 0x7) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x6000)=nil, 0x6000, 0x7, 0x11, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x3) madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x9) write(r0, &(0x7f0000000240)="8c", 0x1) 19:24:04 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0x0, 0x7) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x6000)=nil, 0x6000, 0x7, 0x11, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x3) madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x9) write(r0, &(0x7f0000000240)="8c", 0x1) 19:24:04 executing program 0: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0x0, 0x7) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x6000)=nil, 0x6000, 0x7, 0x11, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x3) madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x9) write(r0, &(0x7f0000000240)="8c", 0x1) 19:24:04 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0x0, 0x7) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x6000)=nil, 0x6000, 0x7, 0x11, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x3) madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x9) write(r0, &(0x7f0000000240)="8c", 0x1) 19:24:04 executing program 0: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0x0, 0x7) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x6000)=nil, 0x6000, 0x7, 0x11, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x3) madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x9) write(r0, &(0x7f0000000240)="8c", 0x1) 19:24:04 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0x0, 0x7) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x6000)=nil, 0x6000, 0x7, 0x11, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x3) madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x9) write(r0, &(0x7f0000000240)="8c", 0x1) 19:24:04 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x0, 0x0, 0x7) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000007000/0x6000)=nil, 0x6000, 0x7, 0x11, r1, 0x0) fallocate(r0, 0x0, 0x0, 0x3) madvise(&(0x7f0000007000/0x4000)=nil, 0x4000, 0x9) write(r0, &(0x7f0000000240)="8c", 0x1) 19:24:04 executing program 0: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) close(r0) 19:24:05 executing program 5: socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000040)) 19:24:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x30, 0x2, 0x2, 0xffffffffffffffff, 0x0, 0x0, {}, [@typed={0x8, 0x2, @pid}, @typed={0x14, 0x7, @ipv6=@mcast2}]}, 0x30}}, 0x0) 19:24:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r4, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf32(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="7f"], 0x1) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f00000001c0)={0x20}, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) 19:24:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000d0cfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0xada, 0x7) sendfile(r1, r2, &(0x7f0000ccb000), 0x2) 19:24:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r4, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf32(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="7f"], 0x1) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f00000001c0)={0x20}, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) 19:24:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r4, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf32(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="7f"], 0x1) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f00000001c0)={0x20}, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) [ 1502.688888] netlink: 'syz-executor1': attribute type 7 has an invalid length. 19:24:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000d0cfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0xada, 0x7) sendfile(r1, r2, &(0x7f0000ccb000), 0x2) [ 1502.759039] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 19:24:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x30, 0x2, 0x2, 0xffffffffffffffff, 0x0, 0x0, {}, [@typed={0x8, 0x2, @pid}, @typed={0x14, 0x7, @ipv6=@mcast2}]}, 0x30}}, 0x0) 19:24:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000d0cfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0xada, 0x7) sendfile(r1, r2, &(0x7f0000ccb000), 0x2) [ 1502.939768] netlink: 'syz-executor1': attribute type 7 has an invalid length. [ 1502.965983] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 19:24:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x30, 0x2, 0x2, 0xffffffffffffffff, 0x0, 0x0, {}, [@typed={0x8, 0x2, @pid}, @typed={0x14, 0x7, @ipv6=@mcast2}]}, 0x30}}, 0x0) [ 1503.106129] netlink: 'syz-executor1': attribute type 7 has an invalid length. [ 1503.121584] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 19:24:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000d0cfa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f0000000240)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0xada, 0x7) sendfile(r1, r2, &(0x7f0000ccb000), 0x2) 19:24:05 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x30, 0x2, 0x2, 0xffffffffffffffff, 0x0, 0x0, {}, [@typed={0x8, 0x2, @pid}, @typed={0x14, 0x7, @ipv6=@mcast2}]}, 0x30}}, 0x0) 19:24:05 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000009c0)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x1, r1}, 0x10) [ 1503.277982] netlink: 'syz-executor1': attribute type 7 has an invalid length. [ 1503.293714] netlink: 4 bytes leftover after parsing attributes in process `syz-executor1'. 19:24:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r4, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf32(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="7f"], 0x1) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f00000001c0)={0x20}, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) 19:24:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000009c0)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x1, r1}, 0x10) 19:24:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000009c0)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x1, r1}, 0x10) 19:24:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0004063fc900000000000040050000008c01000004000000000ba1f98937702d8f9523b107d90920a91c8275dd4b2e7c490dc38b518cdf628235ceeebd02462dfbed5bba48fc6b5d591efb6913"], 0x4d) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x9) r2 = dup2(r1, r1) ioctl$TCXONC(r2, 0x540a, 0x3) 19:24:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r4, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf32(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="7f"], 0x1) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f00000001c0)={0x20}, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) 19:24:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r4, &(0x7f0000000240)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf32(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="7f"], 0x1) setsockopt$inet_icmp_ICMP_FILTER(r4, 0x1, 0x1, &(0x7f00000001c0)={0x20}, 0x4) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10003, 0x0) 19:24:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000009c0)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x1, r1}, 0x10) 19:24:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000009c0)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x1, r1}, 0x10) 19:24:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0004063fc900000000000040050000008c01000004000000000ba1f98937702d8f9523b107d90920a91c8275dd4b2e7c490dc38b518cdf628235ceeebd02462dfbed5bba48fc6b5d591efb6913"], 0x4d) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x9) r2 = dup2(r1, r1) ioctl$TCXONC(r2, 0x540a, 0x3) 19:24:06 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000009c0)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x1, r1}, 0x10) 19:24:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000009c0)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r2, 0x11b, 0x2, &(0x7f0000000040)=0x800, 0x4) bind$xdp(r2, &(0x7f0000000300)={0x2c, 0x1, r1}, 0x10) 19:24:06 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0004063fc900000000000040050000008c01000004000000000ba1f98937702d8f9523b107d90920a91c8275dd4b2e7c490dc38b518cdf628235ceeebd02462dfbed5bba48fc6b5d591efb6913"], 0x4d) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x9) r2 = dup2(r1, r1) ioctl$TCXONC(r2, 0x540a, 0x3) 19:24:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0004063fc900000000000040050000008c01000004000000000ba1f98937702d8f9523b107d90920a91c8275dd4b2e7c490dc38b518cdf628235ceeebd02462dfbed5bba48fc6b5d591efb6913"], 0x4d) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x9) r2 = dup2(r1, r1) ioctl$TCXONC(r2, 0x540a, 0x3) 19:24:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0004063fc900000000000040050000008c01000004000000000ba1f98937702d8f9523b107d90920a91c8275dd4b2e7c490dc38b518cdf628235ceeebd02462dfbed5bba48fc6b5d591efb6913"], 0x4d) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x9) r2 = dup2(r1, r1) ioctl$TCXONC(r2, 0x540a, 0x3) 19:24:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0004063fc900000000000040050000008c01000004000000000ba1f98937702d8f9523b107d90920a91c8275dd4b2e7c490dc38b518cdf628235ceeebd02462dfbed5bba48fc6b5d591efb6913"], 0x4d) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x9) r2 = dup2(r1, r1) ioctl$TCXONC(r2, 0x540a, 0x3) 19:24:07 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f0000000040)={0x13, 0x10, 0x10f, {0x0, r1, 0x2}}, 0x18) 19:24:07 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0004063fc900000000000040050000008c01000004000000000ba1f98937702d8f9523b107d90920a91c8275dd4b2e7c490dc38b518cdf628235ceeebd02462dfbed5bba48fc6b5d591efb6913"], 0x4d) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x9) r2 = dup2(r1, r1) ioctl$TCXONC(r2, 0x540a, 0x3) 19:24:07 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="240000002e0007081dfffd940101830020200a000900000006000000600000000d00ff7e", 0x24}], 0x1}, 0x0) 19:24:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0004063fc900000000000040050000008c01000004000000000ba1f98937702d8f9523b107d90920a91c8275dd4b2e7c490dc38b518cdf628235ceeebd02462dfbed5bba48fc6b5d591efb6913"], 0x4d) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x9) r2 = dup2(r1, r1) ioctl$TCXONC(r2, 0x540a, 0x3) 19:24:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0004063fc900000000000040050000008c01000004000000000ba1f98937702d8f9523b107d90920a91c8275dd4b2e7c490dc38b518cdf628235ceeebd02462dfbed5bba48fc6b5d591efb6913"], 0x4d) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x9) r2 = dup2(r1, r1) ioctl$TCXONC(r2, 0x540a, 0x3) 19:24:07 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) close(r0) 19:24:07 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) close(r0) 19:24:07 executing program 3: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:24:07 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = memfd_create(&(0x7f00000000c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb9\x00a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write$eventfd(r2, &(0x7f0000000140), 0x8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) ptrace$getregset(0x4205, r1, 0x1, &(0x7f0000000000)={0x0, 0x35c}) 19:24:07 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="240000002e0007081dfffd940101830020200a000900000006000000600000000d00ff7e", 0x24}], 0x1}, 0x0) 19:24:07 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x1, 0x0) write$binfmt_aout(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="0004063fc900000000000040050000008c01000004000000000ba1f98937702d8f9523b107d90920a91c8275dd4b2e7c490dc38b518cdf628235ceeebd02462dfbed5bba48fc6b5d591efb6913"], 0x4d) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000000)=0x9) r2 = dup2(r1, r1) ioctl$TCXONC(r2, 0x540a, 0x3) 19:24:07 executing program 5: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x2, 0xffffffffffffff9c, 0x0, [0x2]}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xc, 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0xffffffffffffffff, 0xfffffdd3) unshare(0x40000000) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) lchown(&(0x7f0000000300)='./file0\x00', r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000500)={{}, {0x7fffffff}, 0x4, 0x4, 0x157c}) 19:24:07 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) close(r0) 19:24:07 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = memfd_create(&(0x7f00000000c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb9\x00a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write$eventfd(r2, &(0x7f0000000140), 0x8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) ptrace$getregset(0x4205, r1, 0x1, &(0x7f0000000000)={0x0, 0x35c}) 19:24:07 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="240000002e0007081dfffd940101830020200a000900000006000000600000000d00ff7e", 0x24}], 0x1}, 0x0) [ 1505.346034] IPVS: ftp: loaded support on port[0] = 21 19:24:07 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = memfd_create(&(0x7f00000000c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb9\x00a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write$eventfd(r2, &(0x7f0000000140), 0x8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) ptrace$getregset(0x4205, r1, 0x1, &(0x7f0000000000)={0x0, 0x35c}) 19:24:08 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = memfd_create(&(0x7f00000000c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb9\x00a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write$eventfd(r2, &(0x7f0000000140), 0x8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) ptrace$getregset(0x4205, r1, 0x1, &(0x7f0000000000)={0x0, 0x35c}) 19:24:08 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="240000002e0007081dfffd940101830020200a000900000006000000600000000d00ff7e", 0x24}], 0x1}, 0x0) 19:24:08 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = memfd_create(&(0x7f00000000c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb9\x00a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write$eventfd(r2, &(0x7f0000000140), 0x8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) ptrace$getregset(0x4205, r1, 0x1, &(0x7f0000000000)={0x0, 0x35c}) 19:24:08 executing program 3: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:24:08 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = memfd_create(&(0x7f00000000c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb9\x00a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write$eventfd(r2, &(0x7f0000000140), 0x8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) ptrace$getregset(0x4205, r1, 0x1, &(0x7f0000000000)={0x0, 0x35c}) 19:24:08 executing program 0: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = memfd_create(&(0x7f00000000c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb9\x00a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write$eventfd(r2, &(0x7f0000000140), 0x8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) ptrace$getregset(0x4205, r1, 0x1, &(0x7f0000000000)={0x0, 0x35c}) 19:24:08 executing program 1: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = memfd_create(&(0x7f00000000c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb9\x00a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write$eventfd(r2, &(0x7f0000000140), 0x8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) ptrace$getregset(0x4205, r1, 0x1, &(0x7f0000000000)={0x0, 0x35c}) [ 1506.142540] IPVS: ftp: loaded support on port[0] = 21 19:24:11 executing program 5: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x2, 0xffffffffffffff9c, 0x0, [0x2]}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xc, 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0xffffffffffffffff, 0xfffffdd3) unshare(0x40000000) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) lchown(&(0x7f0000000300)='./file0\x00', r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000500)={{}, {0x7fffffff}, 0x4, 0x4, 0x157c}) 19:24:11 executing program 4: r0 = socket$kcm(0x2, 0x2, 0x73) close(r0) 19:24:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x4, 0x0, 0x0}, 0x2c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x0, 0x5c7d, 0xe2a, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x1, 0x5, @perf_config_ext={0x80000001, 0x9}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000000)="98", &(0x7f0000000080)=""/130}, 0x18) 19:24:11 executing program 3: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:24:11 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = memfd_create(&(0x7f00000000c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb9\x00a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write$eventfd(r2, &(0x7f0000000140), 0x8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) ptrace$getregset(0x4205, r1, 0x1, &(0x7f0000000000)={0x0, 0x35c}) 19:24:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 19:24:11 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x2, 0xffffffffffffff9c, 0x0, [0x2]}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xc, 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0xffffffffffffffff, 0xfffffdd3) unshare(0x40000000) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) lchown(&(0x7f0000000300)='./file0\x00', r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000500)={{}, {0x7fffffff}, 0x4, 0x4, 0x157c}) 19:24:11 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) r2 = memfd_create(&(0x7f00000000c0)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb9\x00a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write$eventfd(r2, &(0x7f0000000140), 0x8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r2, 0x0) ptrace$getregset(0x4205, r1, 0x1, &(0x7f0000000000)={0x0, 0x35c}) 19:24:11 executing program 3: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe0ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1509.027066] IPVS: ftp: loaded support on port[0] = 21 19:24:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x4, 0x0, 0x0}, 0x2c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x0, 0x5c7d, 0xe2a, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x1, 0x5, @perf_config_ext={0x80000001, 0x9}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000000)="98", &(0x7f0000000080)=""/130}, 0x18) 19:24:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x4, 0x0, 0x0}, 0x2c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x0, 0x5c7d, 0xe2a, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x1, 0x5, @perf_config_ext={0x80000001, 0x9}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000000)="98", &(0x7f0000000080)=""/130}, 0x18) 19:24:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x4, 0x0, 0x0}, 0x2c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x0, 0x5c7d, 0xe2a, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x1, 0x5, @perf_config_ext={0x80000001, 0x9}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000000)="98", &(0x7f0000000080)=""/130}, 0x18) 19:24:12 executing program 5: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x2, 0xffffffffffffff9c, 0x0, [0x2]}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xc, 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0xffffffffffffffff, 0xfffffdd3) unshare(0x40000000) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) lchown(&(0x7f0000000300)='./file0\x00', r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000500)={{}, {0x7fffffff}, 0x4, 0x4, 0x157c}) 19:24:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x4, 0x0, 0x0}, 0x2c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x0, 0x5c7d, 0xe2a, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x1, 0x5, @perf_config_ext={0x80000001, 0x9}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000000)="98", &(0x7f0000000080)=""/130}, 0x18) 19:24:12 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x4, 0x0, 0x0}, 0x2c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x0, 0x5c7d, 0xe2a, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x1, 0x5, @perf_config_ext={0x80000001, 0x9}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000000)="98", &(0x7f0000000080)=""/130}, 0x18) [ 1509.719354] IPVS: ftp: loaded support on port[0] = 21 [ 1509.927218] IPVS: ftp: loaded support on port[0] = 21 19:24:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 19:24:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 19:24:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x4, 0x0, 0x0}, 0x2c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x0, 0x5c7d, 0xe2a, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x1, 0x5, @perf_config_ext={0x80000001, 0x9}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000000)="98", &(0x7f0000000080)=""/130}, 0x18) 19:24:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 19:24:12 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x2, 0xffffffffffffff9c, 0x0, [0x2]}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xc, 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0xffffffffffffffff, 0xfffffdd3) unshare(0x40000000) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) lchown(&(0x7f0000000300)='./file0\x00', r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000500)={{}, {0x7fffffff}, 0x4, 0x4, 0x157c}) 19:24:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) [ 1510.378252] IPVS: ftp: loaded support on port[0] = 21 19:24:13 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x2, 0xffffffffffffff9c, 0x0, [0x2]}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xc, 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0xffffffffffffffff, 0xfffffdd3) unshare(0x40000000) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) lchown(&(0x7f0000000300)='./file0\x00', r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000500)={{}, {0x7fffffff}, 0x4, 0x4, 0x157c}) 19:24:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 19:24:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) [ 1511.576897] IPVS: ftp: loaded support on port[0] = 21 19:24:16 executing program 5: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x2, 0xffffffffffffff9c, 0x0, [0x2]}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xc, 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0xffffffffffffffff, 0xfffffdd3) unshare(0x40000000) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) lchown(&(0x7f0000000300)='./file0\x00', r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000500)={{}, {0x7fffffff}, 0x4, 0x4, 0x157c}) 19:24:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 19:24:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 19:24:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 19:24:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 19:24:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x4, 0x0, 0x0}, 0x2c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x0, 0x5c7d, 0xe2a, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x1, 0x5, @perf_config_ext={0x80000001, 0x9}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000000)="98", &(0x7f0000000080)=""/130}, 0x18) [ 1513.920828] IPVS: ftp: loaded support on port[0] = 21 19:24:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x4, 0x0, 0x0}, 0x2c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x0, 0x5c7d, 0xe2a, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x1, 0x5, @perf_config_ext={0x80000001, 0x9}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000000)="98", &(0x7f0000000080)=""/130}, 0x18) 19:24:16 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x6, 0x4, 0x200, 0x4, 0x0, 0x0}, 0x2c) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x3, 0x0, 0x0, 0x7fffffff, 0x0, 0x81, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x0, 0x5c7d, 0xe2a, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x1, 0x5, @perf_config_ext={0x80000001, 0x9}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000200)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r0, &(0x7f0000000000)="98", &(0x7f0000000080)=""/130}, 0x18) 19:24:17 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x2, 0xffffffffffffff9c, 0x0, [0x2]}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xc, 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0xffffffffffffffff, 0xfffffdd3) unshare(0x40000000) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) lchown(&(0x7f0000000300)='./file0\x00', r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000500)={{}, {0x7fffffff}, 0x4, 0x4, 0x157c}) 19:24:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 19:24:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffd, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001480)) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f00000000c0)=@alg, 0x80, &(0x7f0000000140)=[{&(0x7f0000000200)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 19:24:17 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x8, 0x81}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r0, &(0x7f0000000080), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f0000000080)}, 0x10) [ 1515.007142] IPVS: ftp: loaded support on port[0] = 21 19:24:20 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x2, 0xffffffffffffff9c, 0x0, [0x2]}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xc, 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0xffffffffffffffff, 0xfffffdd3) unshare(0x40000000) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) lchown(&(0x7f0000000300)='./file0\x00', r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000500)={{}, {0x7fffffff}, 0x4, 0x4, 0x157c}) 19:24:20 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x8, 0x81}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r0, &(0x7f0000000080), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f0000000080)}, 0x10) 19:24:20 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000001a40)=""/100, 0x64}, {&(0x7f0000001ac0)=""/215, 0xd7}], 0x2, &(0x7f0000001c00)=""/58, 0x3a}, 0x6}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}], 0x2, 0x100, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="e180db4e3b23cdde86a3b7ae4fdb961983a44c4bca5351a6904cf9b053d46ee6", 0x20) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 19:24:20 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) io_setup(0x5, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 19:24:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x8, 0x81}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r0, &(0x7f0000000080), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f0000000080)}, 0x10) 19:24:20 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) 19:24:20 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x8, 0x81}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r0, &(0x7f0000000080), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f0000000080)}, 0x10) 19:24:20 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x8, 0x81}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r0, &(0x7f0000000080), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f0000000080)}, 0x10) 19:24:20 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x3310, 0x0) 19:24:20 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) io_setup(0x5, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 19:24:20 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000001a40)=""/100, 0x64}, {&(0x7f0000001ac0)=""/215, 0xd7}], 0x2, &(0x7f0000001c00)=""/58, 0x3a}, 0x6}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}], 0x2, 0x100, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="e180db4e3b23cdde86a3b7ae4fdb961983a44c4bca5351a6904cf9b053d46ee6", 0x20) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) [ 1518.050809] IPVS: ftp: loaded support on port[0] = 21 19:24:20 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000001a40)=""/100, 0x64}, {&(0x7f0000001ac0)=""/215, 0xd7}], 0x2, &(0x7f0000001c00)=""/58, 0x3a}, 0x6}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}], 0x2, 0x100, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="e180db4e3b23cdde86a3b7ae4fdb961983a44c4bca5351a6904cf9b053d46ee6", 0x20) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 19:24:21 executing program 4: r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x6, 0x0, 0x2, 0xffffffffffffff9c, 0x0, [0x2]}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000280)) ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xc, 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0xffffffffffffffff, 0xfffffdd3) unshare(0x40000000) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) lchown(&(0x7f0000000300)='./file0\x00', r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000500)={{}, {0x7fffffff}, 0x4, 0x4, 0x157c}) 19:24:21 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x8, 0x81}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r0, &(0x7f0000000080), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f0000000080)}, 0x10) 19:24:21 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x8, 0x8, 0x81}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001140)={r0, &(0x7f0000000080), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f0000000080)}, 0x10) 19:24:21 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) io_setup(0x5, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 19:24:21 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000001a40)=""/100, 0x64}, {&(0x7f0000001ac0)=""/215, 0xd7}], 0x2, &(0x7f0000001c00)=""/58, 0x3a}, 0x6}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}], 0x2, 0x100, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="e180db4e3b23cdde86a3b7ae4fdb961983a44c4bca5351a6904cf9b053d46ee6", 0x20) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 19:24:21 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000001a40)=""/100, 0x64}, {&(0x7f0000001ac0)=""/215, 0xd7}], 0x2, &(0x7f0000001c00)=""/58, 0x3a}, 0x6}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}], 0x2, 0x100, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="e180db4e3b23cdde86a3b7ae4fdb961983a44c4bca5351a6904cf9b053d46ee6", 0x20) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 19:24:21 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000001a40)=""/100, 0x64}, {&(0x7f0000001ac0)=""/215, 0xd7}], 0x2, &(0x7f0000001c00)=""/58, 0x3a}, 0x6}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}], 0x2, 0x100, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="e180db4e3b23cdde86a3b7ae4fdb961983a44c4bca5351a6904cf9b053d46ee6", 0x20) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 19:24:21 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000000c0)={0x1}) 19:24:21 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000001a40)=""/100, 0x64}, {&(0x7f0000001ac0)=""/215, 0xd7}], 0x2, &(0x7f0000001c00)=""/58, 0x3a}, 0x6}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}], 0x2, 0x100, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="e180db4e3b23cdde86a3b7ae4fdb961983a44c4bca5351a6904cf9b053d46ee6", 0x20) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 19:24:21 executing program 5: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000000)) openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40400) io_setup(0x5, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 19:24:21 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000001a40)=""/100, 0x64}, {&(0x7f0000001ac0)=""/215, 0xd7}], 0x2, &(0x7f0000001c00)=""/58, 0x3a}, 0x6}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}], 0x2, 0x100, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="e180db4e3b23cdde86a3b7ae4fdb961983a44c4bca5351a6904cf9b053d46ee6", 0x20) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 19:24:21 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000000c0)={0x1}) [ 1519.234970] IPVS: ftp: loaded support on port[0] = 21 19:24:22 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000000c0)={0x1}) 19:24:22 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000001a40)=""/100, 0x64}, {&(0x7f0000001ac0)=""/215, 0xd7}], 0x2, &(0x7f0000001c00)=""/58, 0x3a}, 0x6}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}], 0x2, 0x100, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="e180db4e3b23cdde86a3b7ae4fdb961983a44c4bca5351a6904cf9b053d46ee6", 0x20) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 19:24:22 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000000c0)={0x1}) 19:24:22 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 19:24:22 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000000100)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000540)}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xff7f, 0x10000101) 19:24:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:22 executing program 1: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000000c0)={0x1}) 19:24:22 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000005bc0)=[{{0x0, 0x0, &(0x7f0000001bc0)=[{&(0x7f0000001a40)=""/100, 0x64}, {&(0x7f0000001ac0)=""/215, 0xd7}], 0x2, &(0x7f0000001c00)=""/58, 0x3a}, 0x6}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}], 0x2, 0x100, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000340)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000001c0)="e180db4e3b23cdde86a3b7ae4fdb961983a44c4bca5351a6904cf9b053d46ee6", 0x20) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) recvmmsg(r1, &(0x7f0000001bc0), 0xfe, 0x0, &(0x7f0000001d00)={0x77359400}) 19:24:22 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000000c0)={0x1}) 19:24:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00z\x88\x02\x03G\x11\x02\x00l\x00\x00\x00\x00t\x00\x02\x00\x00\x00z\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, 0x0, &(0x7f0000000900)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) 19:24:22 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f00000000c0)={0x1}) 19:24:22 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000000100)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000540)}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xff7f, 0x10000101) 19:24:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:22 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:22 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) [ 1520.397303] xt_connbytes: cannot load conntrack support for proto=7 [ 1520.403905] xt_connbytes: Forcing CT accounting to be enabled 19:24:22 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 19:24:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00z\x88\x02\x03G\x11\x02\x00l\x00\x00\x00\x00t\x00\x02\x00\x00\x00z\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, 0x0, &(0x7f0000000900)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) [ 1520.774589] xt_connbytes: cannot load conntrack support for proto=7 19:24:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00z\x88\x02\x03G\x11\x02\x00l\x00\x00\x00\x00t\x00\x02\x00\x00\x00z\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, 0x0, &(0x7f0000000900)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) 19:24:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:23 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000000100)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000540)}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xff7f, 0x10000101) [ 1521.147185] xt_connbytes: cannot load conntrack support for proto=7 19:24:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000500)=@broute={'broute\x00z\x88\x02\x03G\x11\x02\x00l\x00\x00\x00\x00t\x00\x02\x00\x00\x00z\x00', 0x20, 0x2, 0x210, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000900], 0x0, 0x0, &(0x7f0000000900)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x9, 0x0, 0x0, 'vlan0\x00', 'vcan0\x00', 'yam0\x00', 'erspan0\x00', @link_local, [], @empty, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xfffffffffffffffe}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffc, 0x1, [{{{0x3, 0x0, 0x0, 'bond_slave_1\x00', 'ip6gretap0\x00', 'bond_slave_1\x00', 'veth0\x00', @broadcast, [], @link_local, [], 0xb0, 0xb0, 0xe0, [@connbytes={'connbytes\x00', 0x18}]}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}}]}]}, 0x288) 19:24:23 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) [ 1521.453399] xt_connbytes: cannot load conntrack support for proto=7 19:24:23 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000000100)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000540)}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xff7f, 0x10000101) 19:24:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:24 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 19:24:24 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 19:24:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:25 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 19:24:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:25 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 19:24:25 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 19:24:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:26 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000480)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000004c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x9) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vlan0\x00'}) recvmmsg(0xffffffffffffffff, &(0x7f0000009340)=[{{0xffffffffffffffff, 0x0, &(0x7f0000003280)=[{&(0x7f0000002180)=""/113, 0x71}, {&(0x7f0000002200)=""/66, 0x42}, {&(0x7f0000002280)=""/4096, 0x1000}, {&(0x7f0000001e40)=""/64, 0x40}], 0x4, &(0x7f00000032c0)=""/224, 0xe0, 0x9}, 0xfffffffffffffffe}, {{&(0x7f00000034c0)=@sco, 0x80, &(0x7f0000003700)=[{&(0x7f0000003540)=""/187, 0xbb}, {&(0x7f0000003600)=""/253, 0xfd}], 0x2, &(0x7f0000003740)=""/165, 0xa5}, 0x5}, {{&(0x7f0000003980)=@ipx, 0x80, &(0x7f0000005bc0)=[{&(0x7f0000003a00)=""/181, 0xb5}, {&(0x7f0000005b80)=""/23, 0x17}], 0x2, &(0x7f0000005c40)=""/4096, 0x1000}, 0x8}, {{&(0x7f0000006c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000006ec0)=[{&(0x7f0000006e40)=""/103, 0x67}], 0x1, &(0x7f0000006f00)=""/245, 0xf5}}], 0x4, 0x0, 0x0) sysfs$2(0x2, 0x3, &(0x7f0000000500)=""/92) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000), 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000440)={0x8, 0xc5c, 0x5, 0x80000000}) r3 = accept$alg(r2, 0x0, 0x0) r4 = msgget$private(0x0, 0x100) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000400), 0x4) msgctl$MSG_STAT(r4, 0xb, 0x0) recvmmsg(r3, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 19:24:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:27 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000000100)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000540)}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xff7f, 0x10000101) 19:24:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:27 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=0x9, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x4200, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0x7c1a, 0x10}, &(0x7f0000000540)=0xc) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x0) r3 = syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x182) io_setup(0x100000000, &(0x7f0000000140)) io_setup(0x0, &(0x7f0000000300)) io_setup(0x200, &(0x7f0000000440)) io_setup(0x6, &(0x7f0000000480)) io_setup(0x7, &(0x7f00000004c0)) io_setup(0x6, &(0x7f0000000600)) io_setup(0x80, &(0x7f0000000640)) io_setup(0x5, 0x0) io_setup(0x100, 0x0) io_destroy(0x0) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_RELEASE(r2, 0x6431) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0), &(0x7f0000000180)="7dd76e437497d4e876da61", 0xb, 0xfffffffffffffffb) sendfile(r3, r4, &(0x7f0000000380)=0x4, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) socket(0x0, 0x0, 0x10001) ioctl$LOOP_SET_FD(r3, 0x4c00, r4) fcntl$dupfd(r0, 0x40000000000406, r2) 19:24:27 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000000100)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000540)}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xff7f, 0x10000101) 19:24:27 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000000100)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000540)}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xff7f, 0x10000101) 19:24:27 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000000100)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000540)}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xff7f, 0x10000101) 19:24:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="0003008fa6107c95d5"]) ioctl$KVM_NMI(r2, 0xae9a) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000013000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 19:24:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fgetxattr(r0, &(0x7f0000000080)=@random={'btrfs.', '\x00'}, 0x0, 0x0) 19:24:28 executing program 4: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) 19:24:28 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000000100)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000540)}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xff7f, 0x10000101) 19:24:28 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000000100)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000540)}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xff7f, 0x10000101) 19:24:28 executing program 1: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000000100)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000540)}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xff7f, 0x10000101) [ 1525.835175] audit: type=1400 audit(1546975468.224:374): avc: denied { read } for pid=18528 comm="syz-executor5" dev="sockfs" ino=188226 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 19:24:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000200)='./file0\x00', 0xfffffffffffffffc, 0x1, &(0x7f0000000300)=[{&(0x7f0000000000)="400000000200000019000000dc0100002c000000010000000200000000000000002000000020000040000000000000003d5cbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 19:24:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fgetxattr(r0, &(0x7f0000000080)=@random={'btrfs.', '\x00'}, 0x0, 0x0) [ 1525.949472] audit: type=1400 audit(1546975468.253:375): avc: denied { getattr } for pid=18528 comm="syz-executor5" name="NETLINK" dev="sockfs" ino=188226 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1526.037971] UBIFS error (pid: 18531): cannot open "/dev/sr0", error -22 [ 1526.078707] overlayfs: failed to resolve './file1': -2 19:24:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='/exe\x00\x00\xd1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7[\x1f\xe8\xaf\xb4N\xe8\xdf\v5\xa0\xfdj\x1f\x02\x00\xd3\xab&\xd7\xa0qP\x8b\xbf\xbbA\x19\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\x00\x00\x90\xb3\xa9') setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x5a3, 0xff7a) sendfile(r1, r2, 0x0, 0x100000001) 19:24:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fgetxattr(r0, &(0x7f0000000080)=@random={'btrfs.', '\x00'}, 0x0, 0x0) 19:24:28 executing program 0: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000000100)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000540)}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xff7f, 0x10000101) 19:24:28 executing program 2: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000000100)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000540)}}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) fallocate(r1, 0x0, 0xff7f, 0x10000101) 19:24:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="0000680000007a0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) [ 1526.382972] UBIFS error (pid: 18557): cannot open "/dev/sr0", error -22 [ 1526.443737] overlayfs: failed to resolve './file1': -2 19:24:28 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fgetxattr(r0, &(0x7f0000000080)=@random={'btrfs.', '\x00'}, 0x0, 0x0) 19:24:29 executing program 4: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) 19:24:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='/exe\x00\x00\xd1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7[\x1f\xe8\xaf\xb4N\xe8\xdf\v5\xa0\xfdj\x1f\x02\x00\xd3\xab&\xd7\xa0qP\x8b\xbf\xbbA\x19\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\x00\x00\x90\xb3\xa9') setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x5a3, 0xff7a) sendfile(r1, r2, 0x0, 0x100000001) [ 1526.812633] Dev loop1: unable to read RDB block 1 [ 1526.840548] loop1: unable to read partition table 19:24:29 executing program 5: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) [ 1526.868064] loop1: partition table beyond EOD, truncated [ 1526.902758] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 19:24:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='/exe\x00\x00\xd1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7[\x1f\xe8\xaf\xb4N\xe8\xdf\v5\xa0\xfdj\x1f\x02\x00\xd3\xab&\xd7\xa0qP\x8b\xbf\xbbA\x19\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\x00\x00\x90\xb3\xa9') setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x5a3, 0xff7a) sendfile(r1, r2, 0x0, 0x100000001) 19:24:29 executing program 0: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) 19:24:29 executing program 2: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) [ 1527.146840] UBIFS error (pid: 18584): cannot open "/dev/sr0", error -22 [ 1527.248504] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 1527.298729] UBIFS error (pid: 18597): cannot open "/dev/sr0", error -22 [ 1527.345242] overlayfs: failed to resolve './file1': -2 19:24:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='/exe\x00\x00\xd1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7[\x1f\xe8\xaf\xb4N\xe8\xdf\v5\xa0\xfdj\x1f\x02\x00\xd3\xab&\xd7\xa0qP\x8b\xbf\xbbA\x19\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\x00\x00\x90\xb3\xa9') setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x5a3, 0xff7a) sendfile(r1, r2, 0x0, 0x100000001) 19:24:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="0000680000007a0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) [ 1527.464394] UBIFS error (pid: 18604): cannot open "/dev/sr0", error -22 [ 1527.481090] UBIFS error (pid: 18614): cannot open "/dev/sr0", error -22 [ 1527.505983] overlayfs: failed to resolve './file1': -2 [ 1527.519738] overlayfs: failed to resolve './file1': -2 19:24:30 executing program 2: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) 19:24:30 executing program 0: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) 19:24:30 executing program 3: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) 19:24:30 executing program 5: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) [ 1527.987602] Dev loop1: unable to read RDB block 1 [ 1528.001521] loop1: unable to read partition table [ 1528.021350] UBIFS error (pid: 18625): cannot open "/dev/sr0", error -22 [ 1528.035817] loop1: partition table beyond EOD, truncated 19:24:30 executing program 4: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) [ 1528.065552] UBIFS error (pid: 18627): cannot open "/dev/sr0", error -22 [ 1528.076773] overlayfs: failed to resolve './file1': -2 [ 1528.096027] overlayfs: failed to resolve './file1': -2 [ 1528.101893] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 1528.140943] UBIFS error (pid: 18633): cannot open "/dev/sr0", error -22 [ 1528.165693] overlayfs: failed to resolve './file1': -2 19:24:30 executing program 0: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) [ 1528.302924] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 19:24:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="0000680000007a0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) 19:24:30 executing program 3: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) [ 1528.527618] UBIFS error (pid: 18650): cannot open "/dev/sr0", error -22 [ 1528.606192] UBIFS error (pid: 18658): cannot open "/dev/sr0", error -22 [ 1528.609297] overlayfs: failed to resolve './file1': -2 [ 1528.662823] overlayfs: failed to resolve './file1': -2 [ 1528.669438] UBIFS error (pid: 18642): cannot open "/dev/sr0", error -22 [ 1528.675966] UBIFS error (pid: 18649): cannot open "/dev/sr0", error -22 [ 1528.697059] overlayfs: failed to resolve './file1': -2 19:24:31 executing program 2: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) [ 1528.728251] overlayfs: failed to resolve './file1': -2 [ 1528.818705] Dev loop1: unable to read RDB block 1 [ 1528.842543] loop1: unable to read partition table [ 1528.864944] loop1: partition table beyond EOD, truncated [ 1528.910841] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 19:24:31 executing program 3: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) 19:24:31 executing program 5: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) 19:24:31 executing program 4: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) [ 1529.005980] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 19:24:31 executing program 0: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) [ 1529.137215] UBIFS error (pid: 18671): cannot open "/dev/sr0", error -22 [ 1529.185180] overlayfs: failed to resolve './file1': -2 [ 1529.209054] UBIFS error (pid: 18678): cannot open "/dev/sr0", error -22 19:24:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000010000)="0000680000007a0000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}]) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) [ 1529.236528] overlayfs: failed to resolve './file1': -2 [ 1529.304070] UBIFS error (pid: 18686): cannot open "/dev/sr0", error -22 [ 1529.306066] overlayfs: failed to resolve './file1': -2 19:24:31 executing program 3: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) [ 1529.355124] UBIFS error (pid: 18689): cannot open "/dev/sr0", error -22 [ 1529.359279] overlayfs: failed to resolve './file1': -2 [ 1529.503105] Dev loop1: unable to read RDB block 1 [ 1529.548930] loop1: unable to read partition table [ 1529.572570] loop1: partition table beyond EOD, truncated [ 1529.629657] UBIFS error (pid: 18699): cannot open "/dev/sr0", error -22 [ 1529.656090] overlayfs: failed to resolve './file1': -2 [ 1529.664390] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 19:24:32 executing program 2: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) 19:24:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='/exe\x00\x00\xd1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7[\x1f\xe8\xaf\xb4N\xe8\xdf\v5\xa0\xfdj\x1f\x02\x00\xd3\xab&\xd7\xa0qP\x8b\xbf\xbbA\x19\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\x00\x00\x90\xb3\xa9') setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x5a3, 0xff7a) sendfile(r1, r2, 0x0, 0x100000001) [ 1529.808179] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 19:24:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='/exe\x00\x00\xd1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7[\x1f\xe8\xaf\xb4N\xe8\xdf\v5\xa0\xfdj\x1f\x02\x00\xd3\xab&\xd7\xa0qP\x8b\xbf\xbbA\x19\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\x00\x00\x90\xb3\xa9') setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x5a3, 0xff7a) sendfile(r1, r2, 0x0, 0x100000001) 19:24:32 executing program 0: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) [ 1529.925110] UBIFS error (pid: 18705): cannot open "/dev/sr0", error -22 [ 1529.983360] overlayfs: failed to resolve './file1': -2 [ 1530.188878] UBIFS error (pid: 18714): cannot open "/dev/sr0", error -22 [ 1530.224382] overlayfs: failed to resolve './file1': -2 19:24:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='/exe\x00\x00\xd1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7[\x1f\xe8\xaf\xb4N\xe8\xdf\v5\xa0\xfdj\x1f\x02\x00\xd3\xab&\xd7\xa0qP\x8b\xbf\xbbA\x19\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\x00\x00\x90\xb3\xa9') setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x5a3, 0xff7a) sendfile(r1, r2, 0x0, 0x100000001) 19:24:32 executing program 3: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) 19:24:32 executing program 2: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) [ 1530.606816] UBIFS error (pid: 18720): cannot open "/dev/sr0", error -22 [ 1530.619686] UBIFS error (pid: 18727): cannot open "/dev/sr0", error -22 [ 1530.631179] overlayfs: failed to resolve './file1': -2 [ 1530.763446] overlayfs: failed to resolve './file1': -2 [ 1530.773917] UBIFS error (pid: 18729): cannot open "/dev/sr0", error -22 [ 1530.878403] overlayfs: failed to resolve './file1': -2 19:24:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='/exe\x00\x00\xd1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7[\x1f\xe8\xaf\xb4N\xe8\xdf\v5\xa0\xfdj\x1f\x02\x00\xd3\xab&\xd7\xa0qP\x8b\xbf\xbbA\x19\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\x00\x00\x90\xb3\xa9') setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x5a3, 0xff7a) sendfile(r1, r2, 0x0, 0x100000001) 19:24:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='/exe\x00\x00\xd1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7[\x1f\xe8\xaf\xb4N\xe8\xdf\v5\xa0\xfdj\x1f\x02\x00\xd3\xab&\xd7\xa0qP\x8b\xbf\xbbA\x19\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\x00\x00\x90\xb3\xa9') setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x5a3, 0xff7a) sendfile(r1, r2, 0x0, 0x100000001) 19:24:33 executing program 3: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) 19:24:33 executing program 0: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) 19:24:33 executing program 2: gettid() r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000180)={0x18, 0x0, {0x0, @local, 'ip6_vti0\x00'}}) mkdir(&(0x7f00000013c0)='./file0\x00', 0x0) r2 = syz_open_dev$amidi(&(0x7f00000007c0)='/dev/amidi#\x00', 0x7, 0x0) mount(&(0x7f0000000140)=ANY=[], 0x0, &(0x7f00000000c0)='tmpfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_capability(r1, 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8, 0x5}, {0x7, 0x101}]}, 0x14, 0x1) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000005c0)='./file0\x00', 0x4000000) syz_mount_image$btrfs(0x0, 0x0, 0x4, 0x0, &(0x7f0000000940), 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000600)=[{&(0x7f0000000c40)="df8481a7b289330904e020bd3c90409e74ec10fbb525418617cf20f092d1687d9d4dd907d008acd357b230a7f586fee041dee0ae0e2c5d7b7f9fc90209d98578d809809c36dd5482d6bdcc8de06ea00cf043078bd5302439865d4ccc812e9ab40d47962d7d1f3ae657d8dae0af1a5368ce2fb2405285ee1e89ff92efc6fe80d5bf4bad36789af7a5bea01b548b6f6887c5ea390809bd1aaabb03b20ff0b1f3478cb5a37706aaa9e2a23bb0a9616057afc25ca510", 0xb4, 0x1}], 0x0, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x2, 0x0) connect$netlink(r4, &(0x7f0000000380)=@kern={0x10, 0x0, 0x0, 0x4080}, 0xc) mount(&(0x7f00000004c0)=@sr0='/dev/sr0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='ubifs\x00', 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d9abea03ef71344b294bf3e6dcf0823e2398182392e0dcc7d97e09edef61c00855c0eee11e25fb3bf47699c3272b0ee1f2cc9407946fbae5609ef4371d2dea8c166a24e02d2f6ff9193bde7e992f57af46c66e464617c08f2142109cc4965a2d8baa9f31a92c149e6cb208d567224e8c76d78eb40ade4691005ecf02404282d8f6a0a994793ae8ded25df5f25a1df7a1eb614e2ab4aaf0cf2c"]) creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r5 = syz_open_dev$audion(&(0x7f0000000240)='/dev/audio#\x00', 0x4, 0xf4c00) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000900)={{{@in=@initdev, @in=@loopback}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xffffffdc) r6 = getuid() mount$bpf(0x0, 0x0, &(0x7f00000008c0)='bpf\x00', 0x860400, &(0x7f0000000b80)={[{@mode={'mode', 0x3d, 0xab}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@fowner_gt={'fowner>', r6}}]}) sendmsg$NBD_CMD_RECONFIGURE(r5, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000dc0)=ANY=[@ANYBLOB="0c00030005000000000005000000000000000500000000000000000000080001dda8f50c000c00060002000000000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0xa00, 0x8000a0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000640)=ANY=[@ANYBLOB="b3dbb59b5e5bfccec800363eed0b06e29d1ecfcd323dbb5e4790c7002f8f8752f258f94a2d971d22d30fa2e250d117b0c103c212b9c74b221878c5c510fd3805184a62542a54a4a0ca67ff7dcdd385b88f179d2ed565eedb5dc58e8d5bcb39e427a4b526bd3382e5f4c915d187107410cc662a3b508e578d4d5955d469a60da2ba471f88a3ee94a3dc47c1bfdc6330158858b4e452aa196fa376f902f2e08de761125d0a81c9ad4c1e6cfd1fd14efc9afeb7ef15fc4a3f76d4eafa2207a3dfe3463c1f8466894cd4a56619991a5cf30a4cc253917ca35f832c0b67b8ea8746b408810553967b"], 0x1) [ 1531.212591] UBIFS error (pid: 18734): cannot open "/dev/sr0", error -22 [ 1531.257047] overlayfs: failed to resolve './file1': -2 19:24:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='/exe\x00\x00\xd1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7[\x1f\xe8\xaf\xb4N\xe8\xdf\v5\xa0\xfdj\x1f\x02\x00\xd3\xab&\xd7\xa0qP\x8b\xbf\xbbA\x19\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\x00\x00\x90\xb3\xa9') setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x5a3, 0xff7a) sendfile(r1, r2, 0x0, 0x100000001) [ 1531.386816] UBIFS error (pid: 18739): cannot open "/dev/sr0", error -22 [ 1531.388370] overlayfs: failed to resolve './file1': -2 19:24:33 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x8c}]}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) [ 1531.557465] UBIFS error (pid: 18742): cannot open "/dev/sr0", error -22 [ 1531.609628] overlayfs: failed to resolve './file1': -2 19:24:34 executing program 2: r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x2a7, 0xdf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='!\x00') 19:24:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x8c}]}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 19:24:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='/exe\x00\x00\xd1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7[\x1f\xe8\xaf\xb4N\xe8\xdf\v5\xa0\xfdj\x1f\x02\x00\xd3\xab&\xd7\xa0qP\x8b\xbf\xbbA\x19\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\x00\x00\x90\xb3\xa9') setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x5a3, 0xff7a) sendfile(r1, r2, 0x0, 0x100000001) 19:24:34 executing program 2: r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x2a7, 0xdf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='!\x00') 19:24:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='/exe\x00\x00\xd1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7[\x1f\xe8\xaf\xb4N\xe8\xdf\v5\xa0\xfdj\x1f\x02\x00\xd3\xab&\xd7\xa0qP\x8b\xbf\xbbA\x19\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\x00\x00\x90\xb3\xa9') setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x5a3, 0xff7a) sendfile(r1, r2, 0x0, 0x100000001) 19:24:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x8c}]}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 19:24:34 executing program 2: r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x2a7, 0xdf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='!\x00') 19:24:34 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000000040)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x8c}]}, &(0x7f0000000000)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251}, 0x48) 19:24:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @empty}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='/exe\x00\x00\xd1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7[\x1f\xe8\xaf\xb4N\xe8\xdf\v5\xa0\xfdj\x1f\x02\x00\xd3\xab&\xd7\xa0qP\x8b\xbf\xbbA\x19\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\x00\x00\x90\xb3\xa9') setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x5a3, 0xff7a) sendfile(r1, r2, 0x0, 0x100000001) 19:24:35 executing program 2: r0 = perf_event_open(&(0x7f00004e7000)={0x2, 0x2a7, 0xdf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000001c0)='!\x00') 19:24:35 executing program 3: r0 = open(&(0x7f0000000300)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0xffff) sendfile(r0, r0, 0x0, 0x100000000) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)) 19:24:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x20000000000c, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x154, &(0x7f0000014000)=""/4096}, 0x2c7) 19:24:35 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20004003) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/189, 0xbd}], 0x1) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) [ 1533.289091] audit: type=1800 audit(1546975475.608:376): pid=18773 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor3" name="file0" dev="sda1" ino=16609 res=0 19:24:35 executing program 4: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 19:24:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x20000000000c, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x154, &(0x7f0000014000)=""/4096}, 0x2c7) [ 1533.337940] audit: type=1804 audit(1546975475.618:377): pid=18776 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir712788261/syzkaller.AP9nbO/282/file0" dev="sda1" ino=16609 res=1 19:24:35 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c00000000000000}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000480)=0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x2, 0x1, 0x0, 0x5, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x3, 0x3, 0x0, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x3f83, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x0, 0x101, 0x280}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) 19:24:35 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in=@local}}}, &(0x7f0000000f00)=0xe8) r0 = socket$packet(0x11, 0x2, 0x300) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080), 0x14f) 19:24:35 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20004003) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/189, 0xbd}], 0x1) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) [ 1533.535102] bridge0: port 2(bridge_slave_1) entered disabled state [ 1533.541676] bridge0: port 1(bridge_slave_0) entered disabled state 19:24:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x20000000000c, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x154, &(0x7f0000014000)=""/4096}, 0x2c7) 19:24:36 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c00000000000000}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000480)=0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x2, 0x1, 0x0, 0x5, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x3, 0x3, 0x0, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x3f83, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x0, 0x101, 0x280}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) 19:24:36 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in=@local}}}, &(0x7f0000000f00)=0xe8) r0 = socket$packet(0x11, 0x2, 0x300) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080), 0x14f) 19:24:36 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20004003) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/189, 0xbd}], 0x1) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) [ 1534.043315] audit: type=1804 audit(1546975476.361:378): pid=18783 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir712788261/syzkaller.AP9nbO/282/file0" dev="sda1" ino=16609 res=1 19:24:36 executing program 3: r0 = open(&(0x7f0000000300)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b0500000000000000ba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0xffff) sendfile(r0, r0, 0x0, 0x100000000) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)) 19:24:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x20000000000c, 0x3, &(0x7f0000000040)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x11, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x154, &(0x7f0000014000)=""/4096}, 0x2c7) 19:24:36 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c00000000000000}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000480)=0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x2, 0x1, 0x0, 0x5, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x3, 0x3, 0x0, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x3f83, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x0, 0x101, 0x280}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) [ 1534.316483] audit: type=1800 audit(1546975476.629:379): pid=18831 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor3" name="file0" dev="sda1" ino=17012 res=0 [ 1534.427991] audit: type=1804 audit(1546975476.688:380): pid=18837 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir712788261/syzkaller.AP9nbO/283/file0" dev="sda1" ino=17012 res=1 [ 1534.683024] bridge0: port 2(bridge_slave_1) entered blocking state [ 1534.689441] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1534.696195] bridge0: port 1(bridge_slave_0) entered blocking state [ 1534.702624] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1534.710120] device bridge0 entered promiscuous mode [ 1534.716142] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1534.725920] bridge0: port 2(bridge_slave_1) entered disabled state [ 1534.733957] bridge0: port 1(bridge_slave_0) entered disabled state [ 1534.743104] device bridge0 left promiscuous mode 19:24:39 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20004003) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/189, 0xbd}], 0x1) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) 19:24:39 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in=@local}}}, &(0x7f0000000f00)=0xe8) r0 = socket$packet(0x11, 0x2, 0x300) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080), 0x14f) 19:24:39 executing program 0: r0 = open(&(0x7f0000000300)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0xffff) sendfile(r0, r0, 0x0, 0x100000000) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)) 19:24:39 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c00000000000000}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000480)=0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x2, 0x1, 0x0, 0x5, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x3, 0x3, 0x0, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x3f83, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x0, 0x101, 0x280}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) [ 1537.266249] bridge0: port 2(bridge_slave_1) entered blocking state [ 1537.272639] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1537.279369] bridge0: port 1(bridge_slave_0) entered blocking state [ 1537.285814] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1537.294916] device bridge0 entered promiscuous mode [ 1537.300655] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1537.308286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 19:24:39 executing program 3: r0 = open(&(0x7f0000000300)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b0500000000000000ba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0xffff) sendfile(r0, r0, 0x0, 0x100000000) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)) 19:24:39 executing program 4: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 1537.392355] audit: type=1800 audit(1546975479.682:381): pid=18843 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=17020 res=0 19:24:39 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000e00)={{{@in6, @in=@multicast1}}, {{@in=@local}}}, &(0x7f0000000f00)=0xe8) r0 = socket$packet(0x11, 0x2, 0x300) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000080), 0x14f) [ 1537.491668] bridge0: port 2(bridge_slave_1) entered disabled state [ 1537.498268] bridge0: port 1(bridge_slave_0) entered disabled state [ 1537.533414] audit: type=1804 audit(1546975479.721:382): pid=18843 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir248973662/syzkaller.Jr64mH/351/file0" dev="sda1" ino=17020 res=1 19:24:39 executing program 5: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 1537.651600] device bridge0 left promiscuous mode 19:24:40 executing program 2: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 1537.750442] audit: type=1800 audit(1546975479.721:383): pid=18852 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor3" name="file0" dev="sda1" ino=17028 res=0 19:24:40 executing program 1: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 1537.868192] audit: type=1804 audit(1546975479.761:384): pid=18852 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir712788261/syzkaller.AP9nbO/284/file0" dev="sda1" ino=17028 res=1 19:24:40 executing program 0: r0 = open(&(0x7f0000000300)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0xffff) sendfile(r0, r0, 0x0, 0x100000000) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)) [ 1538.405858] audit: type=1800 audit(1546975480.693:385): pid=18881 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16761 res=0 19:24:40 executing program 3: r0 = open(&(0x7f0000000300)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0xffff) sendfile(r0, r0, 0x0, 0x100000000) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)) [ 1538.463212] audit: type=1804 audit(1546975480.732:386): pid=18881 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir248973662/syzkaller.Jr64mH/352/file0" dev="sda1" ino=16761 res=1 [ 1538.569527] audit: type=1800 audit(1546975480.832:387): pid=18884 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor3" name="file0" dev="sda1" ino=17017 res=0 [ 1538.660663] audit: type=1804 audit(1546975480.861:388): pid=18884 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor3" name="/root/syzkaller-testdir712788261/syzkaller.AP9nbO/285/file0" dev="sda1" ino=17017 res=1 [ 1538.757872] bridge0: port 2(bridge_slave_1) entered blocking state [ 1538.764338] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1538.771118] bridge0: port 1(bridge_slave_0) entered blocking state [ 1538.777558] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1538.784981] device bridge0 entered promiscuous mode 19:24:41 executing program 4: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 1538.804092] bridge0: port 2(bridge_slave_1) entered disabled state [ 1538.810893] bridge0: port 1(bridge_slave_0) entered disabled state 19:24:41 executing program 0: r0 = open(&(0x7f0000000300)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0xffff) sendfile(r0, r0, 0x0, 0x100000000) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)) [ 1539.339713] audit: type=1800 audit(1546975481.605:389): pid=18896 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor0" name="file0" dev="sda1" ino=16761 res=0 19:24:41 executing program 3: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 1539.380293] audit: type=1804 audit(1546975481.644:390): pid=18896 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor0" name="/root/syzkaller-testdir248973662/syzkaller.Jr64mH/353/file0" dev="sda1" ino=16761 res=1 [ 1539.461381] bridge0: port 2(bridge_slave_1) entered blocking state [ 1539.468401] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1539.475168] bridge0: port 1(bridge_slave_0) entered blocking state [ 1539.481557] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1539.498885] device bridge0 entered promiscuous mode 19:24:41 executing program 5: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 1539.512148] bridge0: port 2(bridge_slave_1) entered disabled state [ 1539.518969] bridge0: port 1(bridge_slave_0) entered disabled state 19:24:42 executing program 1: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 1540.062842] bridge0: port 2(bridge_slave_1) entered blocking state [ 1540.069887] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1540.076602] bridge0: port 1(bridge_slave_0) entered blocking state [ 1540.083045] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1540.090886] device bridge0 entered promiscuous mode 19:24:42 executing program 0: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 1540.632205] bridge0: port 2(bridge_slave_1) entered disabled state [ 1540.638793] bridge0: port 1(bridge_slave_0) entered disabled state [ 1540.645507] device bridge0 left promiscuous mode 19:24:43 executing program 4: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 1540.899717] bridge0: port 2(bridge_slave_1) entered blocking state [ 1540.906166] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1540.912791] bridge0: port 1(bridge_slave_0) entered blocking state [ 1540.919214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1540.926375] device bridge0 entered promiscuous mode [ 1540.933789] bridge0: port 2(bridge_slave_1) entered disabled state [ 1540.940346] bridge0: port 1(bridge_slave_0) entered disabled state [ 1541.297562] bridge0: port 2(bridge_slave_1) entered blocking state [ 1541.304061] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1541.310834] bridge0: port 1(bridge_slave_0) entered blocking state [ 1541.317191] bridge0: port 1(bridge_slave_0) entered forwarding state 19:24:43 executing program 3: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 1541.353342] device bridge0 entered promiscuous mode [ 1541.367699] bridge0: port 2(bridge_slave_1) entered disabled state [ 1541.374283] bridge0: port 1(bridge_slave_0) entered disabled state [ 1541.390184] device bridge0 left promiscuous mode [ 1541.687319] bridge0: port 2(bridge_slave_1) entered blocking state [ 1541.693790] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1541.700404] bridge0: port 1(bridge_slave_0) entered blocking state [ 1541.706844] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1541.713829] device bridge0 entered promiscuous mode [ 1541.724119] bridge0: port 2(bridge_slave_1) entered disabled state [ 1541.730686] bridge0: port 1(bridge_slave_0) entered disabled state [ 1541.746895] device bridge0 left promiscuous mode [ 1542.000810] bridge0: port 2(bridge_slave_1) entered blocking state [ 1542.007346] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1542.013957] bridge0: port 1(bridge_slave_0) entered blocking state [ 1542.020378] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1542.027326] device bridge0 entered promiscuous mode [ 1542.034753] bridge0: port 2(bridge_slave_1) entered disabled state [ 1542.041423] bridge0: port 1(bridge_slave_0) entered disabled state [ 1542.294799] bridge0: port 2(bridge_slave_1) entered blocking state [ 1542.301275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1542.308057] bridge0: port 1(bridge_slave_0) entered blocking state [ 1542.314444] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1542.322183] device bridge0 entered promiscuous mode [ 1542.334368] bridge0: port 2(bridge_slave_1) entered disabled state [ 1542.341054] bridge0: port 1(bridge_slave_0) entered disabled state [ 1542.356657] device bridge0 left promiscuous mode 19:24:44 executing program 5: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 19:24:44 executing program 1: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 19:24:44 executing program 0: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 19:24:44 executing program 2: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 1542.831489] bridge0: port 2(bridge_slave_1) entered blocking state [ 1542.837953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1542.845349] bridge0: port 1(bridge_slave_0) entered blocking state [ 1542.851718] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1542.858962] device bridge0 entered promiscuous mode [ 1542.866328] bridge0: port 2(bridge_slave_1) entered disabled state [ 1542.872797] bridge0: port 1(bridge_slave_0) entered disabled state 19:24:45 executing program 4: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 1542.890026] device bridge0 left promiscuous mode 19:24:45 executing program 3: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 1543.251334] bridge0: port 2(bridge_slave_1) entered blocking state [ 1543.257832] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1543.264543] bridge0: port 1(bridge_slave_0) entered blocking state [ 1543.271018] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1543.277988] device bridge0 entered promiscuous mode [ 1543.715504] bridge0: port 2(bridge_slave_1) entered disabled state [ 1543.722121] bridge0: port 1(bridge_slave_0) entered disabled state [ 1543.728801] device bridge0 left promiscuous mode [ 1543.951471] bridge0: port 2(bridge_slave_1) entered disabled state [ 1543.958040] bridge0: port 1(bridge_slave_0) entered disabled state [ 1543.969884] device bridge0 left promiscuous mode [ 1544.209386] bridge0: port 2(bridge_slave_1) entered disabled state [ 1544.216067] bridge0: port 1(bridge_slave_0) entered disabled state [ 1544.224124] device bridge0 left promiscuous mode [ 1544.433245] bridge0: port 2(bridge_slave_1) entered blocking state [ 1544.439748] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1544.446374] bridge0: port 1(bridge_slave_0) entered blocking state [ 1544.452815] bridge0: port 1(bridge_slave_0) entered forwarding state 19:24:46 executing program 0: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) [ 1544.483222] device bridge0 entered promiscuous mode [ 1544.495404] bridge0: port 2(bridge_slave_1) entered blocking state [ 1544.501895] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1544.508629] bridge0: port 1(bridge_slave_0) entered blocking state [ 1544.514986] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1544.531095] device bridge0 entered promiscuous mode [ 1544.544318] bridge0: port 2(bridge_slave_1) entered blocking state [ 1544.550765] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1544.557464] bridge0: port 1(bridge_slave_0) entered blocking state [ 1544.563940] bridge0: port 1(bridge_slave_0) entered forwarding state 19:24:46 executing program 5: r0 = open(&(0x7f0000000300)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0xffff) sendfile(r0, r0, 0x0, 0x100000000) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)) [ 1544.579522] device bridge0 entered promiscuous mode [ 1544.597266] bridge0: port 2(bridge_slave_1) entered disabled state [ 1544.603844] bridge0: port 1(bridge_slave_0) entered disabled state [ 1544.624304] IPVS: ftp: loaded support on port[0] = 21 19:24:46 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c00000000000000}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000480)=0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x2, 0x1, 0x0, 0x5, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x3, 0x3, 0x0, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x3f83, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x0, 0x101, 0x280}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) [ 1544.634528] device bridge0 left promiscuous mode [ 1544.650464] audit: type=1800 audit(1546975486.878:391): pid=18962 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="sda1" ino=17032 res=0 [ 1544.739227] audit: type=1804 audit(1546975486.918:392): pid=18964 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir075353641/syzkaller.jrctBA/65/file0" dev="sda1" ino=17032 res=1 19:24:47 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c00000000000000}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000480)=0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x2, 0x1, 0x0, 0x5, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x3, 0x3, 0x0, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x3f83, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x0, 0x101, 0x280}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) 19:24:47 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c00000000000000}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000480)=0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x2, 0x1, 0x0, 0x5, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x3, 0x3, 0x0, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x3f83, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x0, 0x101, 0x280}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) 19:24:47 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c00000000000000}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000480)=0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x2, 0x1, 0x0, 0x5, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x3, 0x3, 0x0, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x3f83, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x0, 0x101, 0x280}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) [ 1545.190048] bridge0: port 2(bridge_slave_1) entered blocking state [ 1545.196536] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1545.203259] bridge0: port 1(bridge_slave_0) entered blocking state [ 1545.209720] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1545.216935] device bridge0 entered promiscuous mode [ 1545.226013] bridge0: port 2(bridge_slave_1) entered disabled state [ 1545.232541] bridge0: port 1(bridge_slave_0) entered disabled state [ 1545.262239] device bridge0 left promiscuous mode [ 1545.581391] bridge0: port 2(bridge_slave_1) entered blocking state [ 1545.587848] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1545.594531] bridge0: port 1(bridge_slave_0) entered blocking state [ 1545.600972] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1545.608136] device bridge0 entered promiscuous mode [ 1545.790212] bridge0: port 2(bridge_slave_1) entered disabled state [ 1545.796702] bridge0: port 1(bridge_slave_0) entered disabled state [ 1545.803331] device bridge0 left promiscuous mode [ 1546.012933] bridge0: port 2(bridge_slave_1) entered blocking state [ 1546.019374] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1546.026161] bridge0: port 1(bridge_slave_0) entered blocking state [ 1546.032556] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1546.039282] device bridge0 entered promiscuous mode [ 1546.447657] chnl_net:caif_netlink_parms(): no params data found [ 1546.650476] bridge0: port 1(bridge_slave_0) entered blocking state [ 1546.659914] bridge0: port 1(bridge_slave_0) entered disabled state [ 1546.669133] device bridge_slave_0 entered promiscuous mode [ 1546.677091] bridge0: port 2(bridge_slave_1) entered blocking state [ 1546.683484] bridge0: port 2(bridge_slave_1) entered disabled state [ 1546.691079] device bridge_slave_1 entered promiscuous mode [ 1546.867251] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1546.878375] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1547.058225] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1547.065856] team0: Port device team_slave_0 added [ 1547.071805] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1547.079032] team0: Port device team_slave_1 added [ 1547.084558] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1547.092114] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1547.314071] device hsr_slave_0 entered promiscuous mode [ 1547.363175] device hsr_slave_1 entered promiscuous mode [ 1547.433789] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1547.603967] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1547.622389] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1547.629677] bridge0: port 2(bridge_slave_1) entered disabled state [ 1547.676475] bridge0: port 1(bridge_slave_0) entered disabled state [ 1552.126693] device hsr_slave_1 left promiscuous mode [ 1552.168464] device hsr_slave_0 left promiscuous mode [ 1552.221767] team0 (unregistering): Port device team_slave_1 removed [ 1552.233155] team0 (unregistering): Port device team_slave_0 removed [ 1552.246308] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1552.272464] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1552.375402] bond0 (unregistering): Released all slaves [ 1552.527216] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1552.535842] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1552.545102] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1552.552141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1552.559832] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1552.570059] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1552.576137] 8021q: adding VLAN 0 to HW filter on device team0 [ 1552.587850] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1552.595454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1552.596050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1552.611451] bridge0: port 1(bridge_slave_0) entered blocking state [ 1552.617819] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1552.628603] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1552.636461] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1552.644383] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1552.652574] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1552.660672] bridge0: port 2(bridge_slave_1) entered blocking state [ 1552.667022] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1552.677477] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1552.689188] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1552.696898] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1552.705540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1552.717025] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1552.726348] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1552.734872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1552.746362] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1552.757690] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1552.765279] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1552.772956] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1552.781532] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1552.789084] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1552.797032] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1552.811568] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1552.818782] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1552.827014] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1552.838672] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1552.845041] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1552.898607] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1552.912358] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1553.039838] bridge0: port 2(bridge_slave_1) entered disabled state [ 1553.047439] bridge0: port 1(bridge_slave_0) entered disabled state [ 1553.165951] bridge0: port 2(bridge_slave_1) entered blocking state [ 1553.172801] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1553.181000] bridge0: port 1(bridge_slave_0) entered blocking state [ 1553.187908] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1553.197189] device bridge0 entered promiscuous mode 19:24:55 executing program 2: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 19:24:55 executing program 4: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 19:24:55 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c00000000000000}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000480)=0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x2, 0x1, 0x0, 0x5, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x3, 0x3, 0x0, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x3f83, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x0, 0x101, 0x280}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) 19:24:55 executing program 5: r0 = open(&(0x7f0000000300)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0xffff) sendfile(r0, r0, 0x0, 0x100000000) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)) 19:24:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c00000000000000}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000480)=0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x2, 0x1, 0x0, 0x5, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x3, 0x3, 0x0, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x3f83, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x0, 0x101, 0x280}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) 19:24:55 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20004003) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/189, 0xbd}], 0x1) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) [ 1553.865671] audit: type=1800 audit(1546975496.007:393): pid=19003 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="sda1" ino=17054 res=0 [ 1553.935920] bridge0: port 2(bridge_slave_1) entered disabled state [ 1553.942500] bridge0: port 1(bridge_slave_0) entered disabled state 19:24:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c00000000000000}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000480)=0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x2, 0x1, 0x0, 0x5, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x3, 0x3, 0x0, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x3f83, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x0, 0x101, 0x280}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) 19:24:56 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20004003) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/189, 0xbd}], 0x1) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) 19:24:56 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c00000000000000}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000480)=0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x2, 0x1, 0x0, 0x5, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x3, 0x3, 0x0, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x3f83, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x0, 0x101, 0x280}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) [ 1553.968929] audit: type=1804 audit(1546975496.066:394): pid=19003 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir075353641/syzkaller.jrctBA/66/file0" dev="sda1" ino=17054 res=1 [ 1554.084372] device bridge0 left promiscuous mode 19:24:56 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20004003) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/189, 0xbd}], 0x1) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) 19:24:56 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20004003) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/189, 0xbd}], 0x1) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) 19:24:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x501040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) ioprio_set$pid(0x3, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\b', 0xffffffffffffffff, 0x4c00000000000000}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ptrace$cont(0x18, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000240)='selinux*user:%/{}\x00', 0x4) ioctl$TUNSETVNETBE(r2, 0x400454de, &(0x7f0000000480)=0x1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x2, 0x1, 0x0, 0x5, 0x0, 0x0, 0xc000, 0x0, 0x0, 0x3, 0x3, 0x0, 0x74ae4abf, 0x9, 0x7, 0x0, 0x5, 0x4, 0x1, 0x9, 0x4fcda501, 0x0, 0x5e, 0x9, 0x1f, 0x3f83, 0x1, 0x4, 0x1, 0x4, 0xfffffffffffffe01, 0xa63, 0xc2e, 0xfffffffffffffffa, 0x7, 0x5, 0x0, 0xff, 0x0, @perf_bp={0x0, 0x6}, 0x28000, 0x9, 0xdd57, 0x0, 0x0, 0x101, 0x280}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000440)={0x1000, 0x100000}) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x6, &(0x7f0000000280), &(0x7f0000000400)=0x4) [ 1554.880314] bridge0: port 2(bridge_slave_1) entered disabled state [ 1554.887490] bridge0: port 1(bridge_slave_0) entered disabled state [ 1554.896243] device bridge0 left promiscuous mode [ 1554.905853] bridge0: port 2(bridge_slave_1) entered blocking state [ 1554.912503] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1554.920012] bridge0: port 1(bridge_slave_0) entered blocking state [ 1554.926605] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1554.948879] device bridge0 entered promiscuous mode [ 1554.959759] bridge0: port 2(bridge_slave_1) entered blocking state [ 1554.966412] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1554.973641] bridge0: port 1(bridge_slave_0) entered blocking state [ 1554.980301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1554.988098] device bridge0 entered promiscuous mode 19:24:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 19:24:57 executing program 4: socket(0x9, 0x0, 0x10001) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x121402, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) r3 = socket(0xa, 0x3, 0x200000000008) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'bridge0\x00\x00\x01\x00'}) rt_sigprocmask(0x2, &(0x7f0000000180)={0x7fffffff}, &(0x7f0000000300), 0x8) syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') execve(&(0x7f0000000600)='./file1\x00', &(0x7f0000000380), 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(0xffffffffffffffff, 0xc1105511, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={'bridge0\x00', 0xfffffffffffffffd}) pipe2(&(0x7f0000000900)={0xffffffffffffffff}, 0x84000) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000080)={0xfffffffffffffffd}) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000002c0)=0x61) read(r5, &(0x7f00000000c0)=""/11, 0xb) r6 = syz_open_pts(r5, 0x0) r7 = dup3(r6, r5, 0x0) ioctl$TCSETA(r7, 0x541a, &(0x7f0000000140)) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x4000000040490000, 0x0) ioctl$KDDISABIO(r2, 0x4b37) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) tee(r4, r1, 0x645, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x8, 0x5, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x101, 0x7ff, 0x7, 0xca3, 0xfff, 0x0, 0x3, 0x7, 0x7, 0x6, 0x100000001, 0x2, 0xffffffffffffff81, 0x3, 0x100000000000, 0x6, 0x100000000, 0x0, 0x10001, 0x0, 0x0, 0x3, 0x690, 0x0, 0x80000001, 0x5, @perf_config_ext={0x6, 0x9}, 0x8, 0x200, 0x8, 0x0, 0xff, 0x80000001, 0x7f}, r0, 0x10, 0xffffffffffffffff, 0x6) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)) fcntl$getown(r5, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000480)={{{@in=@empty, @in6}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) sendmsg$nl_generic(r4, &(0x7f0000000640)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000940)={0xa8, 0x29, 0x800, 0x70bd2a, 0x25dfdbfe, {0x1b}, [@typed={0x94, 0x69, @binary="c355ff8525f56cbdd369f360262f5e8c9593c50ec4049b06be78045001a552deb2687150d35faf0b933a2d6334893dd04cedfc47cd192c703753403b92d9db315cb9fcded3bb2a7f0eae3a59b32216fc06c12ab41a7fa5ff891ae01912da458fea51f8d9b25c6e2cc3b2e42b3b20209479018c8a7e852e842bd593b45c91ce08695f19c11d1b0b828f46ddb93c7d"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) 19:24:57 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x77, 0x0, [0x572], [0xc0010058, 0x2]}) 19:24:57 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20004003) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/189, 0xbd}], 0x1) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) 19:24:57 executing program 5: r0 = open(&(0x7f0000000300)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b0500000000000000ba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0xffff) sendfile(r0, r0, 0x0, 0x100000000) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)) 19:24:57 executing program 2: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) [ 1555.159024] audit: type=1800 audit(1546975497.286:395): pid=19056 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="sda1" ino=17079 res=0 19:24:57 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) [ 1555.240177] bridge0: port 2(bridge_slave_1) entered disabled state [ 1555.246758] bridge0: port 1(bridge_slave_0) entered disabled state [ 1555.262575] device bridge0 left promiscuous mode 19:24:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) [ 1555.297905] audit: type=1804 audit(1546975497.315:396): pid=19056 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir075353641/syzkaller.jrctBA/67/file0" dev="sda1" ino=17079 res=1 19:24:57 executing program 2: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:24:57 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20004003) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/189, 0xbd}], 0x1) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x0) 19:24:57 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:24:57 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:24:58 executing program 2: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) [ 1556.582393] bridge0: port 2(bridge_slave_1) entered blocking state [ 1556.588866] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1556.595630] bridge0: port 1(bridge_slave_0) entered blocking state [ 1556.602030] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1556.609139] device bridge0 entered promiscuous mode 19:24:58 executing program 2: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:24:58 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:24:58 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:24:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 19:24:58 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:24:59 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:24:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$read(0xb, 0x0, 0x0, 0x0) 19:24:59 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:24:59 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:25:00 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:25:00 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:25:00 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:25:00 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:25:00 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:25:00 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:25:01 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:25:01 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:25:01 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:25:01 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:25:02 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:25:02 executing program 1: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:02 executing program 2: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:02 executing program 5: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:02 executing program 1: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:02 executing program 0: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:02 executing program 2: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:03 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:25:03 executing program 0: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:03 executing program 5: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:03 executing program 1: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:03 executing program 2: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:03 executing program 4: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:04 executing program 0: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:04 executing program 1: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:04 executing program 2: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:04 executing program 5: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:04 executing program 4: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:04 executing program 0: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:04 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f00000002c0)=0x1f) r2 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r2, 0x0, 0x0) sendmmsg(r2, 0x0, 0x0, 0x0) clone(0x2200, 0x0, 0x0, 0x0, &(0x7f0000000440)) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000980)=""/4096) mknod(0x0, 0x1041, 0x0) r3 = open(&(0x7f0000000280)='./file1\x00', 0x0, 0x44) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000900)=0x7, &(0x7f0000000940)=0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f0000000240)=ANY=[]}}, 0x0) poll(&(0x7f0000000140)=[{r0, 0x1081}, {r1, 0x6}, {r3, 0x4004}, {r2, 0x80}], 0x4, 0x2) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/53, 0x35) sendmmsg(0xffffffffffffffff, &(0x7f0000005280), 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000040)={'syz'}) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f00000001c0)={0x0, 0x4}) socket$nl_xfrm(0x10, 0x3, 0x6) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="e4329b02ab1e9c3d460e692a2f725ea82b1ff0ed43251ba341599d590f4c5e49a5acf1888a1ffa1733000000673864f1c60c09f7ae4aba567632d228d4caaba8a7bd8ea0321c679b616c2338a1e162276c784e786b234699fb36b9e1db768eeedd020be563dc69fc3a8175e69c03803ca16bf8ee853c060ade7c10adf93c0486c9ee6f4b1f560cabb1ad925fe282b27d253aac5a9439b47c716cc6715074643c04438237100bc91577e9c82a8f1b3099c471f318ef67fbff58baadf74c2db099000000000000000000"], 0x1, 0x0) write$binfmt_elf32(r0, &(0x7f0000000780)=ANY=[@ANYBLOB="b0ae87b3dcf43e32a5fcd74af7fbdbaf19b5b2734886ee630ec7db650ca6bee5f60d5e74745966c907e9d659c2a7e690afe3cd"], 0x33) mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000002, 0x1013, r0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f00000004c0)=0x100000035) 19:25:04 executing program 1: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:04 executing program 2: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_acct\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 19:25:05 executing program 4: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:05 executing program 1: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_acct\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 19:25:05 executing program 2: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:05 executing program 0: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:05 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_acct\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 19:25:05 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="24000000050607031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 19:25:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='map_files\x00~\xb5\x96\xd7\x1a\x14\xf5A\xaaN\x04\x00\x00\x00\x00\x00\x00\x00;\x02NH1\xe4\xba\x82W\xfd\'\xce\xe3\b\v\xc0Kw\xf8}\xba\x83\xba\x92\x9ej\xd5r8\xfd\xfcm2\x9f2\x1c\xfc\xca\xf2\x9a)\xd2\xd3\xd4#\x9e\xaaQ\x9a\x1eS\t-b\x85BE\xf2\xd2\xc0\x0f\x9c\x9d\xa5\x03\x00\x00\x00\x00\x00\x00\x00\x04F\xa1d\x15\x9d\x16w\x8b\x0e\xa7[C\x9b\x05V\xeb\xb0\x8e\xf6\xa6j\x7fZZJs\x86Q7J\xb1\x02\x99\xe5H#\fy\xa6o@{\x83\xb8\xe0\xec\xc4B\xf5\xb9\xc33\x8dfk\xfd2q}\f\xd0\x98\xaa\xd0\xec\xd3:\x86Y>\x16e~CeV\x8a\xc5\x14\'@d\xa0\xb9\x03\xb73\xc5\x89\x8dS\x8c\xd5\xc2\x9e\xe8W\xcfg\x13,\xa4\\\xa9\xde\xc6\xe6Nj\xe4\x92\x03.]\xeamg\x8bX\x82\x83\x95\x84bF\xe0\xf1\x0f\xdf\xba\xac\xed\xd1\xdbb\x15k\x0f\xbb\xd3h\xc1/F\x15\x05\v\xf8eq\xb4\xdc^\xc0(\xf7\xff#\a\xfc\xa3\x95\x85>f\xef\v2a\x03\xef\x17d&\x97\'\xec\xfa2\xca\x12\x15\xb4\x80u\xa0.\v\x97\x04\xd5R;\x98\xa6\xbe\x1f\x06\xcdm\x1f\x90L\xf7\x8dg0\x81v\xa4+\xa2\xfdX%\xfd\xf8\xe0\xa62\x87\x16/<\xdd\tg\xcb$;37\x92\x85(\xa6\xaf\xe7\xc2\xeb+\xbd\x1aQ\xd4\xd3\xe8Z\x11X/\xdb\xef;u*\x1bq\x06Q\xbd\xad\x98\xbfc%;\x9c\xb7\v\xbd\xe8\xfa$\xabh;7M\xd7\xc5\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\xd2\x96\xb1u\xddF;f\x1f\x85#\x9b\xbf({\xb0\x0f\xdf\xc7\xcf(}\x1ey\xe7\xb8N\x9d\xa4\x1bR\x84 \x85\xc0\x11xS\x06\xb0\xf8\xb9k \x8f\"\x8bU;\xd8s\xbe') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x0) fchdir(r0) quotactl(0x2080000201, &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f00000002c0)) 19:25:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/rt_acct\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) 19:25:06 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x8083) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0x40045731, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, [0xfffffffe]}) gettid() [ 1564.061870] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. 19:25:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:06 executing program 0: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) r2 = open(0x0, 0x0, 0x11) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000700), &(0x7f00000009c0)=0x8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0x8000}, {0x1000, 0xb3e}]}, 0xffffffffffffff8e, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000680)=ANY=[], &(0x7f00000005c0)) clock_adjtime(0x0, &(0x7f0000000300)={0x0, 0x0, 0x80000000, 0x7, 0x0, 0x0, 0x3f, 0x800, 0x0, 0x26, 0x4dc, 0x7ff, 0x100, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x5b19bdf7, 0x0, 0x0, 0x6, 0x40000000000000, 0x5}) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x101000, 0x0) poll(&(0x7f0000000040)=[{r2}, {r3, 0xc}, {r3, 0x601}, {r0, 0x4000}, {r2, 0x1000}, {0xffffffffffffffff, 0x40}, {r1, 0x4}], 0x7, 0xfff) syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x200) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000000c0)={'team0\x00'}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) unlink(&(0x7f0000000440)='./file0\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000540)={0x3, 0x211, 0xfa00, {{0xa, 0x0, 0x7ff, @dev={0xfe, 0x80, [], 0x21}, 0x3ff}, {0xa, 0x4e22, 0x2, @remote}}}, 0x47) keyctl$revoke(0x3, 0x0) setxattr$security_selinux(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x1) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000180), 0x10) 19:25:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='map_files\x00~\xb5\x96\xd7\x1a\x14\xf5A\xaaN\x04\x00\x00\x00\x00\x00\x00\x00;\x02NH1\xe4\xba\x82W\xfd\'\xce\xe3\b\v\xc0Kw\xf8}\xba\x83\xba\x92\x9ej\xd5r8\xfd\xfcm2\x9f2\x1c\xfc\xca\xf2\x9a)\xd2\xd3\xd4#\x9e\xaaQ\x9a\x1eS\t-b\x85BE\xf2\xd2\xc0\x0f\x9c\x9d\xa5\x03\x00\x00\x00\x00\x00\x00\x00\x04F\xa1d\x15\x9d\x16w\x8b\x0e\xa7[C\x9b\x05V\xeb\xb0\x8e\xf6\xa6j\x7fZZJs\x86Q7J\xb1\x02\x99\xe5H#\fy\xa6o@{\x83\xb8\xe0\xec\xc4B\xf5\xb9\xc33\x8dfk\xfd2q}\f\xd0\x98\xaa\xd0\xec\xd3:\x86Y>\x16e~CeV\x8a\xc5\x14\'@d\xa0\xb9\x03\xb73\xc5\x89\x8dS\x8c\xd5\xc2\x9e\xe8W\xcfg\x13,\xa4\\\xa9\xde\xc6\xe6Nj\xe4\x92\x03.]\xeamg\x8bX\x82\x83\x95\x84bF\xe0\xf1\x0f\xdf\xba\xac\xed\xd1\xdbb\x15k\x0f\xbb\xd3h\xc1/F\x15\x05\v\xf8eq\xb4\xdc^\xc0(\xf7\xff#\a\xfc\xa3\x95\x85>f\xef\v2a\x03\xef\x17d&\x97\'\xec\xfa2\xca\x12\x15\xb4\x80u\xa0.\v\x97\x04\xd5R;\x98\xa6\xbe\x1f\x06\xcdm\x1f\x90L\xf7\x8dg0\x81v\xa4+\xa2\xfdX%\xfd\xf8\xe0\xa62\x87\x16/<\xdd\tg\xcb$;37\x92\x85(\xa6\xaf\xe7\xc2\xeb+\xbd\x1aQ\xd4\xd3\xe8Z\x11X/\xdb\xef;u*\x1bq\x06Q\xbd\xad\x98\xbfc%;\x9c\xb7\v\xbd\xe8\xfa$\xabh;7M\xd7\xc5\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\xd2\x96\xb1u\xddF;f\x1f\x85#\x9b\xbf({\xb0\x0f\xdf\xc7\xcf(}\x1ey\xe7\xb8N\x9d\xa4\x1bR\x84 \x85\xc0\x11xS\x06\xb0\xf8\xb9k \x8f\"\x8bU;\xd8s\xbe') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x0) fchdir(r0) quotactl(0x2080000201, &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f00000002c0)) 19:25:06 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="24000000050607031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 19:25:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='map_files\x00~\xb5\x96\xd7\x1a\x14\xf5A\xaaN\x04\x00\x00\x00\x00\x00\x00\x00;\x02NH1\xe4\xba\x82W\xfd\'\xce\xe3\b\v\xc0Kw\xf8}\xba\x83\xba\x92\x9ej\xd5r8\xfd\xfcm2\x9f2\x1c\xfc\xca\xf2\x9a)\xd2\xd3\xd4#\x9e\xaaQ\x9a\x1eS\t-b\x85BE\xf2\xd2\xc0\x0f\x9c\x9d\xa5\x03\x00\x00\x00\x00\x00\x00\x00\x04F\xa1d\x15\x9d\x16w\x8b\x0e\xa7[C\x9b\x05V\xeb\xb0\x8e\xf6\xa6j\x7fZZJs\x86Q7J\xb1\x02\x99\xe5H#\fy\xa6o@{\x83\xb8\xe0\xec\xc4B\xf5\xb9\xc33\x8dfk\xfd2q}\f\xd0\x98\xaa\xd0\xec\xd3:\x86Y>\x16e~CeV\x8a\xc5\x14\'@d\xa0\xb9\x03\xb73\xc5\x89\x8dS\x8c\xd5\xc2\x9e\xe8W\xcfg\x13,\xa4\\\xa9\xde\xc6\xe6Nj\xe4\x92\x03.]\xeamg\x8bX\x82\x83\x95\x84bF\xe0\xf1\x0f\xdf\xba\xac\xed\xd1\xdbb\x15k\x0f\xbb\xd3h\xc1/F\x15\x05\v\xf8eq\xb4\xdc^\xc0(\xf7\xff#\a\xfc\xa3\x95\x85>f\xef\v2a\x03\xef\x17d&\x97\'\xec\xfa2\xca\x12\x15\xb4\x80u\xa0.\v\x97\x04\xd5R;\x98\xa6\xbe\x1f\x06\xcdm\x1f\x90L\xf7\x8dg0\x81v\xa4+\xa2\xfdX%\xfd\xf8\xe0\xa62\x87\x16/<\xdd\tg\xcb$;37\x92\x85(\xa6\xaf\xe7\xc2\xeb+\xbd\x1aQ\xd4\xd3\xe8Z\x11X/\xdb\xef;u*\x1bq\x06Q\xbd\xad\x98\xbfc%;\x9c\xb7\v\xbd\xe8\xfa$\xabh;7M\xd7\xc5\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\xd2\x96\xb1u\xddF;f\x1f\x85#\x9b\xbf({\xb0\x0f\xdf\xc7\xcf(}\x1ey\xe7\xb8N\x9d\xa4\x1bR\x84 \x85\xc0\x11xS\x06\xb0\xf8\xb9k \x8f\"\x8bU;\xd8s\xbe') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x0) fchdir(r0) quotactl(0x2080000201, &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f00000002c0)) 19:25:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_THP_DISABLE(0x2c) 19:25:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='map_files\x00~\xb5\x96\xd7\x1a\x14\xf5A\xaaN\x04\x00\x00\x00\x00\x00\x00\x00;\x02NH1\xe4\xba\x82W\xfd\'\xce\xe3\b\v\xc0Kw\xf8}\xba\x83\xba\x92\x9ej\xd5r8\xfd\xfcm2\x9f2\x1c\xfc\xca\xf2\x9a)\xd2\xd3\xd4#\x9e\xaaQ\x9a\x1eS\t-b\x85BE\xf2\xd2\xc0\x0f\x9c\x9d\xa5\x03\x00\x00\x00\x00\x00\x00\x00\x04F\xa1d\x15\x9d\x16w\x8b\x0e\xa7[C\x9b\x05V\xeb\xb0\x8e\xf6\xa6j\x7fZZJs\x86Q7J\xb1\x02\x99\xe5H#\fy\xa6o@{\x83\xb8\xe0\xec\xc4B\xf5\xb9\xc33\x8dfk\xfd2q}\f\xd0\x98\xaa\xd0\xec\xd3:\x86Y>\x16e~CeV\x8a\xc5\x14\'@d\xa0\xb9\x03\xb73\xc5\x89\x8dS\x8c\xd5\xc2\x9e\xe8W\xcfg\x13,\xa4\\\xa9\xde\xc6\xe6Nj\xe4\x92\x03.]\xeamg\x8bX\x82\x83\x95\x84bF\xe0\xf1\x0f\xdf\xba\xac\xed\xd1\xdbb\x15k\x0f\xbb\xd3h\xc1/F\x15\x05\v\xf8eq\xb4\xdc^\xc0(\xf7\xff#\a\xfc\xa3\x95\x85>f\xef\v2a\x03\xef\x17d&\x97\'\xec\xfa2\xca\x12\x15\xb4\x80u\xa0.\v\x97\x04\xd5R;\x98\xa6\xbe\x1f\x06\xcdm\x1f\x90L\xf7\x8dg0\x81v\xa4+\xa2\xfdX%\xfd\xf8\xe0\xa62\x87\x16/<\xdd\tg\xcb$;37\x92\x85(\xa6\xaf\xe7\xc2\xeb+\xbd\x1aQ\xd4\xd3\xe8Z\x11X/\xdb\xef;u*\x1bq\x06Q\xbd\xad\x98\xbfc%;\x9c\xb7\v\xbd\xe8\xfa$\xabh;7M\xd7\xc5\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\xd2\x96\xb1u\xddF;f\x1f\x85#\x9b\xbf({\xb0\x0f\xdf\xc7\xcf(}\x1ey\xe7\xb8N\x9d\xa4\x1bR\x84 \x85\xc0\x11xS\x06\xb0\xf8\xb9k \x8f\"\x8bU;\xd8s\xbe') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x0) fchdir(r0) quotactl(0x2080000201, &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f00000002c0)) [ 1564.426356] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. 19:25:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='map_files\x00~\xb5\x96\xd7\x1a\x14\xf5A\xaaN\x04\x00\x00\x00\x00\x00\x00\x00;\x02NH1\xe4\xba\x82W\xfd\'\xce\xe3\b\v\xc0Kw\xf8}\xba\x83\xba\x92\x9ej\xd5r8\xfd\xfcm2\x9f2\x1c\xfc\xca\xf2\x9a)\xd2\xd3\xd4#\x9e\xaaQ\x9a\x1eS\t-b\x85BE\xf2\xd2\xc0\x0f\x9c\x9d\xa5\x03\x00\x00\x00\x00\x00\x00\x00\x04F\xa1d\x15\x9d\x16w\x8b\x0e\xa7[C\x9b\x05V\xeb\xb0\x8e\xf6\xa6j\x7fZZJs\x86Q7J\xb1\x02\x99\xe5H#\fy\xa6o@{\x83\xb8\xe0\xec\xc4B\xf5\xb9\xc33\x8dfk\xfd2q}\f\xd0\x98\xaa\xd0\xec\xd3:\x86Y>\x16e~CeV\x8a\xc5\x14\'@d\xa0\xb9\x03\xb73\xc5\x89\x8dS\x8c\xd5\xc2\x9e\xe8W\xcfg\x13,\xa4\\\xa9\xde\xc6\xe6Nj\xe4\x92\x03.]\xeamg\x8bX\x82\x83\x95\x84bF\xe0\xf1\x0f\xdf\xba\xac\xed\xd1\xdbb\x15k\x0f\xbb\xd3h\xc1/F\x15\x05\v\xf8eq\xb4\xdc^\xc0(\xf7\xff#\a\xfc\xa3\x95\x85>f\xef\v2a\x03\xef\x17d&\x97\'\xec\xfa2\xca\x12\x15\xb4\x80u\xa0.\v\x97\x04\xd5R;\x98\xa6\xbe\x1f\x06\xcdm\x1f\x90L\xf7\x8dg0\x81v\xa4+\xa2\xfdX%\xfd\xf8\xe0\xa62\x87\x16/<\xdd\tg\xcb$;37\x92\x85(\xa6\xaf\xe7\xc2\xeb+\xbd\x1aQ\xd4\xd3\xe8Z\x11X/\xdb\xef;u*\x1bq\x06Q\xbd\xad\x98\xbfc%;\x9c\xb7\v\xbd\xe8\xfa$\xabh;7M\xd7\xc5\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\xd2\x96\xb1u\xddF;f\x1f\x85#\x9b\xbf({\xb0\x0f\xdf\xc7\xcf(}\x1ey\xe7\xb8N\x9d\xa4\x1bR\x84 \x85\xc0\x11xS\x06\xb0\xf8\xb9k \x8f\"\x8bU;\xd8s\xbe') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x0) fchdir(r0) quotactl(0x2080000201, &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f00000002c0)) 19:25:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='map_files\x00~\xb5\x96\xd7\x1a\x14\xf5A\xaaN\x04\x00\x00\x00\x00\x00\x00\x00;\x02NH1\xe4\xba\x82W\xfd\'\xce\xe3\b\v\xc0Kw\xf8}\xba\x83\xba\x92\x9ej\xd5r8\xfd\xfcm2\x9f2\x1c\xfc\xca\xf2\x9a)\xd2\xd3\xd4#\x9e\xaaQ\x9a\x1eS\t-b\x85BE\xf2\xd2\xc0\x0f\x9c\x9d\xa5\x03\x00\x00\x00\x00\x00\x00\x00\x04F\xa1d\x15\x9d\x16w\x8b\x0e\xa7[C\x9b\x05V\xeb\xb0\x8e\xf6\xa6j\x7fZZJs\x86Q7J\xb1\x02\x99\xe5H#\fy\xa6o@{\x83\xb8\xe0\xec\xc4B\xf5\xb9\xc33\x8dfk\xfd2q}\f\xd0\x98\xaa\xd0\xec\xd3:\x86Y>\x16e~CeV\x8a\xc5\x14\'@d\xa0\xb9\x03\xb73\xc5\x89\x8dS\x8c\xd5\xc2\x9e\xe8W\xcfg\x13,\xa4\\\xa9\xde\xc6\xe6Nj\xe4\x92\x03.]\xeamg\x8bX\x82\x83\x95\x84bF\xe0\xf1\x0f\xdf\xba\xac\xed\xd1\xdbb\x15k\x0f\xbb\xd3h\xc1/F\x15\x05\v\xf8eq\xb4\xdc^\xc0(\xf7\xff#\a\xfc\xa3\x95\x85>f\xef\v2a\x03\xef\x17d&\x97\'\xec\xfa2\xca\x12\x15\xb4\x80u\xa0.\v\x97\x04\xd5R;\x98\xa6\xbe\x1f\x06\xcdm\x1f\x90L\xf7\x8dg0\x81v\xa4+\xa2\xfdX%\xfd\xf8\xe0\xa62\x87\x16/<\xdd\tg\xcb$;37\x92\x85(\xa6\xaf\xe7\xc2\xeb+\xbd\x1aQ\xd4\xd3\xe8Z\x11X/\xdb\xef;u*\x1bq\x06Q\xbd\xad\x98\xbfc%;\x9c\xb7\v\xbd\xe8\xfa$\xabh;7M\xd7\xc5\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\xd2\x96\xb1u\xddF;f\x1f\x85#\x9b\xbf({\xb0\x0f\xdf\xc7\xcf(}\x1ey\xe7\xb8N\x9d\xa4\x1bR\x84 \x85\xc0\x11xS\x06\xb0\xf8\xb9k \x8f\"\x8bU;\xd8s\xbe') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x0) fchdir(r0) quotactl(0x2080000201, &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f00000002c0)) [ 1564.626319] hfs: unable to parse mount options 19:25:06 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="24000000050607031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 19:25:06 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r1, &(0x7f0000004740)={&(0x7f0000000580)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0xe803) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000b80)='9', 0x1}], 0x1}, 0xc000) sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)="1c", 0x1}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000001e80)='r', 0x1}], 0x1}, 0x0) 19:25:06 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_THP_DISABLE(0x2c) [ 1564.792357] hfs: unable to parse mount options [ 1564.919425] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. 19:25:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:07 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000700)='map_files\x00~\xb5\x96\xd7\x1a\x14\xf5A\xaaN\x04\x00\x00\x00\x00\x00\x00\x00;\x02NH1\xe4\xba\x82W\xfd\'\xce\xe3\b\v\xc0Kw\xf8}\xba\x83\xba\x92\x9ej\xd5r8\xfd\xfcm2\x9f2\x1c\xfc\xca\xf2\x9a)\xd2\xd3\xd4#\x9e\xaaQ\x9a\x1eS\t-b\x85BE\xf2\xd2\xc0\x0f\x9c\x9d\xa5\x03\x00\x00\x00\x00\x00\x00\x00\x04F\xa1d\x15\x9d\x16w\x8b\x0e\xa7[C\x9b\x05V\xeb\xb0\x8e\xf6\xa6j\x7fZZJs\x86Q7J\xb1\x02\x99\xe5H#\fy\xa6o@{\x83\xb8\xe0\xec\xc4B\xf5\xb9\xc33\x8dfk\xfd2q}\f\xd0\x98\xaa\xd0\xec\xd3:\x86Y>\x16e~CeV\x8a\xc5\x14\'@d\xa0\xb9\x03\xb73\xc5\x89\x8dS\x8c\xd5\xc2\x9e\xe8W\xcfg\x13,\xa4\\\xa9\xde\xc6\xe6Nj\xe4\x92\x03.]\xeamg\x8bX\x82\x83\x95\x84bF\xe0\xf1\x0f\xdf\xba\xac\xed\xd1\xdbb\x15k\x0f\xbb\xd3h\xc1/F\x15\x05\v\xf8eq\xb4\xdc^\xc0(\xf7\xff#\a\xfc\xa3\x95\x85>f\xef\v2a\x03\xef\x17d&\x97\'\xec\xfa2\xca\x12\x15\xb4\x80u\xa0.\v\x97\x04\xd5R;\x98\xa6\xbe\x1f\x06\xcdm\x1f\x90L\xf7\x8dg0\x81v\xa4+\xa2\xfdX%\xfd\xf8\xe0\xa62\x87\x16/<\xdd\tg\xcb$;37\x92\x85(\xa6\xaf\xe7\xc2\xeb+\xbd\x1aQ\xd4\xd3\xe8Z\x11X/\xdb\xef;u*\x1bq\x06Q\xbd\xad\x98\xbfc%;\x9c\xb7\v\xbd\xe8\xfa$\xabh;7M\xd7\xc5\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\xd2\x96\xb1u\xddF;f\x1f\x85#\x9b\xbf({\xb0\x0f\xdf\xc7\xcf(}\x1ey\xe7\xb8N\x9d\xa4\x1bR\x84 \x85\xc0\x11xS\x06\xb0\xf8\xb9k \x8f\"\x8bU;\xd8s\xbe') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000002c0)=""/169, 0xa9}], 0x1, 0x0) fchdir(r0) quotactl(0x2080000201, &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f00000002c0)) 19:25:07 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r1, &(0x7f0000004740)={&(0x7f0000000580)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0xe803) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000b80)='9', 0x1}], 0x1}, 0xc000) sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)="1c", 0x1}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000001e80)='r', 0x1}], 0x1}, 0x0) 19:25:07 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r1, &(0x7f0000004740)={&(0x7f0000000580)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0xe803) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000b80)='9', 0x1}], 0x1}, 0xc000) sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)="1c", 0x1}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000001e80)='r', 0x1}], 0x1}, 0x0) 19:25:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_THP_DISABLE(0x2c) 19:25:07 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="24000000050607031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000000009b356da5a80d18be34c8546c8243929db2406b20cd37ed01cc0", 0x4c}], 0x1}, 0x0) 19:25:07 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r1, &(0x7f0000004740)={&(0x7f0000000580)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0xe803) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000b80)='9', 0x1}], 0x1}, 0xc000) sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)="1c", 0x1}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000001e80)='r', 0x1}], 0x1}, 0x0) 19:25:07 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r1, &(0x7f0000004740)={&(0x7f0000000580)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0xe803) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000b80)='9', 0x1}], 0x1}, 0xc000) sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)="1c", 0x1}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000001e80)='r', 0x1}], 0x1}, 0x0) 19:25:07 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) [ 1565.130972] netlink: 20 bytes leftover after parsing attributes in process `syz-executor1'. 19:25:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_THP_DISABLE(0x2c) 19:25:07 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r1, &(0x7f0000004740)={&(0x7f0000000580)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0xe803) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000b80)='9', 0x1}], 0x1}, 0xc000) sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)="1c", 0x1}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000001e80)='r', 0x1}], 0x1}, 0x0) [ 1565.705852] hfs: unable to parse mount options 19:25:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:07 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r1, &(0x7f0000004740)={&(0x7f0000000580)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0xe803) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000b80)='9', 0x1}], 0x1}, 0xc000) sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)="1c", 0x1}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000001e80)='r', 0x1}], 0x1}, 0x0) 19:25:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) [ 1565.801277] hfs: unable to parse mount options 19:25:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) [ 1566.574506] hfs: unable to parse mount options 19:25:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) [ 1568.395852] hfs: unable to parse mount options 19:25:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:10 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r1, &(0x7f0000004740)={&(0x7f0000000580)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0xe803) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000b80)='9', 0x1}], 0x1}, 0xc000) sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)="1c", 0x1}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000001e80)='r', 0x1}], 0x1}, 0x0) 19:25:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:11 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r1, &(0x7f0000004740)={&(0x7f0000000580)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0xe803) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000b80)='9', 0x1}], 0x1}, 0xc000) sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)="1c", 0x1}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000001e80)='r', 0x1}], 0x1}, 0x0) 19:25:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) [ 1569.212594] hfs: unable to parse mount options [ 1569.360504] hfs: unable to parse mount options 19:25:11 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r1, &(0x7f0000004740)={&(0x7f0000000580)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0xe803) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000b80)='9', 0x1}], 0x1}, 0xc000) sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)="1c", 0x1}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000001e80)='r', 0x1}], 0x1}, 0x0) 19:25:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:11 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r1, &(0x7f0000004740)={&(0x7f0000000580)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0xe803) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000b80)='9', 0x1}], 0x1}, 0xc000) sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)="1c", 0x1}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000001e80)='r', 0x1}], 0x1}, 0x0) 19:25:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:12 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r1, &(0x7f0000004740)={&(0x7f0000000580)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0xe803) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000b80)='9', 0x1}], 0x1}, 0xc000) sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)="1c", 0x1}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000001e80)='r', 0x1}], 0x1}, 0x0) 19:25:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001240)="2e0000002a00815fe45ac187185095cf0400b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) 19:25:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff5c, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000015c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0xb) getgroups(0x7, &(0x7f0000000340)=[0x0, 0xee00, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff]) r1 = open(&(0x7f0000000700)='./file0\x00', 0x1, 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000009c0)={{{@in6=@mcast2, @in=@local}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000640), &(0x7f00000006c0)=0xc) syz_mount_image$hfs(&(0x7f0000000200)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x9, 0x1, &(0x7f0000000940)=[{&(0x7f0000000740)="e9e18652f63a67b1edfdd761abc03ff324362695384ba24065e34531b95f6eada22e9d041621f1955bdd7c565aabd5653b95543a6f143d5688ac5de086c328f00a065e658128ef479676bff49f4bc5eb17c0625c98ef69859cc55b", 0x5b, 0x40}], 0xc00, &(0x7f0000000ac0)={[], [{@audit='audit'}]}) r2 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000007c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000140)={&(0x7f0000000500)=ANY=[@ANYBLOB="3bf72cfbadbf5d3397d96670253b4e5e4d9a0a6ffadc9de69f530d7417433dd48cbcd0f7c91c61b3129e9793f8f732a2143af9885baa86aa81601287c3d48e5846fc5e8abb7facedc54acf0805d2f46f8dd9e357ea2aa31830845b68471da66a0130a593f2151deea750d1c6cac8398797a532cdf24d3238ceb49b84257b63525260e56326f8c340086311b401f7207b1f8cc7a903ad"], 0x1}}, 0x447fe) syz_mount_image$hfs(&(0x7f00000005c0)='hfs\x00', &(0x7f0000000600)='./file0\x00', 0x50c, 0x1, &(0x7f0000000bc0)=[{&(0x7f0000000b00)="225109dc3ffd4bd3d99895f94407e4ece41dc05da45f6b772861a233d76e64e3e375b42691e78d80431d775385565ea7b0ca4e5ded650c97ea9fa02f169de7dcb97364f64c4d3686fbfac8c0a43e01fb0a2224b90b8e11fafa3969e698b8cf3a6ca8e5c0c95ea22950a31706def8a68e04899d77804d4fc893ef5b088a680bba2662cbd152f5cfb124e813dc20a31d85b23dcd66e784201191e73793e42a28d07ac4ecc3990a3606f1463a5993042d54c2cdea219a", 0xb5, 0xffffffff}], 0x10000, &(0x7f0000000c40)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000380), 0xfdf5) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe4e, 0xc0, &(0x7f0000000000)={0x2, 0x5000000fffffffe, @empty}, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040)=@assoc_value, &(0x7f0000000100)=0x8) socket$inet(0x2, 0x7, 0x1) socketpair(0x5, 0x0, 0xc8d6, &(0x7f0000000300)) lremovexattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'security.', 'veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00'}) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000180)=0x6, 0x4) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e21, @multicast2}, 0x10) lsetxattr$trusted_overlay_nlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000480)='trusted.overlay.nlink\x00', &(0x7f00000004c0)={'U-', 0xffff}, 0x28, 0x1) 19:25:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') write$P9_RLCREATE(r0, &(0x7f0000000080)={0x18}, 0x18) 19:25:12 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r1, &(0x7f0000004740)={&(0x7f0000000580)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0xe803) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000001c80)=[{&(0x7f0000000b80)='9', 0x1}], 0x1}, 0xc000) sendmsg$kcm(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000480)="1c", 0x1}], 0x1}, 0x0) sendmsg$kcm(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000001e80)='r', 0x1}], 0x1}, 0x0) 19:25:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001240)="2e0000002a00815fe45ac187185095cf0400b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) 19:25:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') write$P9_RLCREATE(r0, &(0x7f0000000080)={0x18}, 0x18) 19:25:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmat(0x0, &(0x7f0000ff9000/0x4000)=nil, 0x7000) shmdt(r0) 19:25:12 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 19:25:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001240)="2e0000002a00815fe45ac187185095cf0400b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) 19:25:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x20, 0x2c, 0x1, 0x0, 0x0, {0x2}, [@nested={0xc, 0x1, [@typed={0x7ffff, 0xa, @pid}]}]}, 0x20}}, 0x0) 19:25:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') write$P9_RLCREATE(r0, &(0x7f0000000080)={0x18}, 0x18) 19:25:13 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 19:25:13 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 19:25:13 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 19:25:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='setgroups\x00') write$P9_RLCREATE(r0, &(0x7f0000000080)={0x18}, 0x18) 19:25:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000001240)="2e0000002a00815fe45ac187185095cf0400b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) 19:25:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x20, 0x2c, 0x1, 0x0, 0x0, {0x2}, [@nested={0xc, 0x1, [@typed={0x7ffff, 0xa, @pid}]}]}, 0x20}}, 0x0) 19:25:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x5, @dev}}, 0x24) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 19:25:13 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 19:25:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x5a) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @multicast1}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000040)={@multicast1, @local, @multicast1}, 0xc) setsockopt$inet_mreqn(r1, 0x0, 0xc, 0x0, 0x0) 19:25:13 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) 19:25:13 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 19:25:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x20, 0x2c, 0x1, 0x0, 0x0, {0x2}, [@nested={0xc, 0x1, [@typed={0x7ffff, 0xa, @pid}]}]}, 0x20}}, 0x0) 19:25:13 executing program 0: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000300)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) [ 1571.694017] netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'. 19:25:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) writev(r1, &(0x7f0000fb5ff0), 0x35a) 19:25:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x5, @dev}}, 0x24) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 19:25:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x5a) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @multicast1}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000040)={@multicast1, @local, @multicast1}, 0xc) setsockopt$inet_mreqn(r1, 0x0, 0xc, 0x0, 0x0) 19:25:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x5a) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @multicast1}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000040)={@multicast1, @local, @multicast1}, 0xc) setsockopt$inet_mreqn(r1, 0x0, 0xc, 0x0, 0x0) 19:25:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x20, 0x2c, 0x1, 0x0, 0x0, {0x2}, [@nested={0xc, 0x1, [@typed={0x7ffff, 0xa, @pid}]}]}, 0x20}}, 0x0) 19:25:13 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) 19:25:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x5, @dev}}, 0x24) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 19:25:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x5a) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @multicast1}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000040)={@multicast1, @local, @multicast1}, 0xc) setsockopt$inet_mreqn(r1, 0x0, 0xc, 0x0, 0x0) 19:25:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) writev(r1, &(0x7f0000fb5ff0), 0x35a) [ 1572.037710] netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'. 19:25:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x5a) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @multicast1}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000040)={@multicast1, @local, @multicast1}, 0xc) setsockopt$inet_mreqn(r1, 0x0, 0xc, 0x0, 0x0) 19:25:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) writev(r1, &(0x7f0000fb5ff0), 0x35a) 19:25:14 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) 19:25:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x5a) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @multicast1}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000040)={@multicast1, @local, @multicast1}, 0xc) setsockopt$inet_mreqn(r1, 0x0, 0xc, 0x0, 0x0) 19:25:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x5, @dev}}, 0x24) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) [ 1572.252832] netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'. 19:25:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) writev(r1, &(0x7f0000fb5ff0), 0x35a) 19:25:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x5a) connect$inet(r1, &(0x7f0000593000)={0x2, 0x0, @multicast1}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x27, &(0x7f0000000040)={@multicast1, @local, @multicast1}, 0xc) setsockopt$inet_mreqn(r1, 0x0, 0xc, 0x0, 0x0) 19:25:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) writev(r1, &(0x7f0000fb5ff0), 0x35a) 19:25:14 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000002dd0700060000001f5f32c90800010000007373", 0x24}], 0x1}, 0x0) r0 = socket(0x10, 0x800000000080002, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0xa, &(0x7f0000000100)}], 0x492492492492805, 0x0) 19:25:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) writev(r1, &(0x7f0000fb5ff0), 0x35a) 19:25:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x5, @dev}}, 0x24) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 19:25:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x5, @dev}}, 0x24) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) [ 1572.520088] netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'. 19:25:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) writev(r1, &(0x7f0000fb5ff0), 0x35a) 19:25:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) writev(r1, &(0x7f0000fb5ff0), 0x35a) 19:25:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x5, @dev}}, 0x24) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 19:25:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) writev(r1, &(0x7f0000fb5ff0), 0x35a) 19:25:14 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x102) ioctl$KVM_SET_LAPIC(r3, 0x4400ae8f, &(0x7f0000000d00)={"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"}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4004ae86, &(0x7f0000000480)={0x0, 0x2000}) dup2(r2, r3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 19:25:14 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x5, @dev}}, 0x24) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 19:25:14 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000002031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f000037d000)=[{&(0x7f0000199fe1)="1f00000002031900000007000000068100ed853b09000100010100ff3ffe58", 0x1f}], 0x1) writev(r1, &(0x7f0000fb5ff0), 0x35a) 19:25:14 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x5, @dev}}, 0x24) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 19:25:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) 19:25:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x5, @dev}}, 0x24) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 19:25:15 executing program 0: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknodat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x0) [ 1572.998208] audit: type=1400 audit(1546975514.969:397): avc: denied { sys_admin } for pid=19756 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 19:25:15 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x5, @dev}}, 0x24) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 19:25:15 executing program 1: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000100)) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08001800f000f000", 0x24) 19:25:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) 19:25:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x5, @dev}}, 0x24) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 19:25:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$rxrpc(0x21, 0x2, 0x2) bind$rxrpc(r1, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x5, @dev}}, 0x24) io_setup(0x8, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 19:25:15 executing program 0: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknodat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 19:25:15 executing program 1: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000100)) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08001800f000f000", 0x24) 19:25:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) 19:25:15 executing program 4: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000100)) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08001800f000f000", 0x24) 19:25:15 executing program 3: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknodat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 19:25:15 executing program 0: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknodat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 19:25:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) 19:25:15 executing program 1: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000100)) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08001800f000f000", 0x24) 19:25:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) 19:25:15 executing program 4: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000100)) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08001800f000f000", 0x24) 19:25:15 executing program 3: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknodat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 19:25:15 executing program 0: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknodat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 19:25:15 executing program 1: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000100)) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08001800f000f000", 0x24) 19:25:15 executing program 2: unshare(0x2000400) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r1}, 0x10) 19:25:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) 19:25:15 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x8000a0}) 19:25:15 executing program 4: capset(&(0x7f00000000c0)={0x20080522}, &(0x7f0000000100)) r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000340)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08001800f000f000", 0x24) 19:25:15 executing program 3: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mknodat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 19:25:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1e12, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x56, 0x0, 0x7f8000, 0x23, 0x2, 0x0, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x1, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0x0, 0xba, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x1ff, 0x3, 0x2, 0x3, 0x0, 0x6, 0x0, 0x8, 0x800004, @perf_bp={&(0x7f0000000340), 0x3}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, r1, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x1, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x6000000000, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r0, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr=0x4}}, 0x80) 19:25:16 executing program 2: unshare(0x2000400) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r1}, 0x10) 19:25:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000000) clone(0x30020100, 0x0, 0x0, 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) 19:25:16 executing program 4: unshare(0x2000400) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r1}, 0x10) 19:25:16 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x8000a0}) 19:25:16 executing program 3: unshare(0x2000400) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r1}, 0x10) 19:25:16 executing program 2: unshare(0x2000400) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r1}, 0x10) 19:25:16 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000000c0)=0x100000400, 0x20f54eb4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) 19:25:16 executing program 4: unshare(0x2000400) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r1}, 0x10) 19:25:16 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x8000a0}) 19:25:16 executing program 3: unshare(0x2000400) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r1}, 0x10) [ 1574.603110] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 19:25:16 executing program 2: unshare(0x2000400) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r1}, 0x10) 19:25:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1e12, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x56, 0x0, 0x7f8000, 0x23, 0x2, 0x0, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x1, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0x0, 0xba, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x1ff, 0x3, 0x2, 0x3, 0x0, 0x6, 0x0, 0x8, 0x800004, @perf_bp={&(0x7f0000000340), 0x3}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, r1, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x1, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x6000000000, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r0, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr=0x4}}, 0x80) 19:25:17 executing program 1: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x40000ffffff, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0xc0185500, &(0x7f0000000240)={0x8000a0}) 19:25:17 executing program 4: unshare(0x2000400) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r1}, 0x10) 19:25:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000130a07141dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000c6475eaac8e923dca2121a00000990c3efeaf3ee5a80d29fb356da5a", 0x4c}], 0x1}, 0x0) 19:25:17 executing program 3: unshare(0x2000400) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7e, 0x6, 0x1, 0x1}, 0x2c) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000004c0)={&(0x7f0000000280)='./file0/file0\x00', r1}, 0x10) 19:25:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000000c0)=0x100000400, 0x20f54eb4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) [ 1575.583920] netlink: 20 bytes leftover after parsing attributes in process `syz-executor2'. 19:25:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1e12, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x56, 0x0, 0x7f8000, 0x23, 0x2, 0x0, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x1, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0x0, 0xba, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x1ff, 0x3, 0x2, 0x3, 0x0, 0x6, 0x0, 0x8, 0x800004, @perf_bp={&(0x7f0000000340), 0x3}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, r1, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x1, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x6000000000, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r0, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr=0x4}}, 0x80) 19:25:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1e12, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x56, 0x0, 0x7f8000, 0x23, 0x2, 0x0, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x1, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0x0, 0xba, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x1ff, 0x3, 0x2, 0x3, 0x0, 0x6, 0x0, 0x8, 0x800004, @perf_bp={&(0x7f0000000340), 0x3}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, r1, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x1, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x6000000000, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r0, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr=0x4}}, 0x80) 19:25:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000000c0)=0x100000400, 0x20f54eb4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) 19:25:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000130a07141dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000c6475eaac8e923dca2121a00000990c3efeaf3ee5a80d29fb356da5a", 0x4c}], 0x1}, 0x0) 19:25:17 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000000c0)=0x100000400, 0x20f54eb4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) [ 1576.055270] netlink: 20 bytes leftover after parsing attributes in process `syz-executor2'. 19:25:18 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000130a07141dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000c6475eaac8e923dca2121a00000990c3efeaf3ee5a80d29fb356da5a", 0x4c}], 0x1}, 0x0) [ 1576.330434] netlink: 20 bytes leftover after parsing attributes in process `syz-executor2'. 19:25:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1e12, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x56, 0x0, 0x7f8000, 0x23, 0x2, 0x0, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x1, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0x0, 0xba, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x1ff, 0x3, 0x2, 0x3, 0x0, 0x6, 0x0, 0x8, 0x800004, @perf_bp={&(0x7f0000000340), 0x3}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, r1, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x1, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x6000000000, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r0, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr=0x4}}, 0x80) 19:25:19 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000000c0)=0x100000400, 0x20f54eb4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) 19:25:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000000c0)=0x100000400, 0x20f54eb4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) 19:25:19 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000130a07141dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e28000000110affffba010000c6475eaac8e923dca2121a00000990c3efeaf3ee5a80d29fb356da5a", 0x4c}], 0x1}, 0x0) 19:25:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1e12, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x56, 0x0, 0x7f8000, 0x23, 0x2, 0x0, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x1, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0x0, 0xba, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x1ff, 0x3, 0x2, 0x3, 0x0, 0x6, 0x0, 0x8, 0x800004, @perf_bp={&(0x7f0000000340), 0x3}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, r1, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x1, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x6000000000, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r0, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr=0x4}}, 0x80) 19:25:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1e12, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x56, 0x0, 0x7f8000, 0x23, 0x2, 0x0, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x1, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0x0, 0xba, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x1ff, 0x3, 0x2, 0x3, 0x0, 0x6, 0x0, 0x8, 0x800004, @perf_bp={&(0x7f0000000340), 0x3}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, r1, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x1, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x6000000000, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r0, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr=0x4}}, 0x80) [ 1577.248853] netlink: 20 bytes leftover after parsing attributes in process `syz-executor2'. 19:25:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000000c0)=0x100000400, 0x20f54eb4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) [ 1577.548325] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 19:25:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000000c0)=0x100000400, 0x20f54eb4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) 19:25:19 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000000c0)=0x100000400, 0x20f54eb4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) 19:25:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000000c0)=0x100000400, 0x20f54eb4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) 19:25:20 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000000c0)=0x100000400, 0x20f54eb4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) 19:25:20 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000000c0)=0x100000400, 0x20f54eb4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) 19:25:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1e12, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x56, 0x0, 0x7f8000, 0x23, 0x2, 0x0, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x1, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0x0, 0xba, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x1ff, 0x3, 0x2, 0x3, 0x0, 0x6, 0x0, 0x8, 0x800004, @perf_bp={&(0x7f0000000340), 0x3}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, r1, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x1, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x6000000000, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r0, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr=0x4}}, 0x80) 19:25:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000000c0)=0x100000400, 0x20f54eb4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) 19:25:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1e12, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x56, 0x0, 0x7f8000, 0x23, 0x2, 0x0, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x1, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0x0, 0xba, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x1ff, 0x3, 0x2, 0x3, 0x0, 0x6, 0x0, 0x8, 0x800004, @perf_bp={&(0x7f0000000340), 0x3}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, r1, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x1, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x6000000000, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r0, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr=0x4}}, 0x80) 19:25:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1e12, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0xffffffffffffffff, 0x0, 0x56, 0x0, 0x7f8000, 0x23, 0x2, 0x0, 0x7f, 0x0, 0x20000, 0x3e000000000, 0xfffffffffffff001, 0x1, 0x0, 0x8, 0x400, 0x0, 0x0, 0x8, 0x10001, 0x0, 0x0, 0xba, 0x81, 0xe482, 0xa6, 0xe68c, 0x3f, 0x1ff, 0x3, 0x2, 0x3, 0x0, 0x6, 0x0, 0x8, 0x800004, @perf_bp={&(0x7f0000000340), 0x3}, 0x88, 0x3f, 0xffffffff, 0x0, 0x0, 0x6, 0x80}, 0x0, 0x10, r1, 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000300)={0x1, 0x401, 0x0, 0x8, 0x7fff, 0x4, 0x3, 0x0, 0x6000000000, 0x100000000}) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00010, 0x1, &(0x7f00000000c0)=0x37000000, 0x1, 0x2000000000002) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000000)={&(0x7f0000cd1000/0x14000)=nil, &(0x7f00004d8000/0x3000)=nil, 0x14000, 0x1}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200), 0x0, 0x7}}, 0x20) sendto(r0, &(0x7f00000001c0)="7f32eaaeee24761387bcdf7323bdac7dc808e20189ad60f1d439ac5c14a4977166695db91ef4e564c98712ca8079a4d2bfa2b2be1f7be0d7c8b8", 0x3a, 0x4, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x1, @rand_addr=0x4}}, 0x80) 19:25:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000000c0)=0x100000400, 0x20f54eb4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) 19:25:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4, @remote}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0xf0110, 0x100000001) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, 0x0) setrlimit(0x0, 0x0) 19:25:21 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010207031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1579.968298] netlink: 5 bytes leftover after parsing attributes in process `syz-executor5'. 19:25:22 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000000c0)=0x100000400, 0x20f54eb4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) 19:25:22 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010207031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 19:25:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4, @remote}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0xf0110, 0x100000001) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, 0x0) setrlimit(0x0, 0x0) [ 1580.296609] netlink: 5 bytes leftover after parsing attributes in process `syz-executor5'. 19:25:22 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010207031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1580.585531] netlink: 5 bytes leftover after parsing attributes in process `syz-executor5'. 19:25:22 executing program 5: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000010207031dfffd946ff20c0020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) [ 1580.874330] netlink: 5 bytes leftover after parsing attributes in process `syz-executor5'. 19:25:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4, @remote}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0xf0110, 0x100000001) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, 0x0) setrlimit(0x0, 0x0) 19:25:23 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f00000000c0)=0x100000400, 0x20f54eb4) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @local}, 0x1c) 19:25:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4, @remote}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0xf0110, 0x100000001) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, 0x0) setrlimit(0x0, 0x0) 19:25:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4, @remote}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0xf0110, 0x100000001) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, 0x0) setrlimit(0x0, 0x0) 19:25:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000005a80)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000046c0)=[{0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 19:25:23 executing program 4: getrandom(0x0, 0x0, 0x0) pipe(0x0) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000200)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000240)=ANY=[]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x1000000000000387) mlock(&(0x7f0000ff2000/0x2000)=nil, 0x2000) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300), 0xc, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)=""/180, &(0x7f00000000c0)=0xb4) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000240)=0x80) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f0000000080)=0xb1) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0xb704, &(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000200)) 19:25:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4, @remote}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0xf0110, 0x100000001) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, 0x0) setrlimit(0x0, 0x0) 19:25:23 executing program 3: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mISDNtimer\x00', 0x0, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000080)) 19:25:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000005a80)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000046c0)=[{0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 19:25:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000005a80)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000046c0)=[{0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 19:25:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4, @remote}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0xf0110, 0x100000001) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, 0x0) setrlimit(0x0, 0x0) 19:25:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4, @remote}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0xf0110, 0x100000001) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, 0x0) setrlimit(0x0, 0x0) 19:25:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4, @remote}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0xf0110, 0x100000001) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, 0x0) setrlimit(0x0, 0x0) 19:25:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000005a80)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000046c0)=[{0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 19:25:24 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000005a80)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000046c0)=[{0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 19:25:24 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000080), 0xc) ioctl$sock_SIOCGIFCONF(r0, 0x400448e7, &(0x7f00000000c0)) 19:25:24 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000005a80)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000046c0)=[{0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) 19:25:25 executing program 4: getrandom(0x0, 0x0, 0x0) pipe(0x0) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000200)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000240)=ANY=[]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x1000000000000387) mlock(&(0x7f0000ff2000/0x2000)=nil, 0x2000) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300), 0xc, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)=""/180, &(0x7f00000000c0)=0xb4) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000240)=0x80) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f0000000080)=0xb1) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0xb704, &(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000200)) 19:25:25 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000160a43ba5d806055b6fdd80b40000000030001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 19:25:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000005a80)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7295df0df8217ad4000000000000000e6", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f00000046c0)=[{0x0, 0x0, &(0x7f0000001200), 0x0, &(0x7f0000001280)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) io_setup(0x1, &(0x7f0000479000)=0x0) io_submit(r2, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f000079a000)="16", 0x1}]) [ 1583.399082] netlink: 20 bytes leftover after parsing attributes in process `syz-executor0'. 19:25:25 executing program 1: getrandom(0x0, 0x0, 0x0) pipe(0x0) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000200)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000240)=ANY=[]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x1000000000000387) mlock(&(0x7f0000ff2000/0x2000)=nil, 0x2000) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300), 0xc, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)=""/180, &(0x7f00000000c0)=0xb4) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000240)=0x80) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f0000000080)=0xb1) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0xb704, &(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000200)) 19:25:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000040)={0x81, 0x0, [0x3]}) ioctl$KVM_SET_IRQCHIP(r1, 0x4020aea5, &(0x7f00000002c0)={0xfffffffffffffffd, 0x0, @ioapic}) [ 1583.512949] netlink: 20 bytes leftover after parsing attributes in process `syz-executor0'. 19:25:25 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000008c0)=""/255) r3 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) getresuid(&(0x7f0000000240), &(0x7f0000000700), &(0x7f0000000740)) getgroups(0x5, &(0x7f0000000780)=[0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x2d, "3061113edbdd246660168c1b35a36f801d10e11fe01494adeaee3cc91efaa2b8e65d96f02641724a7dd1b8e67d"}, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 19:25:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x840000000002, 0x3, 0xff) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4, @remote}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) sendfile(r0, r1, &(0x7f0000000180)=0xf0110, 0x100000001) getresgid(0x0, 0x0, 0x0) stat(0x0, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, 0x0) setrlimit(0x0, 0x0) 19:25:25 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000160a43ba5d806055b6fdd80b40000000030001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) [ 1583.759331] netlink: 20 bytes leftover after parsing attributes in process `syz-executor0'. 19:25:25 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000080)={0x1, @raw_data="2e678cc1bd8e3844305a5907c3477e393326aa5c94e45b5a484e8c7cffb8ace1b5daf47b194efae94fb61f171ed336a56b7cadd10b6736705a7f0b8c80b85429d2417e595dde134e30d52da6117739ff4b27d0730287a925a1a911eeee09b6f12e4f68eb801f311fb1cae3538d7e695668562205cbff8c2af9ebf8039b98fa3980f3f305cf0b87104879519bc34fe90fe4546ca9cd7d7aae983dd1f0ddc4a9b3f64cd1b4d96aee749048483e160a5fd7f17f68e50589c49a50163b18a1a1f40ae3a2c53247490944"}) 19:25:25 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000160a43ba5d806055b6fdd80b40000000030001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) [ 1584.097707] netlink: 20 bytes leftover after parsing attributes in process `syz-executor0'. 19:25:26 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000080)={0x1, @raw_data="2e678cc1bd8e3844305a5907c3477e393326aa5c94e45b5a484e8c7cffb8ace1b5daf47b194efae94fb61f171ed336a56b7cadd10b6736705a7f0b8c80b85429d2417e595dde134e30d52da6117739ff4b27d0730287a925a1a911eeee09b6f12e4f68eb801f311fb1cae3538d7e695668562205cbff8c2af9ebf8039b98fa3980f3f305cf0b87104879519bc34fe90fe4546ca9cd7d7aae983dd1f0ddc4a9b3f64cd1b4d96aee749048483e160a5fd7f17f68e50589c49a50163b18a1a1f40ae3a2c53247490944"}) 19:25:26 executing program 4: getrandom(0x0, 0x0, 0x0) pipe(0x0) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000200)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000240)=ANY=[]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x1000000000000387) mlock(&(0x7f0000ff2000/0x2000)=nil, 0x2000) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300), 0xc, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)=""/180, &(0x7f00000000c0)=0xb4) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000240)=0x80) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f0000000080)=0xb1) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0xb704, &(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000200)) 19:25:26 executing program 1: getrandom(0x0, 0x0, 0x0) pipe(0x0) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000200)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000240)=ANY=[]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x1000000000000387) mlock(&(0x7f0000ff2000/0x2000)=nil, 0x2000) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300), 0xc, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)=""/180, &(0x7f00000000c0)=0xb4) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000240)=0x80) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f0000000080)=0xb1) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0xb704, &(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000200)) 19:25:26 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000024000)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000160a43ba5d806055b6fdd80b40000000030001000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) 19:25:26 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000080)={0x1, @raw_data="2e678cc1bd8e3844305a5907c3477e393326aa5c94e45b5a484e8c7cffb8ace1b5daf47b194efae94fb61f171ed336a56b7cadd10b6736705a7f0b8c80b85429d2417e595dde134e30d52da6117739ff4b27d0730287a925a1a911eeee09b6f12e4f68eb801f311fb1cae3538d7e695668562205cbff8c2af9ebf8039b98fa3980f3f305cf0b87104879519bc34fe90fe4546ca9cd7d7aae983dd1f0ddc4a9b3f64cd1b4d96aee749048483e160a5fd7f17f68e50589c49a50163b18a1a1f40ae3a2c53247490944"}) 19:25:26 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000008c0)=""/255) r3 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) getresuid(&(0x7f0000000240), &(0x7f0000000700), &(0x7f0000000740)) getgroups(0x5, &(0x7f0000000780)=[0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x2d, "3061113edbdd246660168c1b35a36f801d10e11fe01494adeaee3cc91efaa2b8e65d96f02641724a7dd1b8e67d"}, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) [ 1584.457351] netlink: 20 bytes leftover after parsing attributes in process `syz-executor0'. 19:25:26 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000008c0)=""/255) r3 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) getresuid(&(0x7f0000000240), &(0x7f0000000700), &(0x7f0000000740)) getgroups(0x5, &(0x7f0000000780)=[0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x2d, "3061113edbdd246660168c1b35a36f801d10e11fe01494adeaee3cc91efaa2b8e65d96f02641724a7dd1b8e67d"}, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 19:25:26 executing program 2: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000080)={0x1, @raw_data="2e678cc1bd8e3844305a5907c3477e393326aa5c94e45b5a484e8c7cffb8ace1b5daf47b194efae94fb61f171ed336a56b7cadd10b6736705a7f0b8c80b85429d2417e595dde134e30d52da6117739ff4b27d0730287a925a1a911eeee09b6f12e4f68eb801f311fb1cae3538d7e695668562205cbff8c2af9ebf8039b98fa3980f3f305cf0b87104879519bc34fe90fe4546ca9cd7d7aae983dd1f0ddc4a9b3f64cd1b4d96aee749048483e160a5fd7f17f68e50589c49a50163b18a1a1f40ae3a2c53247490944"}) 19:25:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000000), 0x4000000000001c4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r1) 19:25:26 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810fe00f80ecdb0548e51ce76500000fd4120300120009000600da1b40d819a918001500f9000000", 0x2e}], 0x1}, 0x0) 19:25:26 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000000), 0x4000000000001c4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r1) 19:25:27 executing program 1: getrandom(0x0, 0x0, 0x0) pipe(0x0) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000200)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000240)=ANY=[]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x1000000000000387) mlock(&(0x7f0000ff2000/0x2000)=nil, 0x2000) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300), 0xc, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)=""/180, &(0x7f00000000c0)=0xb4) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000240)=0x80) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f0000000080)=0xb1) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0xb704, &(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000200)) 19:25:27 executing program 4: getrandom(0x0, 0x0, 0x0) pipe(0x0) setsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(0xffffffffffffffff, 0x40045731, &(0x7f0000000200)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_GET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000240)=ANY=[]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, &(0x7f0000000180), 0x1000000000000387) mlock(&(0x7f0000ff2000/0x2000)=nil, 0x2000) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000300), 0xc, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000340)=""/180, &(0x7f00000000c0)=0xb4) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000240)=0x80) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f0000000080)=0xb1) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0xb704, &(0x7f0000000440)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffa) clone(0x0, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000200)) 19:25:27 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000008c0)=""/255) r3 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) getresuid(&(0x7f0000000240), &(0x7f0000000700), &(0x7f0000000740)) getgroups(0x5, &(0x7f0000000780)=[0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x2d, "3061113edbdd246660168c1b35a36f801d10e11fe01494adeaee3cc91efaa2b8e65d96f02641724a7dd1b8e67d"}, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) [ 1585.233365] netlink: 26 bytes leftover after parsing attributes in process `syz-executor2'. 19:25:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810fe00f80ecdb0548e51ce76500000fd4120300120009000600da1b40d819a918001500f9000000", 0x2e}], 0x1}, 0x0) 19:25:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000000), 0x4000000000001c4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r1) 19:25:27 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000008c0)=""/255) r3 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) getresuid(&(0x7f0000000240), &(0x7f0000000700), &(0x7f0000000740)) getgroups(0x5, &(0x7f0000000780)=[0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x2d, "3061113edbdd246660168c1b35a36f801d10e11fe01494adeaee3cc91efaa2b8e65d96f02641724a7dd1b8e67d"}, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 19:25:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000000), 0x4000000000001c4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r1) [ 1585.775874] netlink: 26 bytes leftover after parsing attributes in process `syz-executor2'. 19:25:27 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000000), 0x4000000000001c4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r1) 19:25:27 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810fe00f80ecdb0548e51ce76500000fd4120300120009000600da1b40d819a918001500f9000000", 0x2e}], 0x1}, 0x0) 19:25:27 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000008c0)=""/255) r3 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) getresuid(&(0x7f0000000240), &(0x7f0000000700), &(0x7f0000000740)) getgroups(0x5, &(0x7f0000000780)=[0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x2d, "3061113edbdd246660168c1b35a36f801d10e11fe01494adeaee3cc91efaa2b8e65d96f02641724a7dd1b8e67d"}, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) 19:25:27 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000000), 0x4000000000001c4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r1) [ 1586.034040] netlink: 26 bytes leftover after parsing attributes in process `syz-executor2'. 19:25:27 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 19:25:28 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000240)="2e0000001800810fe00f80ecdb0548e51ce76500000fd4120300120009000600da1b40d819a918001500f9000000", 0x2e}], 0x1}, 0x0) 19:25:28 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 19:25:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_INTERRUPT(r2, 0x4004ae86, &(0x7f0000000000)) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x8040ae9f, &(0x7f0000000040)) 19:25:28 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pppoe={0x18, 0x0, {0x0, @remote, 'ip6gre0\x00'}}, 0x326, &(0x7f0000003b80), 0x0, &(0x7f0000003bc0)}}], 0x22b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f00000008c0)=""/255) r3 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) getresuid(&(0x7f0000000240), &(0x7f0000000700), &(0x7f0000000740)) getgroups(0x5, &(0x7f0000000780)=[0x0, 0xee01, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x0, 0x10000, 0x0, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'raw\x00', 0x2d, "3061113edbdd246660168c1b35a36f801d10e11fe01494adeaee3cc91efaa2b8e65d96f02641724a7dd1b8e67d"}, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) [ 1586.439466] netlink: 26 bytes leftover after parsing attributes in process `syz-executor2'. 19:25:28 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000029000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000000000), 0x4000000000001c4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r0, r1) 19:25:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) dup2(r1, r0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f69845e5180f3313c2f4744f1b88794f78b564cdfb57afec0e9060a46ede710da72b6c79ab158104f2a0fef74a56b874bfdb6f32053e9b697c8b81f340fdab5e6b02b1a08a034d82276f8e277b49200dfcdc81636ad"], 0x56) recvmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000040)=""/85, 0x55}], 0x3a3}}], 0x400000000000157, 0x0, 0x0) 19:25:28 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 19:25:28 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x19, &(0x7f0000000380)={0xffffffa4, {{0x2, 0x0, @local}}, {{0x2, 0x0, @remote}}}, 0x101) 19:25:28 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="4800070003000100000000000000000000000000000025000000000000000000000000000000280000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x4db, &(0x7f0000000000)=[{}]}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x50, &(0x7f0000000440)}, 0x10) 19:25:28 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 19:25:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) dup2(r1, r0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f69845e5180f3313c2f4744f1b88794f78b564cdfb57afec0e9060a46ede710da72b6c79ab158104f2a0fef74a56b874bfdb6f32053e9b697c8b81f340fdab5e6b02b1a08a034d82276f8e277b49200dfcdc81636ad"], 0x56) recvmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000040)=""/85, 0x55}], 0x3a3}}], 0x400000000000157, 0x0, 0x0) 19:25:28 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x19, &(0x7f0000000380)={0xffffffa4, {{0x2, 0x0, @local}}, {{0x2, 0x0, @remote}}}, 0x101) 19:25:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) dup2(r1, r0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f69845e5180f3313c2f4744f1b88794f78b564cdfb57afec0e9060a46ede710da72b6c79ab158104f2a0fef74a56b874bfdb6f32053e9b697c8b81f340fdab5e6b02b1a08a034d82276f8e277b49200dfcdc81636ad"], 0x56) recvmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000040)=""/85, 0x55}], 0x3a3}}], 0x400000000000157, 0x0, 0x0) 19:25:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) dup2(r1, r0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f69845e5180f3313c2f4744f1b88794f78b564cdfb57afec0e9060a46ede710da72b6c79ab158104f2a0fef74a56b874bfdb6f32053e9b697c8b81f340fdab5e6b02b1a08a034d82276f8e277b49200dfcdc81636ad"], 0x56) recvmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000040)=""/85, 0x55}], 0x3a3}}], 0x400000000000157, 0x0, 0x0) 19:25:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) dup2(r1, r0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f69845e5180f3313c2f4744f1b88794f78b564cdfb57afec0e9060a46ede710da72b6c79ab158104f2a0fef74a56b874bfdb6f32053e9b697c8b81f340fdab5e6b02b1a08a034d82276f8e277b49200dfcdc81636ad"], 0x56) recvmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000040)=""/85, 0x55}], 0x3a3}}], 0x400000000000157, 0x0, 0x0) 19:25:29 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x57a, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0x40045542, &(0x7f0000004000)) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000800)={0x0, 0x8}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, 0x0, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) clone(0x40002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r3 = socket(0x40000000015, 0x5, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x3, @remote={0xfe, 0x80, [0x0, 0x600, 0x300, 0x0, 0x0, 0x0, 0x3f000000]}, 0x8d}, 0x1c) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000080), 0x4) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r4 = gettid() timer_create(0x0, &(0x7f00005b6000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r4, 0x1000000000016) close(r1) 19:25:29 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:25:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x19, &(0x7f0000000380)={0xffffffa4, {{0x2, 0x0, @local}}, {{0x2, 0x0, @remote}}}, 0x101) 19:25:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) dup2(r1, r0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f69845e5180f3313c2f4744f1b88794f78b564cdfb57afec0e9060a46ede710da72b6c79ab158104f2a0fef74a56b874bfdb6f32053e9b697c8b81f340fdab5e6b02b1a08a034d82276f8e277b49200dfcdc81636ad"], 0x56) recvmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000040)=""/85, 0x55}], 0x3a3}}], 0x400000000000157, 0x0, 0x0) [ 1587.380129] RDS: rds_bind could not find a transport for fe80::bb, load rds_tcp or rds_rdma? 19:25:29 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x57a, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0x40045542, &(0x7f0000004000)) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000800)={0x0, 0x8}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, 0x0, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) clone(0x40002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r3 = socket(0x40000000015, 0x5, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x3, @remote={0xfe, 0x80, [0x0, 0x600, 0x300, 0x0, 0x0, 0x0, 0x3f000000]}, 0x8d}, 0x1c) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000080), 0x4) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r4 = gettid() timer_create(0x0, &(0x7f00005b6000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r4, 0x1000000000016) close(r1) 19:25:29 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="4800070003000100000000000000000000000000000025000000000000000000000000000000280000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x4db, &(0x7f0000000000)=[{}]}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x50, &(0x7f0000000440)}, 0x10) 19:25:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) dup2(r1, r0) write$binfmt_elf64(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="7f69845e5180f3313c2f4744f1b88794f78b564cdfb57afec0e9060a46ede710da72b6c79ab158104f2a0fef74a56b874bfdb6f32053e9b697c8b81f340fdab5e6b02b1a08a034d82276f8e277b49200dfcdc81636ad"], 0x56) recvmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000040)=""/85, 0x55}], 0x3a3}}], 0x400000000000157, 0x0, 0x0) 19:25:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000002c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x19, &(0x7f0000000380)={0xffffffa4, {{0x2, 0x0, @local}}, {{0x2, 0x0, @remote}}}, 0x101) 19:25:29 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x10000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x1200, r1, 0x2, 0x0, 0x800000}) 19:25:29 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x57a, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0x40045542, &(0x7f0000004000)) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000800)={0x0, 0x8}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, 0x0, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) clone(0x40002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r3 = socket(0x40000000015, 0x5, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x3, @remote={0xfe, 0x80, [0x0, 0x600, 0x300, 0x0, 0x0, 0x0, 0x3f000000]}, 0x8d}, 0x1c) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000080), 0x4) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r4 = gettid() timer_create(0x0, &(0x7f00005b6000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r4, 0x1000000000016) close(r1) 19:25:29 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000440)='/dev/snd/controlC#\x00', 0x57a, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0x40045542, &(0x7f0000004000)) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000800)={0x0, 0x8}, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, 0x0, &(0x7f0000000040)) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x13f}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) clone(0x40002102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000340), 0xffffffffffffffff) r3 = socket(0x40000000015, 0x5, 0x0) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x3, @remote={0xfe, 0x80, [0x0, 0x600, 0x300, 0x0, 0x0, 0x0, 0x3f000000]}, 0x8d}, 0x1c) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000080), 0x4) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r4 = gettid() timer_create(0x0, &(0x7f00005b6000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r4, 0x1000000000016) close(r1) 19:25:29 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="4800070003000100000000000000000000000000000025000000000000000000000000000000280000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x4db, &(0x7f0000000000)=[{}]}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x50, &(0x7f0000000440)}, 0x10) 19:25:29 executing program 2: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000440)="b156d417452c8f6db1077f2abaa85e348946610dabcc617d9aeb42aa515f23c9150bfdba5ea1be4e0415cb2c2d4a1cdff5aba4a225b20c217a72a0299376a76b283c094f665ef7b0", 0x48) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) 19:25:29 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:25:30 executing program 2: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000440)="b156d417452c8f6db1077f2abaa85e348946610dabcc617d9aeb42aa515f23c9150bfdba5ea1be4e0415cb2c2d4a1cdff5aba4a225b20c217a72a0299376a76b283c094f665ef7b0", 0x48) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) 19:25:30 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:25:30 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x10000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x1200, r1, 0x2, 0x0, 0x800000}) 19:25:30 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="4800070003000100000000000000000000000000000025000000000000000000000000000000280000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x4db, &(0x7f0000000000)=[{}]}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x50, &(0x7f0000000440)}, 0x10) 19:25:30 executing program 2: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000440)="b156d417452c8f6db1077f2abaa85e348946610dabcc617d9aeb42aa515f23c9150bfdba5ea1be4e0415cb2c2d4a1cdff5aba4a225b20c217a72a0299376a76b283c094f665ef7b0", 0x48) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) 19:25:30 executing program 2: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000440)="b156d417452c8f6db1077f2abaa85e348946610dabcc617d9aeb42aa515f23c9150bfdba5ea1be4e0415cb2c2d4a1cdff5aba4a225b20c217a72a0299376a76b283c094f665ef7b0", 0x48) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) 19:25:30 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="4800070003000100000000000000000000000000000025000000000000000000000000000000280000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x4db, &(0x7f0000000000)=[{}]}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x50, &(0x7f0000000440)}, 0x10) 19:25:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x10000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x1200, r1, 0x2, 0x0, 0x800000}) 19:25:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x10000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x1200, r1, 0x2, 0x0, 0x800000}) 19:25:32 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="4800070003000100000000000000000000000000000025000000000000000000000000000000280000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x4db, &(0x7f0000000000)=[{}]}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x50, &(0x7f0000000440)}, 0x10) 19:25:32 executing program 1: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="4800070003000100000000000000000000000000000025000000000000000000000000000000280000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_BT_VOICE(0xffffffffffffffff, 0x112, 0xb, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x4db, &(0x7f0000000000)=[{}]}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x50, &(0x7f0000000440)}, 0x10) 19:25:32 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x10000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x1200, r1, 0x2, 0x0, 0x800000}) 19:25:32 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 19:25:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x10000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x1200, r1, 0x2, 0x0, 0x800000}) 19:25:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x10000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x1200, r1, 0x2, 0x0, 0x800000}) 19:25:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x10000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x1200, r1, 0x2, 0x0, 0x800000}) 19:25:33 executing program 5: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000440)="b156d417452c8f6db1077f2abaa85e348946610dabcc617d9aeb42aa515f23c9150bfdba5ea1be4e0415cb2c2d4a1cdff5aba4a225b20c217a72a0299376a76b283c094f665ef7b0", 0x48) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) 19:25:33 executing program 1: ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vhost-vsock\x00', 0x2, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) prctl$PR_GET_FP_MODE(0x2e) 19:25:33 executing program 5: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000440)="b156d417452c8f6db1077f2abaa85e348946610dabcc617d9aeb42aa515f23c9150bfdba5ea1be4e0415cb2c2d4a1cdff5aba4a225b20c217a72a0299376a76b283c094f665ef7b0", 0x48) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) 19:25:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x10000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x1200, r1, 0x2, 0x0, 0x800000}) 19:25:33 executing program 1: ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vhost-vsock\x00', 0x2, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) prctl$PR_GET_FP_MODE(0x2e) 19:25:33 executing program 1: ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, 0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vhost-vsock\x00', 0x2, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(r1, &(0x7f0000000180)=""/184, 0xfffffffffffffd84, 0x10100, 0x0, 0xfffffffffffffd51) prctl$PR_GET_FP_MODE(0x2e) 19:25:33 executing program 5: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000440)="b156d417452c8f6db1077f2abaa85e348946610dabcc617d9aeb42aa515f23c9150bfdba5ea1be4e0415cb2c2d4a1cdff5aba4a225b20c217a72a0299376a76b283c094f665ef7b0", 0x48) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) [ 1591.963898] IPVS: ftp: loaded support on port[0] = 21 [ 1591.976343] IPVS: ftp: loaded support on port[0] = 21 [ 1591.983930] IPVS: ftp: loaded support on port[0] = 21 [ 1592.546315] chnl_net:caif_netlink_parms(): no params data found [ 1592.765373] chnl_net:caif_netlink_parms(): no params data found [ 1592.967239] bridge0: port 1(bridge_slave_0) entered blocking state [ 1592.973718] bridge0: port 1(bridge_slave_0) entered disabled state [ 1592.981497] device bridge_slave_0 entered promiscuous mode [ 1593.156328] bridge0: port 2(bridge_slave_1) entered blocking state [ 1593.162759] bridge0: port 2(bridge_slave_1) entered disabled state [ 1593.169876] device bridge_slave_1 entered promiscuous mode [ 1593.176882] bridge0: port 1(bridge_slave_0) entered blocking state [ 1593.183238] bridge0: port 1(bridge_slave_0) entered disabled state [ 1593.190667] device bridge_slave_0 entered promiscuous mode [ 1593.219647] bridge0: port 2(bridge_slave_1) entered blocking state [ 1593.228106] bridge0: port 2(bridge_slave_1) entered disabled state [ 1593.235324] device bridge_slave_1 entered promiscuous mode [ 1593.405674] chnl_net:caif_netlink_parms(): no params data found [ 1593.418179] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1593.430654] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1593.444248] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1593.454173] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1593.663989] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1593.671807] team0: Port device team_slave_0 added [ 1593.677756] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1593.685101] team0: Port device team_slave_0 added [ 1593.698077] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1593.706359] team0: Port device team_slave_1 added [ 1593.712094] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1593.725891] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1593.733217] team0: Port device team_slave_1 added [ 1593.738560] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1593.760115] bridge0: port 1(bridge_slave_0) entered blocking state [ 1593.768789] bridge0: port 1(bridge_slave_0) entered disabled state [ 1593.777438] device bridge_slave_0 entered promiscuous mode [ 1593.785047] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1593.863600] device hsr_slave_0 entered promiscuous mode [ 1593.922456] device hsr_slave_1 entered promiscuous mode [ 1593.973463] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1593.980508] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1593.987975] bridge0: port 2(bridge_slave_1) entered disabled state [ 1594.054475] device bridge_slave_0 left promiscuous mode [ 1594.060031] bridge0: port 1(bridge_slave_0) entered disabled state [ 1598.061951] device hsr_slave_1 left promiscuous mode [ 1598.134001] device hsr_slave_0 left promiscuous mode [ 1598.173418] team0 (unregistering): Port device team_slave_1 removed [ 1598.189473] team0 (unregistering): Port device team_slave_0 removed [ 1598.199623] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1598.268145] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1598.363010] bond0 (unregistering): Released all slaves [ 1598.475281] bridge0: port 2(bridge_slave_1) entered blocking state [ 1598.481637] bridge0: port 2(bridge_slave_1) entered disabled state [ 1598.489326] device bridge_slave_1 entered promiscuous mode [ 1598.496576] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1598.530958] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1598.575027] device hsr_slave_0 entered promiscuous mode [ 1598.623948] device hsr_slave_1 entered promiscuous mode [ 1598.696195] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1598.717056] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1598.730403] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1598.743440] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1598.779560] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1598.791912] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1598.799858] team0: Port device team_slave_0 added [ 1598.805847] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1598.813251] team0: Port device team_slave_1 added [ 1598.818799] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1598.829534] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1598.977307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1599.030594] device hsr_slave_0 entered promiscuous mode [ 1599.088110] device hsr_slave_1 entered promiscuous mode [ 1599.149124] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 1599.156241] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 1599.193298] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1599.226104] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1599.245757] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1599.261312] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1599.281493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1599.288541] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1599.309413] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1599.320611] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1599.326689] 8021q: adding VLAN 0 to HW filter on device team0 [ 1599.344762] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1599.352117] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1599.359612] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1599.383693] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1599.394370] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1599.402117] 8021q: adding VLAN 0 to HW filter on device team0 [ 1599.411746] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1599.419669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1599.429035] bridge0: port 1(bridge_slave_0) entered blocking state [ 1599.435452] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1599.455606] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1599.475153] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1599.483280] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1599.490593] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1599.499058] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1599.507392] bridge0: port 2(bridge_slave_1) entered blocking state [ 1599.513808] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1599.522032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1599.529971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1599.538052] bridge0: port 1(bridge_slave_0) entered blocking state [ 1599.544723] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1599.554876] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1599.574762] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1599.582295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1599.589581] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1599.600338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1599.609111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1599.617914] bridge0: port 2(bridge_slave_1) entered blocking state [ 1599.624328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1599.634480] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1599.649004] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1599.658348] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1599.669835] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1599.679001] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1599.689012] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1599.699549] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1599.709669] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1599.717935] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1599.727055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1599.735547] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1599.747030] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1599.757480] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1599.767415] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1599.776539] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1599.784683] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1599.792685] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1599.813134] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1599.822823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1599.830823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1599.839129] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1599.850340] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1599.861332] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1599.868609] 8021q: adding VLAN 0 to HW filter on device team0 [ 1599.877833] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1599.885539] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1599.892739] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1599.902055] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1599.921121] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1599.934701] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1599.955034] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1599.976413] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1599.987289] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1599.994225] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1600.003557] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1600.011513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1600.020405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1600.028596] bridge0: port 1(bridge_slave_0) entered blocking state [ 1600.034950] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1600.042314] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1600.050672] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1600.069259] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1600.075295] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1600.087423] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1600.094554] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1600.102639] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1600.110566] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1600.118893] bridge0: port 2(bridge_slave_1) entered blocking state [ 1600.125229] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1600.134249] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1600.152381] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1600.159363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1600.167011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1600.178527] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1600.198386] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1600.204438] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1600.228451] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1600.249242] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1600.265476] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1600.275758] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1600.290368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1600.302684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1600.313020] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1600.321756] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1600.344218] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1600.352867] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 1600.361109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1600.369533] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1600.394738] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1600.418654] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 1600.438177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1600.447352] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1600.482863] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 1600.493501] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1600.523015] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1600.553097] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 1600.559160] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1600.639302] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 19:25:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x10000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x1200, r1, 0x2, 0x0, 0x800000}) [ 1600.688882] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1601.060551] Kernel panic - not syncing: stack-protector: Kernel stack is corrupted in: rcu_dynticks_curr_cpu_in_eqs+0x169/0x170 [ 1601.072412] CPU: 0 PID: 20375 Comm: syz-executor4 Not tainted 5.0.0-rc1+ #14 [ 1601.079606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1601.089053] Call Trace: [ 1601.092735] Kernel Offset: disabled [ 1601.096378] Rebooting in 86400 seconds..