_route(0x10, 0x3, 0x0) fchdir(0xffffffffffffffff) close(r1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x7, 0x100000001}) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:02 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x7, 0x160560) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000100)=""/35) r2 = dup(r0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000001c0)) ioctl$KDGKBMODE(r2, 0x4b44, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f0000000000)=ANY=[@ANYBLOB='#le0 \n\x00\x00\x00\x00\x00\x00'], 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r3) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getdents64(r8, &(0x7f0000000200), 0xffffffffffffff66) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/keycreate\x00', 0x2, 0x0) 16:50:02 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "2897dd57e3a25437", "36cddb6229f832000000ba2cf89b49b8", "93140400", "f0446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) r8 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r8, 0xc0c0583b, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000000000026020000120000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001080000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000"/704]) readv(r8, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/170, 0xaa}], 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$sock_rose_SIOCRSCLRRT(r7, 0x89e4) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:02 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r6, 0x84, 0xe, &(0x7f0000000140)={r7, @in={{0x2, 0x0, @empty}}}, &(0x7f00000000c0)=0x100) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r5, 0x84, 0x70, &(0x7f00000002c0)={r7, @in={{0x2, 0x4e24, @multicast2}}, [0xfffffffffffffffa, 0x2d9a, 0x3, 0x28, 0x3, 0x7fff, 0x8000, 0x5e7, 0x1ff, 0x400, 0x1, 0x5, 0x100000001, 0x80000001, 0x3]}, &(0x7f0000000040)=0x100) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x33fe0, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:02 executing program 1: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80000) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000100)={'filter\x00', 0x4}, 0x68) socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r5 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r6 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r6, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r7 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r7, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) write$binfmt_script(r7, &(0x7f00000002c0)=ANY=[], 0xfffffffffffffd4f) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r3) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 16:50:02 executing program 4: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0x5) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0'}, 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:02 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000040), &(0x7f0000000100)=0x4) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x1) 16:50:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x20000bbc, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 574.488126] protocol 88fb is buggy, dev hsr_slave_0 16:50:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x7ffff000, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:02 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0xb, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000040)={0x5}, 0x4) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) renameat2(r5, &(0x7f0000000140)='./file0\x00', r7, &(0x7f0000000180)='./file0\x00', 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:02 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000001680)={0x0, 0x0}) recvmmsg(r4, &(0x7f0000001600)=[{{&(0x7f0000000100)=@pptp={0x18, 0x2, {0x0, @broadcast}}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000002c0)=""/200, 0xc8}], 0x1, &(0x7f0000000200)=""/31, 0x1f}, 0x2}, {{&(0x7f00000003c0)=@nfc_llcp, 0x80, &(0x7f0000000240)=[{&(0x7f0000000440)=""/159, 0x9f}, {&(0x7f0000000500)=""/208, 0xd0}], 0x2, &(0x7f0000000600)=""/4096, 0x1000}, 0x6df98ec6}], 0x2, 0x1120, &(0x7f00000016c0)={r5, r6+10000000}) 16:50:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x2, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:02 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x106) connect$tipc(r0, &(0x7f0000000100)=@id={0x1e, 0x3, 0x1, {0x4e24, 0x1}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r3) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) [ 574.765014] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pig=6970 comm=syz-executor.3 [ 574.790702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pig=6970 comm=syz-executor.3 16:50:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x3, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 575.088215] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pig=7124 comm=syz-executor.3 [ 575.123641] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pig=7124 comm=syz-executor.3 16:50:05 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) mknod$loop(&(0x7f0000000100)='./file0\x00', 0xc810, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000500)={0x2}, 0x8, 0x0) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvfrom$inet(r1, &(0x7f00000001c0)=""/182, 0xb6, 0x40010002, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000140)) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x4, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:05 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="98ac183fa7833a0d3fe65619dcb61f347f5cc76a8f4c9c71425ac85bffca940d32f569c0fba685cf5640e2052900f6649c00912373a656509ebc3c4b6a"], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$BLKPBSZGET(r3, 0x127b, &(0x7f0000000040)) write$P9_RMKDIR(r3, &(0x7f0000000000)={0x14, 0x49, 0x2, {0x13, 0x4, 0x5}}, 0x14) ptrace$setopts(0x4206, r2, 0x0, 0x0) [ 577.401298] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pig=7231 comm=syz-executor.3 [ 577.430409] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4 sclass=netlink_route_socket pig=7231 comm=syz-executor.3 16:50:05 executing program 4: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="f4bf70fe9125f8c5c1be731b5823300a0000000000000000"], 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:05 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$vivid(&(0x7f00000001c0)='/dev/video#\x00', 0x0, 0x2) r7 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_G_STD(r7, 0x80085617, &(0x7f0000000040)=0x0) ioctl$VIDIOC_S_STD(r7, 0x40085618, &(0x7f0000000140)=r8) ioctl$VIDIOC_S_STD(r6, 0x40085618, &(0x7f0000000200)=r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$KVM_RUN(r10, 0xae80, 0x0) setsockopt$inet_udp_int(r5, 0x11, 0xbf1bd2d19e4fdcfa, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:05 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0xc0600, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000100)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r3) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 16:50:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x5, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 577.511339] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pig=7299 comm=syz-executor.3 16:50:05 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={{}, {0x0, 0x7530}}) r4 = openat$selinux_context(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/context\x00', 0x2, 0x0) fcntl$setflags(r4, 0x2, 0x1) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r6, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) ioctl$FS_IOC_RESVSP(r6, 0x40305828, &(0x7f0000000300)={0x0, 0x1, 0x990b, 0x6}) r7 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r7, 0xc0845658, &(0x7f0000000200)={0x0, @bt={0x1ff, 0x0, 0x0, 0x7, 0x5, 0x20, 0x5, 0x3, 0x7fff, 0x45a, 0x10001, 0x7f, 0x4, 0x100, 0x1, 0x22}}) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:05 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) r4 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x8000, 0x4) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000100)) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) [ 577.571621] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pig=7299 comm=syz-executor.3 16:50:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x6, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:05 executing program 4: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0'}, 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) r4 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$read(0xb, r4, &(0x7f00000002c0)=""/172, 0xac) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:05 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f00000002c0)={{0x0, 0x3, 0x9, 0x6e93db14da875452, 0x6}, 0x794, 0x100, 'id0\x00', 'timer1\x00', 0x0, 0x8, 0x1, 0x20, 0x40}) socket(0x2, 0x0, 0x40) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8000, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) [ 577.756735] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pig=7479 comm=syz-executor.3 [ 577.785063] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6 sclass=netlink_route_socket pig=7479 comm=syz-executor.3 [ 577.848287] net_ratelimit: 19 callbacks suppressed [ 577.848295] protocol 88fb is buggy, dev hsr_slave_0 [ 577.858379] protocol 88fb is buggy, dev hsr_slave_1 [ 578.088193] protocol 88fb is buggy, dev hsr_slave_0 [ 578.093368] protocol 88fb is buggy, dev hsr_slave_1 16:50:06 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_ax25_SIOCDELRT(r5, 0x890c, &(0x7f00000002c0)={@default, @null, 0x6, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, 0x0) r7 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r7}) r8 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r8, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r6, @ANYBLOB="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", @ANYRES64=r7]) ptrace$getregset(0x4204, r7, 0x0, &(0x7f0000000340)={0x0}) ptrace$setopts(0xc60f, r7, 0x5, 0x10003c) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getpid() ptrace$setopts(0x4206, r7, 0x2, 0x40) r9 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x40, 0x0) connect$caif(r9, &(0x7f0000000100)=@dgm={0x25, 0x8, 0xc3}, 0x18) 16:50:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x7, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:06 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) keyctl$session_to_parent(0x12) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000440)={0x0, @local, @empty}, &(0x7f0000000480)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x12, &(0x7f00000004c0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x10}, r6}, 0xc) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r7, 0x80045300, 0x0) r8 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r8}) r9 = socket(0x10, 0xa, 0x3) ioctl$sock_bt_bnep_BNEPCONNADD(r9, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r7, @ANYBLOB="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", @ANYRES64=r8]) ptrace$getregset(0x4204, r8, 0x0, &(0x7f0000000340)={0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r3, 0xc1105511, &(0x7f00000002c0)={{0x8, 0x3, 0x4, 0x3, '\x00', 0x2}, 0x6, 0x4, 0x200, r8, 0x8, 0x100, 'syz1\x00', &(0x7f00000001c0)=['#! ', '\x00', '#! ', 'security#%em1}-,$cgroup*vmnet0+cgroupmime_type\\em0vmnet0.:\x00', 'user\x00', '#! ', ':)\x00', 'vmnet1&bdevcgroup]]posix_acl_access&em0proccgroupvboxnet0\x00'], 0x87, [], [0x5604, 0x5, 0x2, 0x1]}) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:06 executing program 4: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r2 = gettid() r3 = creat(&(0x7f0000000040)='./file0\x00', 0xc1) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="aa"], 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RLOPEN(r5, &(0x7f0000000100)={0xfffffffffffffe70, 0xd, 0x1, {{0xb0, 0x5, 0x6}, 0xfd}}, 0x18) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x800000000, 0x0) 16:50:06 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) fcntl$dupfd(r1, 0x406, r3) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0xfffffffffffffd66) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400000, 0x0) setns(r5, 0x4000000) 16:50:06 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_TRY_DECODER_CMD(r5, 0xc0485661, &(0x7f0000000100)={0xc, 0x2, @raw_data=[0xffffffff, 0x4, 0x1, 0x7, 0xe, 0x3, 0x3, 0x5f, 0x7fffffff, 0xf2f, 0x20, 0x5, 0xb45, 0xffffffff, 0x800, 0x2]}) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x8, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:06 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() write$tun(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="0000001700099bd1b979acfc8e"], 0x15) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000380)={'#! ', './file0', [{}], 0xa, "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"}, 0x12d) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r4, 0x80045300, 0x0) r5 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r5}) r6 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r6, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r4, @ANYBLOB="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", @ANYRES64=r5]) ptrace$getregset(0x4204, 0x0, 0x4, &(0x7f0000000340)={0x0, 0x2f}) ptrace$setopts(0x4206, r5, 0x0, 0x1) ptrace$setopts(0x4206, r2, 0x0, 0x0) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r7, 0x80045300, 0x0) r8 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r8}) r9 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r9, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r7, @ANYBLOB="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", @ANYRES64=r8]) ptrace$getregset(0x4204, r8, 0x0, &(0x7f0000000340)={0x0}) waitid(0x2, r8, &(0x7f0000000140), 0x100000a, &(0x7f00000004c0)) 16:50:06 executing program 4: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0'}, 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x80, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r4, 0x40086408, &(0x7f00000000c0)={0xff}) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:06 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x3c, &(0x7f0000000040)=0x662f, 0x4) syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x400, 0x154000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x9, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:06 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDGKBMODE(r5, 0x4b44, &(0x7f0000000100)) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:06 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r3 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() r5 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r5, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r4) close(r5) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) [ 578.627641] Unknown ioctl 1074291720 [ 578.648148] protocol 88fb is buggy, dev hsr_slave_0 [ 578.653291] protocol 88fb is buggy, dev hsr_slave_1 16:50:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0xa, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000040)={0xfffffffc, 0xb0, r2, 0x0, 0xee00, 0x0, 0x1ff, 0xffff}) socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = gettid() r7 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r7, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r6) close(r7) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r8 = fcntl$getown(r4, 0x9) ptrace$setopts(0x4200, r8, 0x0, 0x0) 16:50:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20\x00', 0x200000, 0x0) renameat(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000300)='./file0\x00') socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r5 = gettid() r6 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r6, 0xc0c0583b, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]) fsetxattr$trusted_overlay_opaque(r6, &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x3d6ceacabdea6f02) r7 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r7, &(0x7f0000000000)={'#! ', './file0'}, 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r5) close(r7) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_GET_DEBUGREGS(r4, 0x8080aea1, &(0x7f0000000200)) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) 16:50:06 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet6_mreq(r4, 0x29, 0x14, &(0x7f00000001c0)={@remote, 0x0}, &(0x7f0000000200)=0x14) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x7, 0x3, 0x5, 0x100, 0x10, r1, 0xfffffff9, [], r5, r7, 0x1, 0x3}, 0x3c) r8 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r8, &(0x7f0000000000)=ANY=[@ANYBLOB="2321201c607472040000000a"], 0xc) socket(0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r8) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0xb, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:06 executing program 5: pipe2$9p(&(0x7f0000000000), 0x800) socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RXATTRCREATE(r3, &(0x7f0000000300)={0x7, 0x21, 0x1}, 0x7) r4 = gettid() r5 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x4000, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r6, 0x2287, &(0x7f0000000180)=0x80) write$binfmt_script(r5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1290bb427a22811f6a8dda160e42"], 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) r9 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r9, 0x80045300, 0x0) r10 = getpid() r11 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000000105042, 0x0) write(r11, &(0x7f0000000200)="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", 0x1ffe00) r12 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r12, 0x80045300, 0x0) r13 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r13}) r14 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r14, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r12, @ANYBLOB="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", @ANYRES64=r13]) ptrace$getregset(0x4204, r13, 0x0, &(0x7f0000000340)={0x0}) ioctl$BLKTRACESETUP(r11, 0xc0401273, &(0x7f00000001c0)={[], 0x469, 0x6, 0x3, 0x6, 0x3, r13}) r15 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r15, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r9, @ANYBLOB="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", @ANYRES64=r10]) ptrace$getregset(0x4204, r10, 0x0, &(0x7f0000000340)={0x0}) setpriority(0x1, r10, 0xdc8) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r17 = dup(r16) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) ioctl$GIO_UNISCRNMAP(r17, 0x4b69, &(0x7f00000004c0)=""/162) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r4) close(r5) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x200200, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) [ 578.968140] protocol 88fb is buggy, dev hsr_slave_0 [ 578.968185] protocol 88fb is buggy, dev hsr_slave_1 [ 578.973246] protocol 88fb is buggy, dev hsr_slave_1 [ 578.983445] protocol 88fb is buggy, dev hsr_slave_0 16:50:06 executing program 4: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="2321202e2f66696c65300a99db25393860101d86c52737768d53e0caddbb635cdd58cd6d567b677c91c6aa98d071fef2080000e1076b18404aef8ad66dce241d99deb56e5ca23a44ec85f4714c9187430daf37c359cf5080517691275bf4f6c807c8f5d1f78b54ea2792a9ac4f81e6fcc2bd387eaf1697a29c75513c9f16ee9371c0b3dd63dfbe25cbf27276ae5bde2113a067bf4a30e87bd950ea3816297b848bee560924ab2b834100001cc6ea963ee6ad0b2575323df5f993be8b6de71185c5e607b06c3074aaacfbc78229244b348a42"], 0xd2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$bt_BT_SNDMTU(r5, 0x112, 0xc, &(0x7f0000000040)=0x6, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$P9_RSETATTR(r7, &(0x7f00000000c0)={0x7, 0x1b, 0x1}, 0x3) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:06 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x58, r5, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, '\x00\x00\x02\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x58}}, 0x0) sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8406060}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x74, r5, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x2c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lapb0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7c45365877d63329}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x50}, 0x24000801) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:06 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0xc, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:06 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="10105a4e2f347a15d3c2200acdf8a891857896037d15d59d87b031b22b777423cfb6fcce99ec09d6c969ae1b97818ac1ce6dd9188ac86e8c575aa7b3b6b1c15c215bd8d8f7c4a0f755f655586bb122680929b2e3aa259b39790cf54b44b8ccaa1c8841e78063be401729ffe6948a2da842d3b03279992cc2942448725246e042f11374b1ac79b595205f80dc7753f26dc187c1857e5bc19b73b10484fa504e4d65420b6a357343f836398bca95bac5ff1c8d03c042ad2dc2e5ae8847"], 0xc) socket(0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) [ 579.110721] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 579.312472] audit: type=1800 audit(1571503807.162:1785): pid=8164 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="sda1" ino=16708 res=0 16:50:07 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x4}, 0xfffffeb5) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0xc) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000100)=0x8) 16:50:07 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$EVIOCSKEYCODE_V2(r1, 0x40284504, &(0x7f0000000000)={0x7f, 0xc, 0xde46, 0xffe, "d57f7a77cecf404213bd580125a0ddd876a614b2768dedaad202c28c3025935a"}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) 16:50:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0xd, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:07 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x8c467856beb9ddd3, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000100)={0x1, 0xfffffff9, 0x8, 0x0, 0x5}) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) getpid() 16:50:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) perf_event_open(&(0x7f000001d000)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000115000/0x2000)=nil, 0x2000, 0x1000, 0x0, &(0x7f000048c000/0x1000)=nil) r3 = socket$inet6(0xa, 0x40000080806, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x33, &(0x7f0000000040), 0x4) bind$inet6(r3, &(0x7f000047b000)={0xa, 0x404e20}, 0xffffffffffffffa8) listen(r3, 0x400000001ffffffd) r4 = socket$inet6(0xa, 0x6, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f00000000c0)=""/126, 0x7e) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) accept4(r3, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000003d40)=[{{0x0, 0x23e, 0x0, 0x0, 0x0, 0xfffffffffffffff4}}], 0x40000000000003f, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = gettid() r6 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r6, &(0x7f0000000000)=ANY=[@ANYBLOB='#! ./fime0 \n'], 0xc) socket(0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r5) close(r6) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) 16:50:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0xe, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:07 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="23ff1f2e9f7ac67d6e632f66696c6510200a"], 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r6, 0x84, 0xe, &(0x7f0000000140)={r7, @in={{0x2, 0x0, @empty}}}, &(0x7f00000000c0)=0x100) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f0000000040)={r7, 0xcc7f}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:07 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0xf, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 579.830520] selinux_nlmsg_perm: 16 callbacks suppressed [ 579.830536] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=8709 comm=syz-executor.3 [ 579.851645] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pig=8709 comm=syz-executor.3 16:50:09 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r0, 0xc028564e, &(0x7f0000000100)={0x3, 0x1, [0x8, 0x0, 0xffffff37, 0x9, 0x2, 0x6, 0x1, 0xff]}) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f0000000000)={'#! ', './file0'}, 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r3) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000040)=0x4, 0x4) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 16:50:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x11, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:09 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x5, 0x111001) fsetxattr(r0, &(0x7f0000000100)=@random={'btrfs.', '#! '}, &(0x7f0000000140)='bdev#\x00', 0x6, 0x2) r1 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() r6 = creat(&(0x7f0000000280)='./file0\x00', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000580)='/dev/vsock\x00', 0xdde122f8a63b8174, 0x0) connect$l2tp(r9, &(0x7f00000005c0)=@pppol2tpin6={0x18, 0x1, {0x0, r3, 0x0, 0x1, 0x3, 0x3, {0xa, 0x4e20, 0x0, @mcast2, 0xdb}}}, 0x32) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/btrfs-control\x00', 0x208c2, 0x0) r10 = perf_event_open$cgroup(&(0x7f0000000500)={0x1, 0x70, 0x51, 0x0, 0x6, 0x7f, 0x0, 0x1f, 0x10200, 0xa, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x5, @perf_config_ext={0xce, 0x6}, 0x890, 0x7, 0x100, 0x0, 0x0, 0x8, 0x4}, r1, 0xf, r6, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r8, &(0x7f0000000240)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x3, {0xa, 0x4e21, 0x400, @loopback, 0x8001}}}, 0x38) write$binfmt_script(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f66696c653027f6cfbf6b0de81dc8dc200a"], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r5) close(r6) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="85000000290000009c0000000000000095000000000000005131ebebe327ee46b1902ecf770924c15ffff2424299f65f5b5fc6155e6fe181ea6e327d091784e4d14e9944531478d6"], &(0x7f00000002c0)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r11, 0x55}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', r11}, 0x10) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f00000001c0)={0xb, {0x3, 0x9, 0x27, 0x5}, {0x10000, 0x7, 0x5, 0x3f}, {0xffff8000}}) 16:50:09 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='#! ./fi^e0 \n'], 0xc) socket(0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f00000001c0)={0x24, 0x0, &(0x7f0000000040)=[@exit_looper, @release={0x40046306, 0x3}, @register_looper, @release={0x40046306, 0x2}, @increfs={0x40046304, 0x1}, @enter_looper], 0x6e, 0x0, &(0x7f0000000100)="42e37352d11dadd3ef7eb840038aa7619458a1098ee43973aebbf9df93582f14756a46e6ea3e7cb4f901c08412b02652c0be47b135710873502fcae6f32d51e3afe84a05a1f6ccb8c4dda4a27fe05e74d33ca5bf543a48d735ab4b41080868c8411d096c8156198fdf5d0eaf147d"}) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:09 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x505}, "3a56aa1a197fdb42", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[], 0x0) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:09 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x3, 0x6, @random="08f00793e142"}, 0x10) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, 0x0) r4 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r4}) r5 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r5, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r3, @ANYBLOB="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", @ANYRES64=r4]) ptrace$getregset(0x4204, r4, 0x0, &(0x7f0000000340)={0x0}) fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={r4, r6, r7}, 0xc) r8 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = gettid() r10 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r10, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000006b910000"], 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f0000000040), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r9) close(r10) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r9, 0x0, 0x0) 16:50:10 executing program 4: socket$alg(0x26, 0x5, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8000, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ff7000/0x9000)=nil, 0x9000}, &(0x7f00000000c0)=0x10) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0xd, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) readahead(0xffffffffffffffff, 0x3, 0xfffffffffffffff8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000000000000000000000e0385e8f97cc7954319fb299b0d63c06a1be728bdf37ce3e1124e5614fb612ca4deed1ca93613f38564491825c18ce18558f3bc5db105d023685223cbc44056037fd65980f93903a7bc1c0f000c2f979e3138b64af286a282426d15511bcf05f0489076be6a562bbd42186a9ca771af12dfe8dcdcd10b96a0468c16d69bd99dc9b86734bdfe041a4d2a33d8717173eab8d1b91ab5828a072271d35c62672fe0930c1aa843384951ec33f9d9c9e5fd0ae5446ad8662a986d94bed1a6925a318813b1101dce2cfe33a23c548d295ce67b57256a4c75056de"], 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r3) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_GET_NODE_INFO_FOR_REF(0xffffffffffffffff, 0xc018620c, &(0x7f0000000100)) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000400)={0x2, 0x70, 0x4, 0x7, 0x4b, 0x3f, 0x0, 0x1, 0x20000, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, @perf_config_ext={0x5, 0x400}, 0x8, 0x9, 0xfffffe00, 0x3, 0xfffffffffffffffc, 0xff, 0x3}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x4) ptrace$setopts(0xffffffffffffffff, r3, 0x7, 0x20) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x10c0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={0x0, r5, 0xd}, 0x10) 16:50:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x12, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:10 executing program 0: 16:50:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x14, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:10 executing program 4: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) recvfrom$rxrpc(r1, &(0x7f00000000c0)=""/80, 0x50, 0x161, &(0x7f0000000040)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0xbe7, @ipv4={[], [], @local}, 0x2}}, 0x24) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0'}, 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:10 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000100)=ANY=[], 0x0) socketpair(0x0, 0x2, 0x3a, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_STATUS(r5, 0x80605414, &(0x7f00000001c0)=""/191) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r7, 0x4040534e, &(0x7f0000000400)={0x4, @time={r8, r9+10000000}, 0x3b, {0x8, 0x4}, 0xc0, 0x1, 0x6}) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r13, 0x84, 0x1f, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e20, 0x7070, @empty, 0x4}}, 0xbebd, 0x9}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp6_SCTP_CONTEXT(r11, 0x84, 0x11, &(0x7f0000000380)={r14, 0x3d491ae5}, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:10 executing program 0: 16:50:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x15, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) write$sndseq(r1, &(0x7f0000000300)=[{0x8d, 0x0, 0xc0, 0x3f, @time={0x0, 0x1c9c380}, {0xf7}, {0x85, 0x7f}, @quote={{0x3, 0x40}, 0x7, &(0x7f0000000200)={0xe8, 0x2, 0x2, 0x1, @time={r2, r3+10000000}, {0xe, 0x8c}, {0x20, 0x6}, @quote={{0x0, 0x20}, 0x1, &(0x7f0000000100)={0x3f, 0x9, 0x7d, 0x0, @tick=0x8, {0x80, 0x20}, {0x9, 0x4}, @control={0x2, 0x4, 0x1}}}}}}, {0x5, 0x9, 0x2, 0x2, @tick=0x5, {0x0, 0x4f}, {0x4, 0x9}, @quote={{0x80, 0xb7}, 0x3, &(0x7f00000002c0)={0x1, 0x1, 0x40, 0x4, @time={r4, r5+30000000}, {0x20, 0x4}, {0x6, 0x40}, @queue={0x1, {0xffffffff, 0x8}}}}}, {0x7f, 0x3e, 0x1, 0x7c, @tick=0x6, {0xff, 0x5}, {0x7f, 0x7f}, @connect={{0xf4, 0x1}, {0x8, 0x80}}}], 0x90) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) flock(r6, 0x9) r8 = gettid() r9 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r9, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0xb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) write$P9_RUNLINKAT(r11, &(0x7f00000004c0)={0x7, 0x4d, 0x2}, 0x7) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000040)) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r8) close(r9) r12 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/checkreqprot\x00', 0x400000, 0x0) getsockopt$EBT_SO_GET_INFO(r12, 0x0, 0x80, &(0x7f0000000400)={'broute\x00'}, &(0x7f0000000480)=0x78) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000500)={0xb772}, 0xc) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r8, 0x0, 0x0) 16:50:10 executing program 0: 16:50:10 executing program 5: r0 = semget$private(0x0, 0x4, 0x80) semctl$SEM_INFO(r0, 0xcb269444c71f85d0, 0x13, &(0x7f0000000140)=""/37) socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r5 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[@ANYRES64=r5], 0x8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r3) close(r4) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, 0x0) r7 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r7}) r8 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r8, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r6, @ANYBLOB="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", @ANYRES64=r7]) ptrace$getregset(0x4204, r7, 0x0, &(0x7f0000000340)={0x0}) r9 = getpgid(r7) migrate_pages(r9, 0x8, &(0x7f0000000000)=0x8, &(0x7f0000000100)=0x101) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 16:50:10 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x17, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:10 executing program 4: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x4, 0x800) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f00000000c0)=0x500) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a09a47c190d0800aa925a", 0xd) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="2321073fa0995c57ee941e91fe7a2d2f66696c6d300a"], 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r3) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 16:50:10 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) [ 583.050612] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23 sclass=netlink_route_socket pig=9021 comm=syz-executor.3 [ 583.115545] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23 sclass=netlink_route_socket pig=9021 comm=syz-executor.3 [ 583.128096] net_ratelimit: 19 callbacks suppressed [ 583.128105] protocol 88fb is buggy, dev hsr_slave_0 [ 583.128134] protocol 88fb is buggy, dev hsr_slave_0 [ 583.133099] protocol 88fb is buggy, dev hsr_slave_1 [ 583.138184] protocol 88fb is buggy, dev hsr_slave_1 [ 583.143217] protocol 88fb is buggy, dev hsr_slave_0 [ 583.158286] protocol 88fb is buggy, dev hsr_slave_1 16:50:11 executing program 4: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SG_SCSI_RESET(r3, 0x2284, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r4 = gettid() r5 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="23fd202e2f66696c65300a"], 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r4) close(r5) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) 16:50:11 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = semget(0x3, 0x2, 0xc10571773c8e9fe8) semctl$SETVAL(r3, 0x0, 0x10, 0x0) semctl$SETALL(r3, 0x0, 0x11, &(0x7f00000001c0)) semctl$IPC_STAT(r3, 0x0, 0x2, &(0x7f00000001c0)=""/223) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r7}], {0x4, 0x1}, [{0x8, 0x6, r8}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000400)={{{@in=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000500)=0xe8) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1128800, &(0x7f0000000540)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r7}, 0x2c, {'group_id', 0x3d, r9}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@pcr={'pcr', 0x3d, 0x3d}}, {@uid_lt={'uid<', r10}}, {@seclabel='seclabel'}]}}) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) r11 = syz_open_dev$radio(&(0x7f0000000680)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_EVENTS(r11, 0x84, 0xb, &(0x7f00000006c0), &(0x7f0000000700)=0xb) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$VHOST_GET_VRING_ENDIAN(r13, 0x4008af14, &(0x7f0000000100)={0xcabdb645da511bc0, 0x400}) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@ccm_128={{0x304}, "20918b57823a45b4", "ec4896ba9ea65f5f1078e708a8fc1121", "1b5eaae9", "ddeff5fa7b05f770"}, 0x3f1) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x1a, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:11 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2f66696cffff200a"], 0xc) socket(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)}}, 0x10) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000680)='/dev/vcs\x00', 0x309080, 0x0) r8 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f0000000140)={r9, 0x3, 0x6, @random="08f00793e142"}, 0x10) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000980)={0x0}, &(0x7f00000009c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a00)={r10, r7, 0x0, 0xffffffffffffffbd, 0x0, r6}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r2, r5, 0x0, 0x46, &(0x7f0000000900)='procposix_acl_accesswlan0(ppp1cpusetGPLvboxnet0\\-])selinuxnodevvmnet1\x00', r6}, 0x30) wait4(r11, 0x0, 0x0, &(0x7f0000000380)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) r12 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAXSEG(r14, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={0x0, 0x3ff}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r12, 0x84, 0x1f, &(0x7f00000001c0)={r15, @in6={{0xa, 0x4e23, 0x2, @empty, 0x69}}, 0x3, 0x2}, 0x90) prctl$PR_SET_PTRACER(0x59616d61, r2) r16 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r16, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000640)={0x9c, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="08631040000000000000000000000000000000001063084000000000000000000d630000046304400300000008631040030000000000000000000000000000001263484001000000000000000000000000000000000000005918c950000000000000000060000000000000001800000000000000", @ANYPTR=&(0x7f0000000a40)=ANY=[@ANYBLOB="852a747001000000", @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/116], @ANYBLOB="740000000000000000000000000000001700000000000000855e127647380f4ca1218b3a61646600000000030000000000000001000000000000003a00000000000000852a646600000000", @ANYRES32=r16, @ANYBLOB='\x00'/12], @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00(\x00\x00\x00\x00\x00\x00\x00H\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00060000000000000c6300000d6300000d6300000c630000"], 0x77, 0x0, &(0x7f0000000580)="6b80475eccc9cd38e28f10bf1edab56bec1a79d5a9524e577c1cdd02dffaf37e3c5ff414c4ac48e106830b89f24b13220da3a20b1b8648158bcbc0f132518472631047984b02023084676354bc0e242bfde861ab98d46c4aeb9373d351dd28bc613fd22b1de5f1232e1fce386f9a0c48fb7132115044af"}) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STARTDAEMON(r12, 0x0, 0x48b, &(0x7f00000002c0)={0x0, 'netdevsim0\x00', 0x4}, 0x18) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:11 executing program 4: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000200)={'#! ', './file0', [{0x20, 'kw(khazad-generic)\x00'}, {0x20, 'kw(khazad-generic)\x00'}, {0x20, 'skcipher\x00'}, {0x20, 'kw(khazad-generic)\x00'}, {0x20, 'vmnet0'}]}, 0x58) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0xca29f90cc0dc093c, r2, 0x2, 0x7e) 16:50:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x1d, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(0xffffffffffffffff, 0xc008551b, &(0x7f0000000640)={0x9, 0x18, [0x7, 0x5, 0x600000, 0x7, 0x7, 0xffff]}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000004c0)=ANY=[@ANYBLOB="2321202e2f66696c65302023212020202320202f70726f632f73656c662f2f65786500205220656d3120202321200a9d5c3a92f102181536b0b2a9351d18c9d13e2f044056465086140aaed8952e7bf26711531c91e29c3696c17eab8ada7cce80a9306b6c8a9f15a75a4ac5fd716810f422c8ee740789749abdc738c1beed8440dc53af084a95fc12940edb16dd9c827628281557d440fa7dcde2ee34c60f24aa105c075ae771a4819c96d6ea5b741a2051e5590cd53e1fe53a672130f128fa4ae6bd24e7337c58b32cfb397bb7e14e93b55edf387e4731142a86bc404c0000000000000006cde2a51dd0909cf2a6a7bd2e30e5d6a9d41166304ee207f98befdab4416d7849383441c508b5616451620d95dbbb4285f2454eb3f888a14c0ab519670e30257d7aaf8dd3101341f636ca32aeef52866b1afedd9371b037c1ee7e3a071ce032c300f9"], 0x1ef) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r3) r5 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) ioctl$FS_IOC_SETFSLABEL(r5, 0x41009432, &(0x7f0000000700)="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") close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet6_mreq(r9, 0x29, 0x323092bcbf4a544f, &(0x7f0000000680)={@dev}, &(0x7f0000000840)=0x10b) getsockopt$TIPC_SRC_DROPPABLE(r7, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000000480)=0x4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000100)={{0x0, 0x0, @identifier="caa9570a83b6e37361d1bd9c4772c3d8"}}) ptrace$setopts(0x4206, r3, 0x0, 0x0) r10 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r10, 0xc0c0583b, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000002602000012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000108000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fff000000000000000000000000001000"/704]) r11 = dup(r10) r12 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r12, 0x84, 0x6e, &(0x7f0000000680), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r12, 0x84, 0xe, &(0x7f0000000140)={r13, @in={{0x2, 0x0, @empty}}}, &(0x7f00000000c0)=0x100) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r11, 0x84, 0x78, &(0x7f0000000040)=r13, 0x4) 16:50:11 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() write$binfmt_script(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(0xffffffffffffffff) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x9, 0x3, 0x310, 0x158, 0x158, 0x158, 0x158, 0x158, 0x278, 0x278, 0x278, 0x278, 0x278, 0x3, &(0x7f0000000000), {[{{@uncond, 0x0, 0xf0, 0x158, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0xff4ab7b1d9ce84e6, 0x8}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xd}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x10, 0x7, 0x203d, 0x4, 'pptp\x00', 'syz0\x00', 0x5}}}, {{@ip={@local, @local, 0xff, 0xffffff00, 'bridge0\x00', 'vcan0\x00', {}, {0xff}, 0x6c, 0x1, 0x5}, 0x0, 0xc0, 0x120, 0x0, {}, [@common=@unspec=@pkttype={0x28, 'pkttype\x00', 0x0, {0x1, 0x81}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @empty, 0x20, 0x5, [0x4, 0x3b, 0x3, 0x29, 0x3e, 0x3b, 0x9, 0x27, 0x26, 0x8, 0x18, 0x3c, 0x1e, 0x6, 0x39, 0x494], 0x4, 0x3ff, 0x3}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x370) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:11 executing program 4: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0xac0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f00000003c0)={0x1, 0x1f}, 0x2) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f66696c65300ae0507c765006f1b68a040f810a718df77de53501e1abc901177974832571bb7f911567beefab75d46ea8e313ca89826472482437ced69dde637c91a09e6bf71d701f2c868ef5d934bdd50095c0b9dc40c6e47e2e50772293c6a9067616c11983"], 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000340)={0x1, 0xbfa36ba80e386baf, 0x1000, 0x69, &(0x7f0000000040)="38456d5237ef54d5c6c49b8b4300568469a75af361dd60c098862166794dbc3daa53e3d3fb3ecb3648f48338e5dd99a22044f64ede6ccbc2275e71cd9b7baf6fa8e77bff8a608a60c6adcd4279861c2dc650773df88a656fd5ed42e0cc00"/105, 0xfffffcf5, 0x0, &(0x7f00000002c0)="cd4b18d15a3f7077fda67ca12957bdaaacf1de3afd0438cccab4e9471716c3c6375b3ecf2d2073f0cb86cda8a1ab066ddc6d771e2963e27cce571f2b0f06236d68d08800647ab85eafd49ea3e8e1febb57d1b40fbd769cec"}) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) prctl$PR_SET_PTRACER(0x59616d61, r3) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 16:50:11 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50000}]}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, 0x0}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, 0x0, 0x0) 16:50:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x2f, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 583.733914] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47 sclass=netlink_route_socket pig=9277 comm=syz-executor.3 [ 583.786380] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=47 sclass=netlink_route_socket pig=9277 comm=syz-executor.3 16:50:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x67, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:11 executing program 4: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000140)={r2, 0x3, 0x6, @random="08f00793e142"}, 0x10) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000200)={0x0, 0x2}, 0x8) r3 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$VIDIOC_S_PARM(r3, 0xc0cc5616, &(0x7f00000003c0)={0xc, @output={0x0, 0x2, {0x6, 0x3ff}, 0x6, 0x81}}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socket(0xa, 0x4, 0x64) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000040)=@usbdevfs_disconnect={0x3f}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r6 = gettid() ptrace$setregs(0x17, r6, 0x1, &(0x7f00000000c0)="ce2faeddd192dce1c8e1de021ef3ecbeac97552c9d5c1a6a5f9b42565de6dbdd0c8790c7c97c58b2609c0db1d5b22c63b5bf1ea4cd470f896c60f0bf5c3be2befde6202c6338efb5e0b0") r7 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r7, &(0x7f0000000000)={'#! ', './file0'}, 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r6) close(r7) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r6, 0x0, 0x0) [ 583.983991] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=9429 comm=syz-executor.3 [ 584.032103] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=103 sclass=netlink_route_socket pig=9429 comm=syz-executor.3 [ 584.088174] protocol 88fb is buggy, dev hsr_slave_0 [ 584.093344] protocol 88fb is buggy, dev hsr_slave_1 16:50:12 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x84, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:12 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) accept(0xffffffffffffffff, &(0x7f00000000c0)=@generic, &(0x7f0000000040)=0xd62b) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f00000002c0)={[0x20, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_SET_CPUID2(r5, 0x4008ae90, &(0x7f0000000880)=ANY=[@ANYBLOB="03000000000000000000000000080000068c8a96a1cd392bb4af8ec298c4828aa7403c5257161e06501cdd7a688198e165"]) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) close(r2) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@ccm_128={{}, "d1f3c9bae2b1a916", "12a3ed6657b71f3901d44a0d10866daf", "84d65d28", "7bd04ba5af72fe41"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:12 executing program 0: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000001780)='./file0\x00', 0x0, 0x0) fchdir(r0) open(&(0x7f0000002bc0)='./file0\x00', 0x40c2, 0x0) truncate(&(0x7f0000001740)='./file0\x00', 0x4) 16:50:12 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x2, 0x141) ioctl$VFIO_IOMMU_MAP_DMA(r1, 0x3b71, &(0x7f0000000100)={0x20, 0x0, 0xab0, 0x9, 0x34}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f0000000000)=ANY=[@ANYBLOB='\n\x00'/12], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r3) close(r4) r5 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) ioctl$FS_IOC_GETFSLABEL(r5, 0x81009431, &(0x7f00000002c0)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 16:50:12 executing program 4: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="2321202e2f09006c65300a6562657ee06046b07aa8ac89699606b3ef6d4fdf6edb3ff67075915e75cbcaab89f185c6734c1051601f28561d1ad012e0243f5bc08896cd5a7807045a33adf6a248c642d82c136d8db54b884a5633d675d1f1dc3218580999586481c592118e0490c19173d611"], 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) [ 584.183489] audit: type=1800 audit(1571503812.032:1786): pid=9515 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.0" name="file0" dev="sda1" ino=16673 res=0 [ 584.280636] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=132 sclass=netlink_route_socket pig=9542 comm=syz-executor.3 [ 584.328125] protocol 88fb is buggy, dev hsr_slave_0 [ 584.333298] protocol 88fb is buggy, dev hsr_slave_1 [ 584.345651] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=132 sclass=netlink_route_socket pig=9542 comm=syz-executor.3 16:50:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x7c4, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:14 executing program 4: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='#! ./fila0\n'], 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getcwd(&(0x7f00000000c0)=""/8, 0x8) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000000105042, 0x0) write(r4, &(0x7f0000000200)="fdf01ae741043030219708b2e9a22414e8d9058cf44eecab83b2d28ce64965047f8122da91f2e47e046e9fc35c2d106b78bb06f5b13160ed8a0a91995e8bbea8ac66f5be7c659e654eb9a9efdeefbc8d4a0fcd31a782ec5ae3041b5f8e3a500e264144e3a5619c3a4a9f4cb16916f8910013ffc1345747a696f594e72965e81a225914af246f9a4584f20ec6b6135a9e5632230520a7bc370d9291675212ad7eb5673a1c4d7d03c415df3aab729ca15c3322d4b94626a6e508f5f2adf8f408b6799166f31c4e87ccdc3189b590ffba8b409111c7f6d36aae697d578d8024684647314eb25ee33f8392b42e5ecef3b52e19ebf6f1028cb8dcc54a11dd11b8adbb532b99d457453fbe3277a0c98672a9566c339311a4c007a143106f15054e01cafdcf6f9c6a17fb9ca3362a3a01cfedc8dbfe8bffa12dd17ba0be258156d1b4ef6f136711e49103776540bb986882aba0b7cff4e0102b105f9bea091a1b037373fcdc9f1fadfa9d21ff8f42156f74694d55058084ad477ce6c8bf47641c64d1cfe008025d87e5a02d3eba8d253e30062bdc7fe046bd590131d17ccc73a5ea27c8fb4bf752965f16301176416f440d11db988ad92726c693c5aa5b3ca28bc31ced72d0f4d12cb03fb261fe08e79e78f7aad21dc40cd694ec6e2bcb97be1c67fe59a6564924aaaa280aa94e04b9cb05bb8a0325a5d65f16cd0f8f09286a07382dce", 0x1ffe00) ioctl$BLKPG(r4, 0x1269, &(0x7f0000000080)={0x6, 0x0, 0xc9, &(0x7f00000002c0)="8a3db738079587919fb1624334c31ee93bf8ef91c919077cf1623c1a9e9c277bab1376fc09a1df576078adda20404f8752c6c2d0a362b90c10abf339a84e82347fe7495073a16ff939f71c09b35337ad87e78e3e92890f1bf612bb59b5235224ce8811bd41a4ef465d54a9f975f1b608116976ea8a43c4b0cf5ccef2505781f6558235e307f4c1079c1a663dda5b99c866fb605a1d23cb6ab210e14ebbccf867ecfb82ddbb557ca6e24d5b2896b7f6de34db31629f089606db0c9681db74813df8d535d3eac4715eb9"}) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:14 executing program 0: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0'}, 0xb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNGETFILTER(r5, 0x801054db, &(0x7f0000000040)=""/35) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:14 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_G_STD(r5, 0x80085617, &(0x7f0000000100)) ioctl$KVM_S390_VCPU_FAULT(r0, 0x4008ae52, &(0x7f0000000400)=0x3) setsockopt$inet6_tcp_int(r3, 0x6, 0x1, &(0x7f00000000c0)=0x100000001, 0xfffffffffffffff7) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x2001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000540)={{{@in=@multicast1, @in=@multicast1}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000340)=0x25) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r8, 0x84, 0xe, &(0x7f0000000140)={r9, @in={{0x2, 0x0, @multicast1}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1]}, &(0x7f00000000c0)=0xffffffffffffff6b) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000300)={r9, 0xffc0, 0x22a, [0x0, 0x3, 0xeb, 0x3ff]}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r11, 0x6, 0x1d, &(0x7f0000000380)={0xffffffff, 0x7ff, 0x2, 0x7, 0xbf8f}, 0x14) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) 16:50:14 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x80000000, 0x2) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f0000000100)={'#! ', './file0', [{0x20, 'l$\xe0\x9b\x0f\xef!\f\xbd]Z\b\xd7\xc3\xa1\xc6\xf1YPk\xf2\xc3\xbb\xc4\xe3S\x8d\x80\xd0\rKkp\xa2\xd9}\xbc\x8c\x98\xf2d\xc6\x862Ux]`%x\fR*\x86\x8e$\xa1\x0e\x9f\x14\x85\xfa\xcd\x00\xb1HU\x8e\xd2w\x9b&Z\xbb\xa3\xa1\x8e\x03\x00Sq\xc9\xbf\b\x90\xf4\xc2B\'\x88\x1d\xd3L:\x13_\xccR\xee!'}]}, 0x70) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r3) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 16:50:14 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$kcm(0x10, 0x3, 0x10) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e000000260005001900e0713c444d240c000000100006400a0001000200000037153e370900040002000000d1bd", 0x2e}], 0x1}, 0x0) r4 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() r6 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r6, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) r7 = socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r5) close(r6) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = getpid() getresuid(&(0x7f0000000140), &(0x7f0000000240)=0x0, &(0x7f0000000380)) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r11}], {0x4, 0x1}, [{0x8, 0x6, r12}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r14}], {0x4, 0x1}, [{0x8, 0x6, r15}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) getgroups(0x3, &(0x7f00000003c0)=[0xee01, r12, r15]) r17 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/dlm-control\x00', 0x81002, 0x0) r18 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r18, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r19 = dup3(0xffffffffffffffff, r18, 0x80000) r20 = openat$zero(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/zero\x00', 0x4caa80, 0x0) clock_gettime(0x0, &(0x7f0000000a80)={0x0, 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r24 = dup(r23) ioctl$PERF_EVENT_IOC_ENABLE(r24, 0x8912, 0x400200) ioctl$VIDIOC_QBUF(r4, 0xc058560f, &(0x7f0000000ac0)={0x5, 0x3e92e44e2a30837c, 0x4, 0x20, {r21, r22/1000+30000}, {0x5, 0x0, 0x6, 0xc1, 0x1f, 0x89, "dad930b0"}, 0xe4, 0x1, @fd=r24, 0x4}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r27 = dup(r26) ioctl$PERF_EVENT_IOC_ENABLE(r27, 0x8912, 0x400200) ioctl$VIDIOC_EXPBUF(r27, 0xc0405610, &(0x7f0000000b40)={0xa, 0x5, 0xa9, 0x4800, 0xffffffffffffffff}) r29 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/autofs\x00', 0x200000, 0x0) r30 = accept4$llc(0xffffffffffffffff, &(0x7f0000000bc0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000c00)=0x10, 0x80800) r31 = socket$bt_rfcomm(0x1f, 0x3, 0x3) r32 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/kvm\x00', 0x40000, 0x0) r33 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r33, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r34 = syz_open_dev$dri(&(0x7f0000000c80)='/dev/dri/card#\x00', 0x2, 0x828c1) r35 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000cc0)='/dev/dlm-control\x00', 0x8000, 0x0) r36 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/qat_adf_ctl\x00', 0x100000, 0x0) r37 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r38 = getpgid(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000012c0)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000013c0)=0xe8) r40 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r40, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) fstat(r40, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001480)=0x0) r43 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r43, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r44}], {0x4, 0x1}, [{0x8, 0x6, r45}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) r46 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r46, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000940)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r47}], {0x4, 0x1}, [{0x8, 0x6, r48}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) r49 = socket$alg(0x26, 0x5, 0x0) r50 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r50, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r51 = socket$bt_rfcomm(0x1f, 0x3, 0x3) fstat(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r53 = getgid() r54 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r54, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r55 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r55, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r56 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r56, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r57}], {0x4, 0x1}, [{0x8, 0x6, r58}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) r59 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r59, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r60}], {0x4, 0x1}, [{0x8, 0x6, r61}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) r62 = accept4$inet(r6, &(0x7f0000001540)={0x2, 0x0, @initdev}, &(0x7f0000001580)=0x10, 0x80000) r63 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r63, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r64 = socket$netlink(0x10, 0x3, 0x12) r65 = openat$vnet(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/vhost-net\x00', 0x2, 0x0) r66 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r66, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r68 = dup(r67) ioctl$PERF_EVENT_IOC_ENABLE(r68, 0x8912, 0x400200) ioctl$VIDIOC_DQBUF(r68, 0xc0585611, &(0x7f0000001640)={0x1, 0x5, 0x4, 0x4, {0x77359400}, {0x2, 0x28cb1f4f83c865ce, 0x1, 0x1, 0x0, 0x3f, "048268cf"}, 0x43, 0x2, @planes=&(0x7f0000001600)={0x1, 0x0, @fd=r6, 0x1f}, 0x4}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r71 = dup(r70) ioctl$PERF_EVENT_IOC_ENABLE(r71, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r6, 0xc00c642d, &(0x7f00000016c0)={0x0, 0x80000, r71}) r73 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r73, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r74 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r74, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r75 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/rfkill\x00', 0x220400, 0x0) r76 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/btrfs-control\x00', 0x1, 0x0) r77 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r77, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r78 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r78, 0x80045300, 0x0) r79 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r79}) r80 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r80, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r78, @ANYBLOB="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", @ANYRES64=r79]) ptrace$getregset(0x4204, r79, 0x0, &(0x7f0000000340)={0x0}) r81 = geteuid() getresgid(&(0x7f0000001b00)=0x0, &(0x7f0000001b40), &(0x7f0000001b80)) r83 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r83, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r84 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r84, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r85 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r85, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r86 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r86, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r87 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001bc0), 0xc) r88 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r88, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r89 = creat(&(0x7f0000003040)='./file0\x00', 0x80) r90 = socket$xdp(0x2c, 0x3, 0x0) r91 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r91, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r92 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000003180)='/dev/rfkill\x00', 0x10000, 0x0) r93 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r93, 0x80045300, 0x0) r94 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r94}) r95 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r95, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r93, @ANYBLOB="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", @ANYRES64=r94]) ptrace$getregset(0x4204, r94, 0x0, &(0x7f0000000340)={0x0}) stat(&(0x7f00000031c0)='./file0\x00', &(0x7f0000003200)={0x0, 0x0, 0x0, 0x0, 0x0}) r97 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r97, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r98}], {0x4, 0x1}, [{0x8, 0x6, r99}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) r100 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r100, 0x80045300, 0x0) r101 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r101}) r102 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r102, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r100, @ANYBLOB="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", @ANYRES64=r101]) ptrace$getregset(0x4204, r101, 0x0, &(0x7f0000000340)={0x0}) getresuid(&(0x7f0000003280)=0x0, &(0x7f00000032c0), &(0x7f0000003300)) r104 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r104, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) fstat(r104, &(0x7f0000003340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r106 = open(&(0x7f00000033c0)='./file0\x00', 0x200000, 0x4) r107 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r107, 0x80045300, 0x0) r108 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r108}) r109 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r109, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r107, @ANYBLOB="0a1ccea8e34a80262b913abc1d92bfd832dae67e15689fbf693203011419b8d02e6d41365af2072aeae0bf538fe954c7edae1266666e87244ad48840ae55f6eebda217952f2cd5d45d9708acca471f5fd430138f0a1635a4c181328c9ebf9a985b62cb8de86957f84d1256b736d4332b0ee2ee517a799950bfdfc0e2b37ff35447e661e0f3757f00009be013ed275303000000fc54c0cdfef9254141baebc3de2d11a21e6977763379060c2d14ce1e95267baf83244ed087a8333dbc0cc84e0d06e154c21ad4f0fd05b40c754200000000d92481f6d2891e55f43339c833854af66d8c9ff93afe1c8a253ad3352ea052e294fb47be373e3d3f934e877ae879ee57cfad0da7880acf68d78eb5805dde3c8815e26ac500c53182dd92ca9127b7e7a173f6dd11920c736f0cf10dd58ca3d6506f96a582a00e40c1f2792e344c30e04be9f44119416b74492b0ee68250a5863c29e7eccfcf5555cc027aa54d6019698c0a9ee5fbe3049134622ec4fb380480abdd4d4f23c085af6e3b2c2e4e799305a2ca553944e29527e2257f90c03607358ca8e6d77fe3caa9f7a4356616e9ad3621137366d1aa64da35661239d180530b5e93a52f08eda2457b819675bd1d8c85e1e954c75a6794b5f4010101e960bd93c8ea65649122360be98e863f816f5b95f6737d0631f9d2e7c24986dc5cb389c4f7d153c57d4c941b2fc54e360613dc38188636143f64ded2601987b3a6", @ANYRES64=r108]) ptrace$getregset(0x4204, r108, 0x0, &(0x7f0000000340)={0x0}) stat(&(0x7f0000003400)='./file0\x00', &(0x7f0000003440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r111 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r111, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r112 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r112, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) sendmmsg$unix(r7, &(0x7f00000035c0)=[{&(0x7f00000001c0)=@abs={0x2, 0x0, 0x4e20}, 0x6e, &(0x7f0000000040)=[{&(0x7f00000002c0)="c753487c0afa4123a3dabbb50dd008f6713cea632a01c912656fd0969788d4672f9d29c40338c2dd580925d1a149a0a83a0882524a45b6815485c69a8d89f43ae5cfa88131582890cb98ef2ae40f68bab67ab6b9c648dfdab563433d5e925230dbc8ebd1a000df7f95ce63d851e2a02f20c1925b3e76a91a401b662f9f68182895bfbc2b0c1c963d6f", 0x89}], 0x1, &(0x7f0000000400)=[@cred={{0x1c, 0x1, 0x2, {r8, r9, r16}}}, @rights={{0x14, 0x1, 0x1, [r3]}}], 0x38, 0x4040}, {&(0x7f0000000440)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000000500)=[{&(0x7f00000004c0)="3031bebe", 0x4}], 0x1, 0x0, 0x0, 0x4000}, {&(0x7f0000000540)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000008c0)=[{&(0x7f00000005c0)="ab76014515eda1131a2bf96b74676e860e710b0fbae1e9ba997a0274ee112f979883194e2d1bbf058965", 0x2a}, {&(0x7f0000000600)="cbda193e965e524c8e6584deed35d01e7d59e66947c584e5e77a1a8177f5ac94424e29e7ab7b38f9f9d0ea3b4e2301975fb4ceaddf1106568e841555c1d1aa6b0ca7806b0ada6daebb61396b2981d69aa6e64558365da692933e41e2bcecb73c858355150314c2457f66e09e0afb117e9ccb0fefd230e3292c46ffebffaaed255b949aa39e90713d34214f5902f09396104307e77308718fb9d6a093d4c05df5b4c2faa680f2b6dc305dc55b34", 0xad}, {&(0x7f00000006c0)="8e331e773721557777be082168576b37c00f328e2b16cb78df250c3f23a522d197889d8fcc9e147da1a3456864c8e34ad3a85ffbe9e5e9cd33a30499968a10b9269891c50b3d7e37911ccc9e6b7fb10fc86459ece8f4ae71a9bfdf53f389bf54f283e08f92f84d8bac6269592b8e67ab3c03333aeb471b4f365f97c4e3e4186e06f182c2abc92d3936bc3297937a11bec90c9fcf13f0bb9d", 0x98}, {&(0x7f0000000780)="8c73faeec8eb7449cf3dc211dc0dbea873", 0x11}, {&(0x7f00000007c0)="2bd9c68f43d04af8a90c0d0eaf0943e0c233860aba2ab60af4ca090cd415871d0bbfc7136f62da085f66257cdde70327c5362e82be37fee335af2ec255ef242d508d922b001685323c2d8dffe2675f68fcad482bfd205f802798f53505c46fa282e584cb1504ef50beb052060add0ca2895200d6b791cfd58ce80fd1a14fec4c0550e6df67760864490ececfbf6292a26f410d80fd5e851a0d4225655e1c2e8254dcc1ec7dac74f1277d8da0eb8edc99be5f614794f018256d2f8ff37d9f14e3c0bedeb4a5d72539f342555af543f073b7b867aea93b305c08f14a7ac2be4f587fdd8c00f3ceba840f22f056ad9908", 0xef}], 0x5, &(0x7f0000000d40)=[@rights={{0x28, 0x1, 0x1, [r17, r19, r20, r0, r7, r25]}}, @rights={{0x18, 0x1, 0x1, [r28, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [r29, r30, r6, r31, r32]}}, @rights={{0x2c, 0x1, 0x1, [r33, r34, r35, r36, 0xffffffffffffffff, r37, r7]}}], 0x98, 0x20000000}, {&(0x7f0000000e00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001240)=[{&(0x7f0000000e80)="64efc2c4775b5fb6c350c2ea9312d3b80eba3f7c16b03be14930ac44e13ccc91c040ca08c9d5", 0x26}, {&(0x7f0000000ec0)="488e067552d25adef13f518954296c", 0xf}, {&(0x7f0000000f00)="37a94f7fe87aa5f6201e150a7491e3aacdcfe52ab90b6b465d91e1d26f405b3567152095f905ad6c7d6d6970f1e5b6470eb8a68ce3247062f6c59595efde2c5d8d9d0484926e38580a7e6f060c14e765c50ef8aa025c42e9da622ae77169f0bd78a6cf5fd11ceac1ba041a9e93f1d48e6f94179402193b1a1b67d519eac5b0b2db38349af9cc837a7a474e237f46cfd732212bdab43e84ec94444bcc09eb4e4651e3e009306146198a364180f8a045f6774a8383505f64023bc77c4476f71c787f1ff873971f6b3b26c4f1115238c2b6a03edb8856c4889f0682ed1eacae47aebcc347bd01ff9e0e", 0xe8}, {&(0x7f0000001000)="726f827e9a620e5adc02fad50f767f33077cf33684b6fa993ce8523d9e90ac980fe558e8104d212693eaad7be1e6adf8dade0af728b86d9f4b5ea484d8ca7b3da64d4f000e6e4f", 0x47}, {&(0x7f0000001080)="942b0c1cd9230a8334871e93737b3fb89b918b0da5ab15cd0cb2e5ecfcfdf01511b078b55f93681747c93bc5b9b313bc58392ce1551fc5ecc489c645fd673e8822ab72979e4715c368c2bcd6238a4504089dadaef5fe1e09cd7b9c0e6ba10e516c64f9d0bb7219d7c293f903c2f075af3540133066e3f7727df5055716bff455c6969bf14b41752ba610b5e2c47c53ec72", 0x91}, {&(0x7f0000001140)="5ba6f6084c27dfdb30f418cfbf8b918b94df4899a9e51bc14673e50cc2922c5e065b3ded86f8c03329cf2f0fff2b0f311762588eefd579faa5b856c7415d023695ebd41c46d36238a942e3bffcd4705d5af12741a2923b9c00544df8d9703f58410dae9e2ecde1bbcb41585a19e301ee7bb61ff07dfc45f0ab1b28c0d15e33d5f1025719cbc28e93e546d51daadae21462ce172704f5e98e3c7be56aba08d197cb6907fafaf2970babe36d1e289f97bec3278e0648faf1db66936043368e28e0010f39fa7aafd1747cb06d69746b9372448bedfc362a093a13ef347c8ac56f7740c27e2ebf285907fb6cf2d2f11e1a765a", 0xf1}], 0x6, &(0x7f0000001700)=[@rights={{0x14, 0x1, 0x1, [r7]}}, @cred={{0x1c, 0x1, 0x2, {r38, r39, r41}}}, @cred={{0x1c, 0x1, 0x2, {r42, r44, r48}}}, @rights={{0x34, 0x1, 0x1, [r1, r1, r1, r0, r0, r49, r4, r50, r51]}}, @cred={{0x1c, 0x1, 0x2, {r5, r52, r53}}}, @rights={{0x2c, 0x1, 0x1, [r0, r6, r3, r54, r55, r3, r3]}}, @cred={{0x1c, 0x1, 0x2, {r5, r57, r61}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, r7, r62]}}, @rights={{0x30, 0x1, 0x1, [r63, r64, r65, r66, r2, r7, r69, r72]}}], 0x150, 0x4}, {&(0x7f0000001880)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000001a40)=[{&(0x7f0000001900)="76e4172dbdfe3d4f519fdd070056503a8bf16dcd92543d0f43a80c2b8b9cb6f97eafb522f7a4fe29c6c21b4b83d82f146dfeeb5800b4b6876b05c819db3b9207060be9c3034542874cf5aa6e09dc2de0e64cff07f17d05c80ef2557bcab5f750d9b1836a", 0x64}, {&(0x7f0000001980)="d9b03f04d56a666847bbc9bf5d084f5b316ad69d857980e688cc86bb5875d781b36ca2fb691c641c39b0a46579e58ec7361db51090c4ef9433518e7e1f09a5e4dda07f68c600d98a353f0b07a9b88bc181ae8ae39fd007ac5a8b400529dff489d588f4ca620a328bd2c6924bb57f497b3c846fd161002c70ecf35bc78c2c1885a301f3578f117f9c059ff9020b541fc6a1844aeecb6868d9687be84b", 0x9c}], 0x2, &(0x7f0000001c00)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, r73, 0xffffffffffffffff, r1, r74, 0xffffffffffffffff, r3, r75, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r76, r77]}}, @cred={{0x1c, 0x1, 0x2, {r79, r81, r82}}}, @rights={{0x2c, 0x1, 0x1, [r83, r6, r84, r85, r86, r87, 0xffffffffffffffff]}}], 0xa0, 0x4000840}, {&(0x7f0000001cc0)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000002fc0)=[{&(0x7f0000001d40)="fd595c74f2a6b7b125c777bb12194352c2901aaa637d16f6bb5d8576864a19e3c7aa546501021d1ef13dd49f6ef5d11f8ba6eb611bcba739270c7a972330afaf6a50393f4d6501d760df231ad86140547cfa5795e1d85b24bf1a8c907634e6a01bdbd0f9579a103a892812fe71aa842768250c70034116752359d959", 0x7c}, {&(0x7f0000001dc0)="6f40d115629701b5a8b07651a6ee9feb295ea58a6df629bc842e437b3160a2687589530ee6aa5e811de3a801e1f3564ab16022689035171db15e7ea3baeb", 0x3e}, {&(0x7f0000001e00)="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", 0xfd}, {&(0x7f0000001f00)="92be46e6522f2ac19a1181ed26c36add8b89e995203638f120f779fd6fa889acf15c9cb6a24cc346bdf282073fe05503b4415e9851620732645e04e0cb804f43e24cae34fb26125d3be3e8e0940d0cd814736ad77d3d048e60c97bb793742a8ed1d4b9852fdcac831fe0ae7c9552b0f68403a0e595ceb2359dc6", 0x7a}, {&(0x7f0000001f80)="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", 0x1000}, {&(0x7f0000002f80)="de646b9b4d79e1cff4aa5b0ad932a465ca718a7b2437285c664ef181fe449f38a4991ef2f84d138f", 0x28}], 0x6, &(0x7f00000034c0)=[@rights={{0x2c, 0x1, 0x1, [r88, r89, r90, r91, r92, r0, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r94, r96, r99}}}, @cred={{0x1c, 0x1, 0x2, {r101, r103, r105}}}, @rights={{0x18, 0x1, 0x1, [r1, r106]}}, @cred={{0x1c, 0x1, 0x2, {r108, 0xee01, r110}}}, @rights={{0x28, 0x1, 0x1, [r111, r112, r1, r2, r7, 0xffffffffffffffff]}}], 0xd0, 0x20000001}], 0x6, 0x40) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) [ 586.589181] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1988 sclass=netlink_route_socket pig=9684 comm=syz-executor.3 [ 586.618732] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1988 sclass=netlink_route_socket pig=9684 comm=syz-executor.3 16:50:14 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0x8, 0x2, 0x3, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r3, 0x80045300, 0x0) r4 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r4}) r5 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r5, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r3, @ANYBLOB="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", @ANYRES64=r4]) ptrace$getregset(0x4204, r4, 0x0, &(0x7f0000000340)={0x0}) r6 = getpgid(r4) sched_getaffinity(r6, 0x8, &(0x7f0000000340)) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r7 = gettid() r8 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r8, &(0x7f0000000000)=ANY=[@ANYBLOB="23212062bfc573ccda48ae"], 0xb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) sendmsg$FOU_CMD_DEL(r10, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="000429bd7000ffdbdf2502000000"], 0x1c}, 0x1, 0x0, 0x0, 0x26022934}, 0x40000000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r7) close(r8) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r7, 0x0, 0x0) 16:50:14 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000100)='./file0\x00', 0x7fff, 0x3, &(0x7f0000000200)=[{&(0x7f00000002c0)="41151cc831abfc28be7f69e1dda02e953f163de6ae4733bf55c8af3dd13cfae189156a7ad30aefb4b20d54b0bff6ff8e028ac4d3740caf20895cbd55614cd1f180c73c4249ffe52197173b6329eb746f566eefdb3f7e52e71254420ea37119fce2591f886c05161cd0acff5a31b465f24937def0861e9ea605d43d55fbc6703e0113aef434964548ddddf1a83f9ccb28c5f62227cb941d2ef2dad66ac29da48c5c3fbdf8081902b8538ab2796280e5ba88839d030093e096774a98df9ac671bd84b1bdd730f24ce560", 0xc9, 0x400}, {&(0x7f0000000140)="bfd7e1718132a063e68358e12bec0fe98871277bef52f56aef", 0x19, 0x80}, {&(0x7f00000001c0)="47b3af834b3e9b44a5d566a32e0e0fae03e400e39a9c571f0a52ff0f4f3271fac1a89d9b509201e425623663bd", 0x2d, 0x5}], 0x2000, &(0x7f0000000740)=ANY=[@ANYBLOB="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"]) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r4, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000001d80)={'syz', 0x1, 0x2e}, 0x0) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000440)={r4, 0x45, 0x5a}, &(0x7f0000000480)={'enc=', 'oaep', ' hash=', {'sha3-384-ce\x00'}}, &(0x7f0000000500)="105003b92af0042a680f31c90d8d3c4339547664072da3dd1e0b2d6975240cea773030670ccd2ea490c00f88c20280c256b036274431977b451d37db33e1b310177518d363", &(0x7f0000000580)="d439e0f2966bea667b72704fe7411c05ba38f71fea0eaeb5f76cc0ae84c87c6c020f5785979f36f41a4a9a1d114e56202d88c60a172d12e95d5ed29c09c153c0f6f557d816158be4775d44b7cf3b0b385dfa4f196a9a8b01bd7a") prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) [ 586.688095] netlink: 'syz-executor.1': attribute type 6 has an invalid length. 16:50:14 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8, 0x9c3cadcd58386db5) 16:50:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x2, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 586.755794] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 16:50:14 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="2321202e2cfe001700000000"], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = shmget(0x0, 0x4000, 0xa04, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_UNLOCK(r4, 0xc) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r6}], {0x4, 0x1}, [{0x8, 0x6, r7}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@initdev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000040)=0xe8) r9 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r10}], {0x4, 0x1}, [{0x8, 0x6, r11}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$TIOCGSID(r13, 0x5429, &(0x7f0000000100)=0x0) r15 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r15, 0x80045300, 0x0) r16 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r16}) r17 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r17, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r15, @ANYBLOB="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", @ANYRES64=r16]) ptrace$getregset(0x4204, r16, 0x0, &(0x7f0000000340)={0x0}) shmctl$IPC_SET(r4, 0x1, &(0x7f00000001c0)={{0x657, 0xee01, r7, r8, r11, 0x1, 0x80}, 0x1, 0x7, 0x7, 0x3c, r14, r16, 0x5d}) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:14 executing program 4: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$void(r5, 0xc0045878) write$binfmt_script(r4, &(0x7f0000000000)=ANY=[@ANYBLOB='#! ./fi3e0\n'], 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r3) close(r4) ioctl$PPPIOCATTACH(r2, 0x4004743d, &(0x7f00000000c0)=0x4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 16:50:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x402, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:14 executing program 1: syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x40000) socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="2321202e2f66f40d0cb68163da945e8b6e696c6530200a"], 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r7, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000000)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x32, &(0x7f0000000140)={@ipv4={[], [], @multicast1}, r8}, 0x14) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:14 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(r4, 0x0, 0x3, &(0x7f0000000100)=0x5, 0x4) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r5, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) r6 = socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_tcp_TLS_TX(r8, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{0x304}, "b7555fff2341277d", "7d38585ede52ed05d9c9bcbed188b914", "63590235", "ca05f621e497d284"}, 0x28) sync_file_range(r6, 0x0, 0x80000000, 0x5) close(r5) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:14 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r3) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xc) mq_notify(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x34, 0x4, @tid=r5}) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r8}], {0x4, 0x1}, [{0x8, 0x6, r9}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) r10 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r11}], {0x4, 0x1}, [{0x8, 0x6, r12}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) r13 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r14}], {0x4, 0x1}, [{0x8, 0x6, r15}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) r16 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r16, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r17}], {0x4, 0x1}, [{0x8, 0x6, r18}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) r19 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r20}], {0x4, 0x1}, [{0x8, 0x6, r21}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) setgroups(0x8, &(0x7f00000001c0)=[r9, r12, 0xffffffffffffffff, r15, r18, r6, r6, r21]) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 16:50:14 executing program 4: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0'}, 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f00000000c0)=""/91, 0x5b}, {&(0x7f00000002c0)=""/197, 0xc5}, {&(0x7f00000003c0)=""/217, 0xd9}, {&(0x7f0000000200)=""/65, 0x41}, {&(0x7f00000004c0)=""/226, 0xe2}, {&(0x7f00000005c0)=""/184, 0xb8}, {&(0x7f0000000680)=""/172, 0xac}, {&(0x7f0000000740)=""/154, 0x9a}, {&(0x7f0000000040)=""/64, 0x40}], 0x9, 0x39) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x403, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:15 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) sync_file_range(r5, 0x5, 0xdc2, 0x1) bind$vsock_stream(r4, &(0x7f0000000040)={0x28, 0x0, 0xfffffffe}, 0x10) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) setsockopt$inet6_tcp_TLS_TX(r6, 0x6, 0x1, &(0x7f00000013c0)=@ccm_128={{0x304}, "9954ddecd634add1", "06c903aed7df98a498f22b0f7327c575", "ee9dd1ba", "089a578205b45a7f"}, 0x28) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x4, 0x80005, 0x20) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, 0x0) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) 16:50:15 executing program 0: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="23212023c5b6abfb1fbaa4"], 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$SCSI_IOCTL_GET_IDLUN(r4, 0x5382, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet6_dccp_buf(r5, 0x21, 0xe, &(0x7f00000002c0)=""/4096, &(0x7f0000000040)=0x1000) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:15 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x6, &(0x7f00000000c0)=0x400001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:15 executing program 4: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r2 = msgget(0x0, 0x208) msgctl$MSG_STAT(r2, 0xb, &(0x7f0000000380)=""/4096) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f00000002c0)={'#! ', './file0', [], 0xa, "0faf8ef74719b945e54411578e5cf1c5f1338dfb3e2b4ea76e9d32d20f5b84df94a7491b4ca79c7bec6a1ff5f82cedfa14823eb2d99a166c881ed95ff8cef29186501de76b07b74ed92a5276927380e8c9932e23031fb01d4ddbac44c3e16e7ba299110a96c0e0dd64407adfb8a20936855fc4e8051c6a3100b5cc50ac2ff74abc383c0c91269e797337d11f13bfb9"}, 0x9a) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r3) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r6, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8a1020}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r7, 0x10, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10020000}, 0x4000000) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 16:50:15 executing program 0: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0'}, 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) preadv(r1, &(0x7f0000000800)=[{&(0x7f00000000c0)=""/91, 0x5b}, {&(0x7f00000002c0)=""/197, 0xc5}, {&(0x7f00000003c0)=""/217, 0xd9}, {&(0x7f0000000200)=""/65, 0x41}, {&(0x7f00000004c0)=""/226, 0xe2}, {&(0x7f00000005c0)=""/184, 0xb8}, {&(0x7f0000000680)=""/172, 0xac}, {&(0x7f0000000740)=""/154, 0x9a}, {&(0x7f0000000040)=""/64, 0x40}], 0x9, 0x39) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:15 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x182141}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c012000", @ANYRES16=r2, @ANYBLOB="00022abd7000fddbdf250a000000080006000700000008000400040000003000010008000800000000000c0007000200000011000000080005000100000008000b0073697000080002002e0000001800030014000200626f6e645f736c6176655f3000000000001000000000000001000000080008000400000014000200696662300000000000db000000000000080008001f00000408000600ff7f00000c00030008000777961de46891a86000080005000000000008000800000200005800020008ba0002004e22000008000b0002000000080002004e240000080004008000a908e07e000008000e004e22000014000100ac141414000000000000000000000000080009000500000008000e004e24000008000d00010000ab9278a78e152e5b72b883c651"], 0x11c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4400a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = gettid() r6 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r6, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r5) close(r6) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) 16:50:15 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x404, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:15 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x405, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:15 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f00000002c0)={0x287d, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e23, @empty}}}, 0x108) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='C! ./file0q|'], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) epoll_wait(r3, &(0x7f0000000040)=[{}, {}, {}], 0x3, 0x200) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) [ 588.248191] net_ratelimit: 19 callbacks suppressed [ 588.248198] protocol 88fb is buggy, dev hsr_slave_0 [ 588.258308] protocol 88fb is buggy, dev hsr_slave_1 [ 588.488185] protocol 88fb is buggy, dev hsr_slave_0 [ 588.493274] protocol 88fb is buggy, dev hsr_slave_1 [ 589.048098] protocol 88fb is buggy, dev hsr_slave_0 [ 589.053340] protocol 88fb is buggy, dev hsr_slave_1 [ 589.368138] protocol 88fb is buggy, dev hsr_slave_0 [ 589.373289] protocol 88fb is buggy, dev hsr_slave_1 [ 589.378096] protocol 88fb is buggy, dev hsr_slave_0 [ 589.383391] protocol 88fb is buggy, dev hsr_slave_1 16:50:17 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f00000016c0)=@nat={'nat\x00', 0x19, 0x4, 0x14a8, [0x20000200, 0x0, 0x0, 0x20000b46, 0x20000ca4], 0x0, &(0x7f00000001c0), &(0x7f0000000200)=ANY=[@ANYBLOB="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"]}, 0x1520) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='\xe80\\a', 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "20110890", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_open_dev$midi(&(0x7f0000000580)='/dev/midi#\x00', 0x7, 0x8000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000680)="024a5a098b7c190db534aa925a23bf4ef745ea40e5dbbafd4a43fb715d8475a9d5320f0495797267537b3a3b2858849b5fe0a18885aa0302e48a633ee7f27f9feb898e44b78b661f031124c679e279ef270f0055f62b1e8b56d8c8d63a761889a48e941963ebd9912fe4933a4801e641c76f033d84c9bc8e62a7d3a582a90963a750d0fe3d41892f45959236ca56f3a4635c1066ca266cfa9c934b463a57b60ebd9267cfdb8b980085ad6200000000000000e269634581696c9e77e1d1f58841fbc7b9351a980dfd821a7e108795bb34c71f5585afd179825afbe028e38a47dd", 0xfffffffffffffe82) r3 = fcntl$getown(0xffffffffffffffff, 0x9) sched_setscheduler(r3, 0x3, &(0x7f0000000100)=0xfb) r4 = gettid() r5 = creat(&(0x7f0000000280)='./file0\x00', 0x1) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$RDS_CANCEL_SENT_TO(r7, 0x114, 0x1, &(0x7f0000000480)={0x2, 0x4e22, @empty}, 0x10) write$binfmt_script(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="110300000004000a"], 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r4) close(r5) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) r8 = getpgrp(r4) r9 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/attr/exec\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r9, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = accept4$inet6(r11, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c, 0x800) kcmp(r4, r8, 0x2, r9, r12) 16:50:17 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40100, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000100)={0xf, 0x1f, 0x1, 0x9}, 0xf) close(r3) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:17 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f00000002c0)={0x287d, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e23, @empty}}}, 0x108) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='C! ./file0q|'], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) epoll_wait(r3, &(0x7f0000000040)=[{}, {}, {}], 0x3, 0x200) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x406, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x407, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:18 executing program 4: socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'kw(khazad-generic)\x00'}, 0x58) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="024a5a098b7c190db534aa925a", 0xd) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0'}, 0xb) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r4, 0x80045300, 0x0) r5 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r5}) r6 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r6, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r4, @ANYBLOB="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", @ANYRES64=r5]) ptrace$getregset(0x4204, r5, 0x0, &(0x7f0000000340)={0x0}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r5, 0x10, &(0x7f00000000c0)={0x4}) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000040)) 16:50:18 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000004c0)='//exe\x00\x00\x00\x00\x00\x00\x00 \x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r5 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000500)=ANY=[@ANYBLOB="000000000000000026020000120000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001080000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a00"/705]) write$binfmt_script(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="232120cf7ac90701a5bc4a0671e15a137a329012c6510358750e3b837557a4e9f01bf98a45f55feca714ff47a8a73f7eca463db5aca83a504eab05b8578003ef897bb94cc058c4a491a8570252330f09ae87ded9ca0a1c2a1f1e928a379c283ddde70a49b66ff22d4ee44a5c9cb41e59bdf5fda4152463c6ba0065fe77b7094359ce34fe645821808d9add3521ce8d04fd536dec58a46a9737ba6403cb62550e67993254f84b0acfd83838f38367e1a7afa699a3fdcfcd4e81642b0c9e7a882f26c32d6175688a80f4b9610d6a3af28940980b4e532ec698337041c0d3bc8d24fd39e9ec2314315c06996b81"], 0xfffffffffffffe46) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r8, 0x84, 0xe, &(0x7f0000000140)={r9, @in={{0x2, 0x0, @empty}}}, &(0x7f00000000c0)=0x100) getsockopt$inet_sctp_SCTP_STATUS(r7, 0x84, 0xe, &(0x7f00000001c0)={r9, 0x44af, 0x8, 0x8001, 0x1, 0x7ff, 0x401, 0x8, {0x0, @in6={{0xa, 0x4e22, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}, 0x0, 0x5, 0x100, 0x1000, 0x401}}, &(0x7f0000000000)=0xb0) r11 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r11, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f0000000800)=ANY=[@ANYBLOB="01ec000021855df2f91bb4122fb2825217c29a45bde834056d9c85c23477a4870c5537c60a069ec202a49b773392859e09bd354d1efcbd14f3a4901a3869eed62067f6c144246453c460820ef66dd842019c3c2724ed0e7eef630acf8e2d360ecf1a4286c48c", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r11, 0x84, 0xe, &(0x7f0000000140)={r12, @in={{0x2, 0x0, @empty}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, &(0x7f00000000c0)=0x100) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f00000002c0)={r10, @in6={{0xa, 0x4e21, 0x401, @mcast1, 0x9}}}, 0x84) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r13 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r13, 0x107, 0x1, &(0x7f0000000140)={r14, 0x3, 0x6, @random="08f00793e142"}, 0x10) ioctl$sock_SIOCGPGRP(r13, 0x8904, &(0x7f0000000100)=0x0) ptrace$setopts(0x4206, r15, 0x0, 0x50) 16:50:18 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f00000002c0)={0x287d, {{0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x4e23, @empty}}}, 0x108) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='C! ./file0q|'], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) epoll_wait(r3, &(0x7f0000000040)=[{}, {}, {}], 0x3, 0x200) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:18 executing program 4: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='#! ./fine0 \n'], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:18 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f0000000000)={'\x00', './file0', [{}]}, 0xc) r5 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r5, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000001d80)={'syz', 0x1, 0x2e}, 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r7 = openat$cgroup_int(r6, &(0x7f00000000c0)='io.max\x00\xe3\xc6\xa1\xbc\x16\x94p`R\xfbqcm\xab\x87\xf6\xb6y1uoG\x18\xd4\xc8*R6\x84\xfb\xfbU0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40100, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000100)={0xf, 0x1f, 0x1, 0x9}, 0xf) close(r3) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:18 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4e24, 0x0, @loopback}, 0xffea) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:18 executing program 4: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='#! ./fine0 \n'], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x408, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:18 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40100, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000100)={0xf, 0x1f, 0x1, 0x9}, 0xf) close(r3) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:18 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RREADLINK(r1, &(0x7f0000000040)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SCSI_IOCTL_START_UNIT(r5, 0x5) r6 = gettid() r7 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r7, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x0, 0x800, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r6) close(r7) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) openat(r11, &(0x7f00000001c0)='./file0\x00', 0x205334949386398, 0x1d6c223a9059687e) bind$nfc_llcp(r9, &(0x7f0000000100)={0x27, 0x1, 0x2, 0x3, 0x0, 0x1, "7a06b3539ed50fb81c743b0b0314c79ed7555c77d7bc8850ea4321afbd17884923a136cffe2cc8d561325abf927e2121a7d18c81cc18164daad3d69dabb95d", 0x8}, 0x60) ptrace$setopts(0x4206, r6, 0x0, 0x0) 16:50:18 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x409, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:18 executing program 4: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='#! ./fine0 \n'], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:19 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40100, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000100)={0xf, 0x1f, 0x1, 0x9}, 0xf) close(r3) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:19 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x80000, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r6 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r6, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) ioctl$FICLONERANGE(r5, 0x4020940d, &(0x7f00000001c0)={r6, 0x0, 0x0, 0x100000001, 0x400000000000000}) r7 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$RTC_WKALM_RD(0xffffffffffffffff, 0x80287010, &(0x7f0000000100)) ioctl$MON_IOCT_RING_SIZE(r7, 0x9204, 0xa2d19) 16:50:19 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0xe, &(0x7f0000000140)={r5, @in6={{0xa, 0x4e21, 0x9, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7f}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, &(0x7f00000000c0)=0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000040)={r5, 0x65b}, &(0x7f0000000140)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r6 = gettid() r7 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r7, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r6) ioctl$KDSETMODE(r1, 0x4b3a, 0xdae) close(r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$sock_inet_SIOCGARP(r9, 0x8954, &(0x7f00000001c0)={{0x2, 0x4e21, @multicast1}, {0x0, @broadcast}, 0x2, {0x2, 0x4e22, @rand_addr=0x7f}, 'syzkaller0\x00'}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r6, 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000100)=ANY=[@ANYRESHEX]) 16:50:19 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='#! ./file2 \n'], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:19 executing program 4: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000100)={'#! ', './file0', [{0x20, '\x92&`J[\x7f\x86\xb3R@\xbc\x0e\x98\xf4J\x92\xc2\t\x9d\x93\x1dV\xb2p\x0e\xf9\xf1\xf9\xff0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000100)={'#! ', './file0', [{0x20, '\x92&`J[\x7f\x86\xb3R@\xbc\x0e\x98\xf4J\x92\xc2\t\x9d\x93\x1dV\xb2p\x0e\xf9\xf1\xf9\xff0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:19 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e22, 0x101, @dev={0xfe, 0x80, [], 0xd}, 0x10000}], 0x1c) socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$TIPC_CMD_SHOW_PORTS(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x420}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x1c, 0x0, 0x0, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}}, 0xc544a20588325c7b) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = gettid() r7 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r7, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r6) close(r7) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r6, 0x0, 0x0) 16:50:19 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40100, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000100)={0xf, 0x1f, 0x1, 0x9}, 0xf) close(r3) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x410, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:19 executing program 4: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000100)={'#! ', './file0', [{0x20, '\x92&`J[\x7f\x86\xb3R@\xbc\x0e\x98\xf4J\x92\xc2\t\x9d\x93\x1dV\xb2p\x0e\xf9\xf1\xf9\xff0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:19 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40100, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000100)={0xf, 0x1f, 0x1, 0x9}, 0xf) close(r3) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:19 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x1000, 0x400) 16:50:19 executing program 4: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) write$binfmt_script(r4, &(0x7f0000000000)={'#! ', '.', [{}]}, 0x1dd) r5 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r5, 0x5d, 0xb5}, &(0x7f00000001c0)={'enc=', 'raw', ' hash=', {'poly1305-generic\x00'}}, &(0x7f00000002c0)="b40173b8b1fbca298f23add5e19810b0c894034c9f9c7d379ef7636bda2f35f4eab227423e3305b146d6a73aa58c4e59bedc5d37f6b67ef866ab79d3e97a803d5c00ff8b2588f71c40d84b49295a600819ec8cee08779c2b144c3353de", &(0x7f0000000340)=""/181) socket(0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) perf_event_open(&(0x7f0000000400)={0x3, 0x70, 0x0, 0xa9, 0x8, 0x5, 0x0, 0x4, 0x40, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000240), 0xf}, 0x891d87c5eb0cbf73, 0x3, 0x7f, 0x5, 0xfff, 0xfffff800, 0x1}, r2, 0xc, r7, 0x6) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:19 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x8aaccab4fe4b1a9d, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000440)=ANY=[@ANYBLOB="b4bd9a0200000800c44e5e4a12ea77614c2ea41c533a59606334bf9eeba4c3216460f7a5abc32d7a0f71c3224e58333038c11355bc9d24fc412ffdb4c090a210d86c1415c008379fe0c4975acbe5c56390b1d2be04f1e33054527123a139f20b716c44b0089694934133ad1d6a69695c6be9b5372be03445225220c8bc864e5c9d6dcd5b744c5321dc158e0df7c2a3495b6e53afec3b504ee0b488b7f72ed7dcfcb63abc7f220ed5d7d85caef0fb63b9b308ee6aca760b43a7d07ac865fa7a8404002ec5d84219ec050a1f407916e71391a48b9e0583288850df0025d150dab0fc1952313e7c8a2c53ea53e1970baf7c75d989d13f546454b32bc6c04ddad05c308d1b9fd3bf565dbc35371d88aa92e27ad8767075e3332a30368fd4a04cc068dbc10e68c6f6d0432f0dedd1bab26566da065fb5c34f9a62094a68d735f856f6fd4ad995037506a616dd8f31116790d6b99590af6bb41621f8be"], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCX25SCAUSEDIAG(r4, 0x89ec, &(0x7f0000000040)={0x84, 0x3f}) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:19 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x413, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:19 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40100, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000100)={0xf, 0x1f, 0x1, 0x9}, 0xf) close(r3) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:19 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) write$binfmt_script(r1, &(0x7f0000000500)={'#! ', './file0', [{0x20, '\xf1\xd3\xb8\x1b\x9bSo<\xcaW\xcbp\\\xf7\xcc\f\xcfI\xb7\x879\xe0\x7f\xa3,\x9d\xd7Bl\x1c\xa5\xbe\xb3Vtmz6T\x02\x9a\x96\xa4$\xe6\xd5BIt\xe7\xf9P\xf9b\xc5\xdaH\xeb\xa7TV: \x17\x03O\xc7\x92\xc3\xba\xb7\xa9\xb7\x9a\xa2\xc6\xae\xa03AS\'\xc9\x9d\xa03&d\xc3Pnx\t\r\xab\x8d\xd7\tf\xb5l6B?\xf6\xb5\xff\xf3\v\x004\x8d\x02\xc7(\xb0\x0e\x1b\xb2\x8e\x93\xae\x9c\x1f/\x9fG\x9b\x96\xb83<\xf2\x1b\xaa\x84tO\xff\xf4\x9c\x18O\x93~y\xa8\xa5\xdez\x13D|6\xa6\x9a\x03\xb9\x03]\xb6\x05tC\x82\x0e\xcd\xc6\xe8\xa0'}], 0xa, "71bdeea7475419387fa391a9d45f39edffd64511105de882d130eac19125e53a479b6bede27a7322c4b8250a4a534447025176664f5b2138da0691c620633d2011ace72f75cc2831c411dd11975f02614e488207"}, 0xfdc8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:20 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40100, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000100)={0xf, 0x1f, 0x1, 0x9}, 0xf) close(r3) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x414, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:20 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="2c21202eaf66694c6530200a"], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:20 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) r4 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000140)={r5, 0x3, 0x6, @random="08f00793e142"}, 0x10) listen(r4, 0x3) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r6 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r6, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r9}], {0x4, 0x1}, [{0x8, 0x6, r10}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) r11 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r12}], {0x4, 0x1}, [{0x8, 0x6, r13}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r15, 0x0, 0x10, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000240)=0xe8) r17 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r17, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r17, 0x107, 0x1, &(0x7f0000000140)={r18, 0x3, 0x6, @random="08f00793e142"}, 0x10) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) fsetxattr$system_posix_acl(r6, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f00000004c0)={{}, {0x1, 0x2}, [{0x2, 0x1, r7}, {0x2, 0x7, r9}, {0x2, 0x0, r12}, {0x2, 0x4, 0xee01}, {0x2, 0x3, 0xee00}, {0x2, 0x1, r16}], {0x4, 0x1}, [{0x8, 0x8, r19}], {0x10, 0x2}}, 0x5c, 0x0) 16:50:20 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40100, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000100)={0xf, 0x1f, 0x1, 0x9}, 0xf) close(r3) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:20 executing program 4: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) write$binfmt_script(r1, &(0x7f0000000500)={'#! ', './file0', [{0x20, '\xf1\xd3\xb8\x1b\x9bSo<\xcaW\xcbp\\\xf7\xcc\f\xcfI\xb7\x879\xe0\x7f\xa3,\x9d\xd7Bl\x1c\xa5\xbe\xb3Vtmz6T\x02\x9a\x96\xa4$\xe6\xd5BIt\xe7\xf9P\xf9b\xc5\xdaH\xeb\xa7TV: \x17\x03O\xc7\x92\xc3\xba\xb7\xa9\xb7\x9a\xa2\xc6\xae\xa03AS\'\xc9\x9d\xa03&d\xc3Pnx\t\r\xab\x8d\xd7\tf\xb5l6B?\xf6\xb5\xff\xf3\v\x004\x8d\x02\xc7(\xb0\x0e\x1b\xb2\x8e\x93\xae\x9c\x1f/\x9fG\x9b\x96\xb83<\xf2\x1b\xaa\x84tO\xff\xf4\x9c\x18O\x93~y\xa8\xa5\xdez\x13D|6\xa6\x9a\x03\xb9\x03]\xb6\x05tC\x82\x0e\xcd\xc6\xe8\xa0'}], 0xa, "71bdeea7475419387fa391a9d45f39edffd64511105de882d130eac19125e53a479b6bede27a7322c4b8250a4a534447025176664f5b2138da0691c620633d2011ace72f75cc2831c411dd11975f02614e488207"}, 0xfdc8) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x425, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:20 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000140)={r4, 0x3, 0x6, @random="08f00793e142"}, 0x10) ioctl$sock_proto_private(r3, 0x89ed, &(0x7f0000000100)="30bcd06814922f13efc14d6cee02ad6d6083e3313f4b1205391fda9f90e9ca8ea0c1dd0645745d7f154abe60b215fee8eff103008ce3c7d3c206bbde38aa3a6c6bd64c9853b0ffc72159c05a67e32ad273344090a4aea03f6e64755fa1fc9384e0da9c3c3cb87ef3e0689b96fdd53782631f52") r5 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r5, &(0x7f0000000000)=ANY=[@ANYBLOB="2321152e697c05a65814"], 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r5) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:20 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40100, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000100)={0xf, 0x1f, 0x1, 0x9}, 0xf) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:20 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:20 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r4, 0x84, 0xe, &(0x7f0000000140)={r5, @in={{0x2, 0x0, @empty}}}, &(0x7f00000000c0)=0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @loopback}], 0xffffffcb) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r8, 0x84, 0xe, &(0x7f0000000140)={r9, @in={{0x2, 0x0, @empty}}}, &(0x7f00000000c0)=0x100) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f0000000040)={r9, 0x1a, "b887d34ecd544176287bc2f31df52a5ebe1b0491c7a4f1f88462"}, &(0x7f0000000100)=0x22) r10 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r10, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r10, 0x84, 0xe, &(0x7f0000000140)={r11, @in={{0x2, 0x0, @empty}}}, &(0x7f00000000c0)=0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x200000) getsockopt$inet_sctp_SCTP_STATUS(r14, 0x84, 0xe, &(0x7f00000001c0)={r5, 0xce, 0x81, 0x2, 0x6, 0x0, 0x3ff, 0x8, {r11, @in6={{0xa, 0x4e23, 0x2, @rand_addr="32949112aa6ca0d1e7f16455fac03bce", 0x8}}, 0x0, 0x81, 0x8, 0x400, 0x7}}, &(0x7f0000000140)=0xb0) 16:50:20 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r5, 0x28, &(0x7f0000000100)}, 0x10) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) r6 = syz_open_dev$radio(&(0x7f0000000500)='/dev/radio#\x00', 0x2, 0x2) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000000540)=[@in6={0xa, 0x4e20, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x23}}, @in6={0xa, 0x4e21, 0x81, @empty, 0x8}], 0x58) ioctl$TIOCCBRK(r0, 0x5428) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:21 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40100, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000100)={0xf, 0x1f, 0x1, 0x9}, 0xf) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:21 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = accept4$x25(r3, &(0x7f0000000040)={0x9, @remote}, &(0x7f0000000100)=0x12, 0x800) connect$l2tp(r1, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x0, 0x2, 0x0, 0x3, {0xa, 0x4e24, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7}}}, 0x32) socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = gettid() r8 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r8, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r7) close(r8) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r7, 0x0, 0x0) 16:50:21 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r6, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r7 = creat(&(0x7f00000012c0)='\x00', 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000001500)={0xd4, 0x0, &(0x7f00000013c0)=[@register_looper, @reply_sg={0x40486312, {0x3, 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000100)={@fd={0x66642a85, 0x0, r6}, @flat=@binder={0x73622a85, 0x1000, 0x3}, @ptr={0x70742a85, 0x1, &(0x7f00000001c0)=""/159, 0x9f, 0x0, 0x34}}, &(0x7f0000000040)={0x0, 0x18, 0x30}}}, @exit_looper, @increfs_done={0x40106308, 0x1}, @acquire_done={0x40106309, 0x3}, @dead_binder_done, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x58, 0x18, &(0x7f0000001300)={@ptr={0x70742a85, 0x1, &(0x7f00000002c0)=""/4096, 0x1000, 0x1}, @flat=@handle={0x73682a85, 0x80fbd9becaeb6132}, @fd={0x66642a85, 0x0, r7}}, &(0x7f0000001380)={0x0, 0x28, 0x40}}, 0x400}], 0x0, 0x0, &(0x7f00000014c0)}) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:21 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='security.evm\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="04000014e0628070b01446c732ff973046ea9bd880f0dd6ef00e95518d33518f6200000100000000002e1f5ad7138c98c50a9583dec770459438978808112badb50b8c557711ed07df75c899547fa536c61aba4963a26158a24d0ad907dca9e47f84d1c2b52853bdef37f9ba94552a0b168bfa6169d94ee3d6e905314b67eaaa7b9a56e298d6a81746d753ab61"], 0x4, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:21 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40100, 0x0) write$P9_RXATTRWALK(r4, &(0x7f0000000100)={0xf, 0x1f, 0x1, 0x9}, 0xf) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:21 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x430, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:21 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000002900)='./file1\x00', &(0x7f0000002940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r5}], {0x4, 0x1}, [{0x8, 0x6, r6}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f00000026c0)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f00000027c0)=0xe8) syz_mount_image$iso9660(&(0x7f0000000100)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x40, 0x7, &(0x7f0000002600)=[{&(0x7f00000002c0)="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", 0x1000, 0x7}, {&(0x7f00000001c0)="405727656a6ca8f2aa061362d0d1c633d918913241c837fad40c6a5b0003babab80760d30a39f6971299e1089cc50036a2e44977780aeb9d7c42aa8c899d944e6210a3aadb3afb1362019b55d03410dae5af94c89626c29c4d33ecaab58df7e1cf5b790495be4a4197fa612309ad6a34247d0fd411b4ec6ada9f1258cd3791ce01829e2ebc16b140f27a65d189a7e8013948206166276bef6074482322d0f6a1dcaa54d3ac343a35a187d3648bea", 0xae, 0x7}, {&(0x7f00000012c0)="51bf0d525a3c65d34645e26ace68b0afa0d6b8fb439e5bb4b3ed775853a0e4a75413706065b14a731ea9a735a7f7822d331101e83f558c1dfeaf97743e142be0ab71c89b453be153e47d44291efe3eb24a7c9ab5f2a2a61bf2ca29e7e7e7a52b0887161dfb1af18039a116b1298bc2df214b1b7aaf08f87b6756e50496c240c4baea2acc5ce4c3e840889b0fe5d4d4e1c180af34e96e7a0f41abf4d4fe0bb78d6148c7a23fd7c836c2a1904aec66aa5cde4c155a486d9f2d8f06dd1c309a64739506089b52", 0xc5, 0x3}, {&(0x7f00000013c0)="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", 0x1000, 0x40008}, {&(0x7f00000023c0)="4e239450", 0x4, 0x2}, {&(0x7f0000002400)="29bc25fa6c467f472b6856cee94fa145e188f7009ecb1070cbcaa5ecbd772ee3f074b39e43f0a989989774266e5d6d8c78f1de82699100fa32a1411dceab13d617fcf5187bbd273b0b25941fce95d3db59b8abbb0e65ddc1153ac07915cfab9ce8e5e7f3882589e9dbea5656faa39ef8ca2a4ca33c36858e3b4939c773efe237371da14e1ed6d2acf186682aecb83b412b4b21be731915a37bf727ca1817adcfa3c124033ac60afcdb8915943f0b6dd0a53c7f3c558b5ed3fed751cc438374b6c0029827ffb2e8f7e6d974b0a6f1080d4e5f9554b9c1d4b85a15eabb497f15ed3bf0dfd36c692620b87cda333b983846647c51634ca25b85d46b96a936", 0xfd, 0x80}, {&(0x7f0000002500)="ea24dfcd01a19b6e18973e29321f70c4dacf8fb2673aebc2eed7ed576ca4d21095262a9490f7669fb81af37193d6b9209ce08804d7b87acec4594b93f4136c1ad969a3313b3ecb56147fc760c0879d6eba6862332c9ff84fcb3120a46066708c0a8e44eb340b1f7e147b68b5bf35e74a9859510d9f507768d47ceeb11227689142432967f78d2399dc464aee771f10b2a2867a38e020ab31dfe743671bea27f8a828e40c1513d9d056b5122af75c07106bf72ebfc76d55c9aeada3a99853bd3689df559e145059f84cce6979f9905f070c757f0e0b2ec90326bd59d425400e22", 0xe0, 0x80}], 0x1000, &(0x7f0000002800)={[{@mode={'mode', 0x3d, 0xd9b}}, {@sbsector={'sbsector', 0x3d, 0x8}}], [{@uid_lt={'uid<', r5}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'y-wlan1vmnet0+'}}, {@appraise='appraise'}, {@uid_eq={'uid', 0x3d, r9}}, {@dont_hash='dont_hash'}, {@context={'context', 0x3d, 'root'}}, {@hash='hash'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'systemwlan1-.'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r3, 0x80045700, &(0x7f0000000040)) ptrace$setopts(0x4200, r2, 0x0, 0x0) 16:50:21 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="23216c6530200a09e0d36b7458ff1807c20000"], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0xfffffffffffffffd, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:21 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 593.528121] net_ratelimit: 20 callbacks suppressed [ 593.528129] protocol 88fb is buggy, dev hsr_slave_0 [ 593.528158] protocol 88fb is buggy, dev hsr_slave_1 [ 593.533185] protocol 88fb is buggy, dev hsr_slave_1 [ 593.538286] protocol 88fb is buggy, dev hsr_slave_0 [ 593.553350] protocol 88fb is buggy, dev hsr_slave_1 16:50:21 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:21 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x40100, 0x0) close(r3) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:21 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r4, 0x80045300, 0x0) r5 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r5}) r6 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r6, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r4, @ANYBLOB="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", @ANYRES64=r5]) ptrace$getregset(0x4204, r5, 0x0, &(0x7f0000000340)={0x0}) ptrace$getenv(0x4201, r5, 0x2b, &(0x7f0000000040)) 16:50:21 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[], 0x0) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:21 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x43c, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:21 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000100)={0x3, 0x5}) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:21 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:21 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x43d, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) r5 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000001540)={0x2, &(0x7f0000000000)=[{}, {}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x40082404, &(0x7f0000001580)) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) write$binfmt_script(r4, &(0x7f0000001500)=ANY=[@ANYPTR64, @ANYPTR=&(0x7f00000014c0)=ANY=[@ANYRESDEC=r5, @ANYRESDEC, @ANYRES64, @ANYRES32=r2]], 0x10) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000015c0)={0x7}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r3) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) sendmsg$tipc(r9, &(0x7f0000001480)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x2, {0x4e24, 0x1}}, 0x10, &(0x7f0000001340)=[{&(0x7f00000001c0)="ae4a13419132f2fd2924755907227cd067f82088a17ce84430296666f83710c309f4732be3358b12a217868e2866b3e1e3e16d0a80a295e6b4f41279d2a890943455ed7f133ec89d36b9a50f3a35928234e8c18f9d05de7a67ec583071d32530e1c11e3db1760715a789898f8e580d63738202459ba12e1b5a78f7084201b7afc2be06787e0cff18ecd8cbf558fd41babe45233d6cbf7145839c3e22c3c418f28aedc04e5224", 0xa6}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000000100)="66649d3ee8896dc0ef6fe308503e45aed156bcef108c5ba63300bee81e6758e6eed3dde6976d82f2ba04782d5e726408c85d4ab06500ab878ea147dca93fb023c81bfc967902639824552372c763ac41b153a4ae5b21929b7436624080fbf8633def78e8abf5e07ff969830c5a0e1205ea43", 0x72}, {&(0x7f00000012c0)="a8f88f77efec461ed04e3f9c2fcf1d5c49e2c164e0fd0e82bc07dff196b0ce78b5dd77d523fa61b23acba5d26c50e6375f82928cabf1d4826510d0693df4e7b95ae8919a21420d3e0a920a3d53", 0x4d}], 0x4, &(0x7f0000001380)="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", 0xfa, 0x8008884}, 0x4000010) r10 = semget(0x3, 0x2, 0xc10571773c8e9fe8) semctl$SETVAL(r10, 0x0, 0x10, 0x0) semctl$SETALL(r10, 0x0, 0x11, &(0x7f00000001c0)) semctl$SETALL(r10, 0x0, 0x11, &(0x7f00000000c0)=[0x6, 0x81, 0x29b, 0x0, 0x81, 0x8001, 0x800, 0x0, 0x1000, 0x7]) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 16:50:22 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:22 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2336a200000000000030200aec0b9f3f649ccdc061366dddbda5c150a3d863768ed95207ff5a727fbf2270008f0f8830a883aa3f66c4e0d47290278095556c95a99fd119e95810cbc15a302b0f955d510f531c58d0fb3aec2fa98a3fa14d7d4eb0e9e16595e7c863078d4972ababb8d30cb4918302b4dad63932ab3cbc887e8553ccc115f0d4edd9d159411f3d8a7906be3f70b5049f877a639cafd1fa854ce4fe0d3d1f168f81911a5befa73f623e96c8e635"], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:22 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 594.488258] protocol 88fb is buggy, dev hsr_slave_0 [ 594.493413] protocol 88fb is buggy, dev hsr_slave_1 16:50:22 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:22 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:22 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x92) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, &(0x7f0000000200)=0x40, 0x2) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x440}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x4c, 0x0, 0x20, 0x70bd27, 0x25dfdbfb, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7fffffff}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r3}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0xdac7817a79bc6714}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}]}, 0x4c}, 0x1, 0x0, 0x0, 0x400000f0}, 0x4008015) r5 = dup(r4) setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r5, 0x40505412, &(0x7f0000000000)={0x2, 0x80000000, 0x1ff, 0x0, 0x1}) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:22 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='#! .\'file0 \n'], 0xc) pipe(&(0x7f0000000040)={0xffffffffffffffff}) renameat2(r2, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x3) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) 16:50:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x44a, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 594.728150] protocol 88fb is buggy, dev hsr_slave_0 [ 594.733304] protocol 88fb is buggy, dev hsr_slave_1 16:50:22 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000100)=""/43) 16:50:22 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400000004001ff) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r3) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 16:50:22 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x44b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:22 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:22 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) getpriority(0x0, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:22 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000003580)=[{{&(0x7f0000000100)=@can, 0x80, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/218, 0xda}, {&(0x7f0000000040)=""/53, 0x35}, {&(0x7f00000001c0)=""/46, 0x2e}, {&(0x7f0000000200)=""/83, 0x53}, {&(0x7f00000003c0)=""/244, 0xf4}, {&(0x7f00000004c0)=""/61, 0x3d}, {&(0x7f0000000500)=""/193, 0xc1}], 0x7}}, {{0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000000680)=""/184, 0xb8}, {&(0x7f0000000740)=""/179, 0xb3}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/93, 0x5d}, {&(0x7f0000001880)=""/28, 0x1c}], 0x5, &(0x7f0000001940)=""/185, 0xb9}, 0x3}, {{&(0x7f0000001a00)=@sco, 0x80, &(0x7f0000001c80)=[{&(0x7f0000001a80)=""/143, 0x8f}, {&(0x7f0000001b40)=""/119, 0x77}, {&(0x7f0000001bc0)=""/177, 0xb1}], 0x3, &(0x7f0000001cc0)=""/127, 0x7f}, 0x3f}, {{0x0, 0x0, &(0x7f0000001e40)=[{&(0x7f0000001d40)}, {&(0x7f0000001d80)=""/168, 0xa8}], 0x2, &(0x7f0000001e80)=""/237, 0xed}}, {{&(0x7f0000001f80)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000002180)=[{&(0x7f0000002000)=""/241, 0xf1}, {&(0x7f0000002100)=""/81, 0x51}], 0x2, &(0x7f00000021c0)=""/170, 0xaa}, 0x200}, {{&(0x7f0000002280)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000003440)=[{&(0x7f0000002300)=""/30, 0x1e}, {&(0x7f0000002340)=""/4096, 0x1000}, {&(0x7f0000003340)=""/77, 0x4d}, {&(0x7f00000033c0)=""/109, 0x6d}], 0x4, &(0x7f0000003480)=""/239, 0xef}, 0x10000}], 0x6, 0x2000, &(0x7f0000003700)={0x0, 0x1c9c380}) bind$can_raw(r3, &(0x7f0000003740)={0x1d, r4}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r5 = gettid() r6 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r6, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r5) close(r6) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) 16:50:22 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 595.288251] protocol 88fb is buggy, dev hsr_slave_0 16:50:23 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:23 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="2321b0057d5854010000800a"], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:23 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:23 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:23 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0xfffd, 0x0, @loopback, 0x200004}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000240)=@gcm_128={{0x303}, "b28b5e2005b99f9b", "2800d67162a7c8714c4f81b790bde515", "dffae5d8", "21860b6fa14a46f9"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x14) sync_file_range(r1, 0x0, 0x2, 0x5) r6 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000140)={r7, 0x3, 0x6, @random="08f00793e142"}, 0x10) ioctl$sock_FIOGETOWN(r6, 0x8903, &(0x7f00000001c0)=0x0) tkill(r8, 0x41) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:23 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:23 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(0xffffffffffffffff) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:23 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r4, 0x40045542, &(0x7f0000000100)=0x3) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r5 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x8, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000, 0x0, 0xfffffffffffffffc}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) fcntl$getown(r5, 0x9) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x2, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:23 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="0a9746ac6f0a01bd6c6416a448a466c23233404a690042150588470c5e9198d3fa2408a1dfb889c718d0cb0257518a6c83737daf02ef4aa20b66ddf8986fcde176440b5b2ea045caa5fa54ff3ada55c1c956d429a31c532f257979b2f51f5372b59abd308a9db373043605e813111a41e67f0c2aae7cf662a6645610c2771916139f6e23c966407169"], 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000040)=0x9) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) getdents64(r3, &(0x7f0000000100)=""/9, 0x9) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:23 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(0xffffffffffffffff) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 595.995735] device team_slave_0 entered promiscuous mode 16:50:23 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:23 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="2321202e6f80696c6530204a2c2a71e84d45eb4e10612ce76af85193ec07f74e4dadac4f99c8b20ac49ec27924327227d52bd55032aa8ed2c18f7f9276663bb5d426e8f3360fba0de8568d8bb35cdfb36d22fcd609bb572b5e5aeac1f9cf2bd91d3da17e11dff7e1276d3a6c8c534af6eddc8a106928afde638d7ac5816ed85d79ceb24a64f6c54c5e9d45273960ae986d7b06eaf77c632bf88b7e3701417eee788f575fb4938a54"], 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$RXRPC_SECURITY_KEYRING(r5, 0x110, 0x2, &(0x7f0000000040)='@}selinuxppp1\\posix_acl_access(\x00', 0x20) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:24 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) gettid() openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(0xffffffffffffffff) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:24 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4200, r2, 0x800, 0x0) 16:50:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x3, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 596.694447] device team_slave_0 left promiscuous mode 16:50:24 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:24 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) socket(0x2, 0x1, 0x0) accept$alg(r1, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) [ 596.750670] device team_slave_0 entered promiscuous mode [ 596.768402] device team_slave_0 left promiscuous mode 16:50:24 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) r4 = syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x20, 0x20000) splice(r0, 0x0, r4, 0x0, 0x10002, 0x0) 16:50:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x4, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:24 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:24 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:24 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50}, 0x50) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) getsockopt$packet_buf(r0, 0x107, 0x0, 0x0, &(0x7f0000000100)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x6) r5 = gettid() r6 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r6, &(0x7f0000000100)=ANY=[@ANYBLOB="2321202e2f66955780d0200acb9934918c5595ee8deac2cb6b5f2e9d522d50799601faa2867b1bb40f4cd559c02ba7f721a887019a2af1eff3635630ce8fe55867ed0a8f5a0032828977151202ff40cd95d19c8bb3952a5782badc93620331cb06012d8bdd85cc1dab8846926d74a6c3dc205a63bce3a7052663b6bdfea7"], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r5) close(r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$RTC_EPOCH_READ(r8, 0x8008700d, &(0x7f0000000040)) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) 16:50:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x5, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 598.648247] net_ratelimit: 19 callbacks suppressed [ 598.648255] protocol 88fb is buggy, dev hsr_slave_0 [ 598.658377] protocol 88fb is buggy, dev hsr_slave_1 [ 598.888187] protocol 88fb is buggy, dev hsr_slave_0 [ 598.893307] protocol 88fb is buggy, dev hsr_slave_1 16:50:27 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400201) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12], 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r3) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ptrace$setopts(0x4206, r3, 0x0, 0x0) 16:50:27 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:27 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:27 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x6, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:27 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KVM_PPC_GET_PVINFO(r4, 0x4080aea1, &(0x7f00000001c0)=""/60) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:27 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003a80)=[{{&(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000780)=[{&(0x7f00000002c0)=""/80, 0x50}, {&(0x7f0000000340)=""/224, 0xe0}, {&(0x7f0000000440)=""/150, 0x96}, {&(0x7f0000000040)=""/23, 0x17}, {&(0x7f0000000500)=""/209, 0xd1}, {&(0x7f0000000240)=""/16, 0x10}, {&(0x7f0000000600)=""/156, 0x9c}, {&(0x7f00000006c0)=""/66, 0x42}, {&(0x7f0000000740)=""/60, 0x3c}], 0x9, &(0x7f0000000840)=""/46, 0x2e}, 0x10000}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000880)=""/69, 0x45}, {&(0x7f0000000900)=""/122, 0x7a}, {&(0x7f0000000980)=""/66, 0x42}, {&(0x7f0000000a00)=""/116, 0x74}, {&(0x7f0000000a80)=""/147, 0x93}, {&(0x7f0000000b40)=""/5, 0x5}], 0x6, &(0x7f0000000c00)=""/141, 0x8d}, 0x66df}, {{0x0, 0x0, &(0x7f0000003100)=[{&(0x7f0000000cc0)=""/147, 0x93}, {&(0x7f0000000d80)=""/69, 0x45}, {&(0x7f0000000e00)=""/171, 0xab}, {&(0x7f0000000ec0)=""/197, 0xc5}, {&(0x7f0000000fc0)=""/1, 0x1}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000002000)=""/35, 0x23}, {&(0x7f0000002040)=""/19, 0x13}, {&(0x7f0000002080)=""/77, 0x4d}, {&(0x7f0000002100)=""/4096, 0x1000}], 0xa}, 0xffff}, {{&(0x7f00000031c0)=@hci, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003240)=""/152, 0x98}, {&(0x7f0000003300)=""/146, 0x92}, {&(0x7f00000033c0)=""/136, 0x88}, {&(0x7f0000003480)=""/186, 0xba}, {&(0x7f0000003540)=""/101, 0x65}, {&(0x7f00000035c0)=""/218, 0xda}], 0x6, &(0x7f0000003740)=""/22, 0x16}}, {{0x0, 0x0, &(0x7f0000003a40)=[{&(0x7f0000003780)=""/230, 0xe6}, {&(0x7f0000003880)=""/226, 0xe2}, {&(0x7f0000003980)=""/150, 0x96}], 0x3}, 0x3}], 0x5, 0x40, &(0x7f0000003bc0)={0x77359400}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000003c00)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x7000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000000100)="472407f3e1997701ab085141344c116eb22f6df3a652c3135e969c072ab9f420f571fa94919a4732bf8ade2143768687ae3c9791cc43ec1c57c03f625f16fc785006f6", 0x43, r0}, 0x68) socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f0000003d00)=ANY=[@ANYBLOB="2321090000000000007f200a934406ec184cb1c2a870fcb4693eb51b83f760987e2d5d33a15c7f341ffd911679c494deb111b22ccef45662792c0799cc1521803d545c22c135fc312f578a496f7da4b5b85bc6be7b63603a00adf68c64d4ec15986320eddc98fb9392d1d40691f7e4355e591939632c59fd52d5a9abf267c9d5c49f19d87d7d6e06afe6aa24f117819d9c75"], 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r6, 0x84, 0x21, &(0x7f0000003c80), &(0x7f0000003cc0)=0x4) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 16:50:27 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r1) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:27 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="a3322673e86ea6cb2e3f1ac82f66696c7266bc79"], 0xc) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000000)={'erspan0\x00', &(0x7f00000002c0)=@ethtool_rxnfc={0x2a, 0x9, 0x7f, {0x4, @hdata="5be0b59bb86fb15b9fac668157fe7da8b781074bb8ccc7a32cb4b8936705713ed5171c90e350bcafa36b90913ec4dd8be5fc9362", {0x0, @link_local, 0x6, 0x100, [0xf341, 0xffffffff]}, @ether_spec={@dev={[], 0x1a}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 0x401}, {0x0, @empty, 0x1, 0x8, [0x4]}, 0x4, 0x9}, 0x5, [0x0, 0x3, 0x8, 0x0, 0x1]}}) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:27 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB="000000000000000000000000abb66d1474e48fc7502a40d310d3eb6799ca665156315f5ff266cd0cad751f9bffbdd145e3449dc68ed539ef4a8f6943bf374ea7b676d1a73d68e0c0876c6f818c760f53e233b55cb94705646775c707d7e7745a7ad51f528df369ebbb94aa07d5e3b51f454a87c0fa029dffb1a521712723b9310a8ad9cc6af3d4155d1b03ba354f27106cff175779eb2b08b84bcecde47832b03af34ebb30b7263730570f330f4d9cdd788a9bf701378a0884db94307ad93e32"], 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r5, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$P9_RLCREATE(r7, &(0x7f0000000040)={0x18, 0xf, 0x1, {{0x48, 0x1, 0x3}, 0x3}}, 0x18) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$FS_IOC_FSGETXATTR(r8, 0x801c581f, &(0x7f0000000100)={0x6, 0x10000000, 0x8, 0x8}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r10, 0x80dc5521, &(0x7f00000002c0)=""/239) ptrace$setopts(0x4206, r2, 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r7, &(0x7f0000000000)={0x40000011}) [ 599.448149] protocol 88fb is buggy, dev hsr_slave_0 [ 599.453282] protocol 88fb is buggy, dev hsr_slave_1 16:50:27 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r1) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x7, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:27 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r1) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 599.768114] protocol 88fb is buggy, dev hsr_slave_0 [ 599.768134] protocol 88fb is buggy, dev hsr_slave_0 [ 599.773283] protocol 88fb is buggy, dev hsr_slave_1 [ 599.778285] protocol 88fb is buggy, dev hsr_slave_1 16:50:27 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:27 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r0) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:27 executing program 1: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)=ANY=[@ANYBLOB='#! .+file0 \n'], 0xc) socket(0x2, 0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0)={0x9}, 0x1) prctl$PR_SET_PTRACER(0x59616d61, r2) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) connect$vsock_stream(r1, &(0x7f0000000040)={0x28, 0x0, 0x2710, @reserved}, 0x10) ptrace$setopts(0x4206, r2, 0x0, 0x0) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000100)) 16:50:27 executing program 5: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) ioctl$FS_IOC_MEASURE_VERITY(r4, 0xc0046686, &(0x7f0000000100)={0x0, 0x1a, "46951531446cce5b28f733a9a1f513c6ea165f24863e15d8c40e"}) r5 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r6 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r6, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r7 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r7, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) close(0xffffffffffffffff) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xbffa, 0x8400) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) 16:50:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x8, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:28 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) set_thread_area(&(0x7f0000000100)={0x80000000, 0x20000800, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1}) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[], 0xfffffffffffffee7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000200)=0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r7, 0x111, 0x2, 0x0, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:28 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r0) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:28 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003a80)=[{{&(0x7f00000001c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000780)=[{&(0x7f00000002c0)=""/80, 0x50}, {&(0x7f0000000340)=""/224, 0xe0}, {&(0x7f0000000440)=""/150, 0x96}, {&(0x7f0000000040)=""/23, 0x17}, {&(0x7f0000000500)=""/209, 0xd1}, {&(0x7f0000000240)=""/16, 0x10}, {&(0x7f0000000600)=""/156, 0x9c}, {&(0x7f00000006c0)=""/66, 0x42}, {&(0x7f0000000740)=""/60, 0x3c}], 0x9, &(0x7f0000000840)=""/46, 0x2e}, 0x10000}, {{0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000880)=""/69, 0x45}, {&(0x7f0000000900)=""/122, 0x7a}, {&(0x7f0000000980)=""/66, 0x42}, {&(0x7f0000000a00)=""/116, 0x74}, {&(0x7f0000000a80)=""/147, 0x93}, {&(0x7f0000000b40)=""/5, 0x5}], 0x6, &(0x7f0000000c00)=""/141, 0x8d}, 0x66df}, {{0x0, 0x0, &(0x7f0000003100)=[{&(0x7f0000000cc0)=""/147, 0x93}, {&(0x7f0000000d80)=""/69, 0x45}, {&(0x7f0000000e00)=""/171, 0xab}, {&(0x7f0000000ec0)=""/197, 0xc5}, {&(0x7f0000000fc0)=""/1, 0x1}, {&(0x7f0000001000)=""/4096, 0x1000}, {&(0x7f0000002000)=""/35, 0x23}, {&(0x7f0000002040)=""/19, 0x13}, {&(0x7f0000002080)=""/77, 0x4d}, {&(0x7f0000002100)=""/4096, 0x1000}], 0xa}, 0xffff}, {{&(0x7f00000031c0)=@hci, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003240)=""/152, 0x98}, {&(0x7f0000003300)=""/146, 0x92}, {&(0x7f00000033c0)=""/136, 0x88}, {&(0x7f0000003480)=""/186, 0xba}, {&(0x7f0000003540)=""/101, 0x65}, {&(0x7f00000035c0)=""/218, 0xda}], 0x6, &(0x7f0000003740)=""/22, 0x16}}, {{0x0, 0x0, &(0x7f0000003a40)=[{&(0x7f0000003780)=""/230, 0xe6}, {&(0x7f0000003880)=""/226, 0xe2}, {&(0x7f0000003980)=""/150, 0x96}], 0x3}, 0x3}], 0x5, 0x40, &(0x7f0000003bc0)={0x77359400}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000003c00)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ff9000/0x7000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f0000000100)="472407f3e1997701ab085141344c116eb22f6df3a652c3135e969c072ab9f420f571fa94919a4732bf8ade2143768687ae3c9791cc43ec1c57c03f625f16fc785006f6", 0x43, r0}, 0x68) socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() r4 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r4, &(0x7f0000003d00)=ANY=[@ANYBLOB="2321090000000000007f200a934406ec184cb1c2a870fcb4693eb51b83f760987e2d5d33a15c7f341ffd911679c494deb111b22ccef45662792c0799cc1521803d545c22c135fc312f578a496f7da4b5b85bc6be7b63603a00adf68c64d4ec15986320eddc98fb9392d1d40691f7e4355e591939632c59fd52d5a9abf267c9d5c49f19d87d7d6e06afe6aa24f117819d9c75"], 0xc) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, &(0x7f00000000c0), 0x1) prctl$PR_SET_PTRACER(0x59616d61, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r6, 0x84, 0x21, &(0x7f0000003c80), &(0x7f0000003cc0)=0x4) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 16:50:28 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:28 executing program 0: socket$alg(0x26, 0x5, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r0) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:28 executing program 1 (fault-call:12 fault-nth:0): pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:28 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r1) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:28 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r1) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x9, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:28 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:28 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:28 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:28 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:28 executing program 0: socket$alg(0x26, 0x5, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r1) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:28 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x8, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000100)=@req3={0xb51, 0x5, 0xa0c, 0x6, 0x8, 0xffffffff, 0xfff}, 0x1c) write$binfmt_misc(r4, &(0x7f00000001c0)={'syz1', "243ead6322142309fe7e3510518a753571aa46a7530517183549fe5c6a2c1969e8616cc769a5e35a455020eb45714b008571c31075f5618a6190945fc265fd5d4996773c8917c1898ac076cf1455429dc6446e448048e932770991c72e60336bae3ea5dadf4312ff3889305900bbe1bf555779c191f6a352b03c8b736407e7160d6fa813aabe11347eb0ac018cd127fde126800b32ccc0a6d86750161c05878c5c7a1a4a43ed9566dedac0a283984825d6fff9899306bd20ebe0d9b243ff412ebf26647d4e86c138846df853db467d61e0e52b1f854832ee999e18c6f459953ea9116b0ccca7b26a6858d1242dfd862d133f3588"}, 0xf8) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000480)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f00000002c0)=@gcm_128={{0x303}, "3300000000ff0700", "07cdde6229f832000000ba2cf89b04b8", "931ce236", "99be206941a71c00"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0xa, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:29 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931c6236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:29 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:29 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:29 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:29 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:29 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:29 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0xecdcdac0608ca46c, &(0x7f00000000c0)=0x7f, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r6 = syz_init_net_socket$ax25(0x3, 0x3, 0xf0) ioctl$sock_inet_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000000)={'vlan0\x00', {0x2, 0x4e23, @broadcast}}) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x303}, "ad8ef611424380ac", "718fb3701817f59cf2ff61b37e7ef697", 'd*f<'}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYPTR64], 0x8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:29 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:29 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:29 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @local, 0x519a}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:29 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)=0x0) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r6, 0x80045300, 0x0) r7 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r7}) r8 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r8, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r6, @ANYBLOB="0a1ccea8e34a80262b913abc1d92bfd832dae67e15689fbf693203011419b8d02e6d41365af2072aeae0bf538fe954c7edae1266666e87244ad48840ae55f6eebda217952f2cd5d45d9708acca471f5fd430138f0a1635a4c181328c9ebf9a985b62cb8de86957f84d1256b736d4332b0ee2ee517a799950bfdfc0e2b37ff35447e661e0f3757f00009be013ed275303000000fc54c0cdfef9254141baebc3de2d11a21e6977763379060c2d14ce1e95267baf83244ed087a8333dbc0cc84e0d06e154c21ad4f0fd05b40c754200000000d92481f6d2891e55f43339c833854af66d8c9ff93afe1c8a253ad3352ea052e294fb47be373e3d3f934e877ae879ee57cfad0da7880acf68d78eb5805dde3c8815e26ac500c53182dd92ca9127b7e7a173f6dd11920c736f0cf10dd58ca3d6506f96a582a00e40c1f2792e344c30e04be9f44119416b74492b0ee68250a5863c29e7eccfcf5555cc027aa54d6019698c0a9ee5fbe3049134622ec4fb380480abdd4d4f23c085af6e3b2c2e4e799305a2ca553944e29527e2257f90c03607358ca8e6d77fe3caa9f7a4356616e9ad3621137366d1aa64da35661239d180530b5e93a52f08eda2457b819675bd1d8c85e1e954c75a6794b5f4010101e960bd93c8ea65649122360be98e863f816f5b95f6737d0631f9d2e7c24986dc5cb389c4f7d153c57d4c941b2fc54e360613dc38188636143f64ded2601987b3a6", @ANYRES64=r7]) ptrace$getregset(0x4204, r7, 0x0, &(0x7f0000000340)={0x0}) r9 = socket$inet_dccp(0x2, 0x6, 0x0) kcmp$KCMP_EPOLL_TFD(r5, r7, 0x7, r4, &(0x7f00000001c0)={0xffffffffffffffff, r9, 0x4919}) r10 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) r11 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video37\x00', 0x2, 0x0) r12 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r12, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r13 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r13, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) splice(r13, 0x0, r11, 0x0, 0x10000000007e70, 0xd) 16:50:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0xc, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:29 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:29 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:29 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r1) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:30 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r1) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:30 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:30 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0xe, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:30 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r1) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:30 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x18}, 0x2}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$PIO_FONT(r10, 0x4b61, &(0x7f00000001c0)="e83154408c5d6c18339bf2de0a24f4a9218c3985625e291dd4a791580b91ce10d04ff5b2273345d8c7364eafb1a996fed6bcca81afec375c3b4ec2e09a1d8930fb187a42fb05350ad96d11a44cdd1c692d1817d82ebfd52d03f954f0976e62ff3df487fe7f3f247d01b6bd8b1c6ce39f0de2995fbcc4620207523d4790963689f9b9f8ff9de848c06028f9c64f2b50ba7979d54dc929f24f0059287d3983427ae75aefea3ac80d39c9c91b914b5a1583380d35de080d0e68cdcd70faffebb4933e9673694a50e7b6d6351022ad1913432e31") accept4$alg(r8, 0x0, 0x0, 0x800) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r1) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:30 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_256={{0x304}, "5bff50151dbf7453", "6d10c5942ad439c61edaf2a86b702a2800", "98a8ad74", "12cc9433b61e399e"}, 0xfffffffffffffebb) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) write$binfmt_elf32(r1, &(0x7f0000000480)=ANY=[@ANYRESDEC=r4, @ANYBLOB="10616633e2b229bebe86ff70c0dee2d8fcc0d5b45ee3d51fbee920ac38031e53182f2c133f6bcc94b50eececafba04482abef51bb35b3d48e14a951e45698d5329385e6dcbe0f81452a39c36c8775f6fb32810e28a5c028afa2c4dbd961054bd5d326212e4486059b78ad75036f7a4cf820d5a6a1ffc8fbf6858819f", @ANYPTR64], 0x98) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:30 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x20000) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f00000001c0)={0x1, 0x0, 0x0, 0x8e58, 0x700f, 0x401}) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_STREAMOFF(0xffffffffffffffff, 0x40045613, &(0x7f0000000240)=0x3) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_ERASE(r5, 0xc00c55ca, &(0x7f0000000100)={0xa, 0x9, 0xbe}) close(r3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r8, 0x80045301, &(0x7f0000000200)) 16:50:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r1) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:30 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) r7 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r7, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0xffff, 0x4) 16:50:30 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r1) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:31 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r1) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x10, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:31 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$ALG_SET_AEAD_AUTHSIZE(r5, 0x117, 0x5, 0x0, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:31 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r1) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r1) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:31 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$TIOCGSERIAL(r10, 0x541e, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=""/255}) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000340)="9da67763289b6d0dd4906f78ec20031ded3fa38b3bfabad4ea89ee9b2b239cd23aa17773e036367aad83e02c6c10c28d9aa1be6e0a07b570e4d558a068e14ea3dea7ada818034852fc9a7f5e9f157bd2f56b3d7f7803e26a377fbe2e619338fcb5c9a03f5b7b6d20f3afcfe752fbe4ca4018e849858238e0e89df8", 0x7b) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:31 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x12, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:31 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000100)='security.capability\x00', &(0x7f00000001c0)=@v1={0x1000000, [{0x9, 0x5}]}, 0xc, 0x2) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) write$binfmt_aout(r4, &(0x7f0000000200)={{0x108, 0x4, 0x20, 0x22d, 0xe8, 0xfffffffe, 0x168, 0x5}, "c3526f4424941fcaaf1cbef11bddd09ddd96788902695d418855dbebddc64e41418ef58cde8677e640c9e0e8780851cffc93e8b36bc0fc1f0e3cef44271e0cc0491242f2b36fb1f7557b9e3e0d12399bdcf3aa9eed97bd2e0811a64eace800a0d18979308f6ccd0cfb16616c84ed7da4f05942d7ff08b7c8da3ca057896a8dffa06832891bf1c8a8eb633c8f63d7c44765fa896fbb2f2cde9a2d8825c04401e372dbde8890e1c48f8fd8ec4845bf25922c3fa17b07d6f7efaa9763540556cd1d169eff38ce3f9c8005d498c5fb75f283c12ed13566466770b257b676cc90", [[], [], [], []]}, 0x4fe) 16:50:31 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) ioctl$int_out(r3, 0x0, &(0x7f00000003c0)) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_ax25_SIOCADDRT(r5, 0x890b, &(0x7f00000001c0)={@bcast, @bcast, 0x2, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) splice(r0, 0x0, r8, 0x0, 0x10002, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x1a}, &(0x7f0000000280)=0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000002c0)={r9, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x6e, 0x1, 0x1c000000, 0xffffa29a, 0xa8}, &(0x7f0000000380)=0x98) [ 603.928106] net_ratelimit: 20 callbacks suppressed [ 603.928115] protocol 88fb is buggy, dev hsr_slave_0 [ 603.928156] protocol 88fb is buggy, dev hsr_slave_1 [ 603.933159] protocol 88fb is buggy, dev hsr_slave_1 [ 603.948423] protocol 88fb is buggy, dev hsr_slave_0 [ 603.953498] protocol 88fb is buggy, dev hsr_slave_1 16:50:32 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:32 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x25801, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x13, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:32 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(0x0, 0x1) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:32 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x1c, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(0x0, 0x1) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:32 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20, 0x80007, @ipv4={[], [], @multicast1}}, 0xffffff1a) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) r3 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockname(r3, &(0x7f00000001c0)=@pppoe={0x18, 0x0, {0x0, @local}}, &(0x7f0000000100)=0x80) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8001, 0x0) 16:50:32 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(0x0, 0x1) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 604.888196] protocol 88fb is buggy, dev hsr_slave_0 [ 604.893365] protocol 88fb is buggy, dev hsr_slave_1 [ 605.128170] protocol 88fb is buggy, dev hsr_slave_0 [ 605.134080] protocol 88fb is buggy, dev hsr_slave_1 16:50:33 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:33 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x24, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:33 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:33 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:33 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:33 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) ioctl$VIDIOC_DQBUF(r6, 0xc0585611, &(0x7f00000001c0)={0x2, 0x2, 0x4, 0x800, {}, {0x4, 0x0, 0x10, 0x8, 0xe, 0x3f, "163df6e3"}, 0x3ff, 0x2, @userptr=0x2, 0x262}) 16:50:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x3c, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:33 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:33 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:33 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e20, @local}}}, &(0x7f0000000100)=0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000280)={r4, 0xffffffc0}, 0x8) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r5, 0x0, 0x10002, 0x0) [ 605.688115] protocol 88fb is buggy, dev hsr_slave_0 16:50:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000000)={'#! ', './file0', [{}]}, 0xc) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:33 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_RTOINFO(r10, 0x84, 0x0, &(0x7f0000000240)={0x0, 0x7fffffff, 0x1f, 0xab}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r8, 0x84, 0xa, &(0x7f00000002c0)={0xc6, 0x3, 0x8000, 0xffff, 0x3, 0x6, 0x385f, 0x3, r11}, 0x20) r12 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r12, 0x80045300, 0x0) r13 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r13}) r14 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r14, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r12, @ANYBLOB="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", @ANYRES64=r13]) ptrace$getregset(0x4204, r13, 0x0, &(0x7f0000000340)={0x0}) fcntl$setownex(r3, 0xf, &(0x7f0000000100)={0x1, r13}) syz_mount_image$minix(&(0x7f0000000600)='minix\x00', &(0x7f0000000380)='./file0\x00', 0x5, 0x3, &(0x7f0000000580)=[{&(0x7f00000003c0)="f3734c58fc49cf2c943433dca9491240fd7560801cd675ab1939a371621065ef58fc4403dc5ed739d2acdbe31625f4660b766ea328f728c876f3e9572ecc91a6711f31583173015a0d98163ea7a199598b87a039d032f860c26c198615e0472e42aa12ae52b2acc9a3c8f145930e234df95f6dcd77183eb726575fc391ac20764ff7c0f19087839aa20f052e1d8ea2cf129570e7ba2ca668f777515a89fc901f7ac5948163001c513ff4aaba8151f8d86ed4782c217608b0d6", 0xb9}, {&(0x7f0000000480)="50422b92fb7272736ce3919a1b58278001fba13aa425ad06974f7ee556da1f8b0680e2bb951e7b6208034221aab7fff32c2a68f490ae35af159df7c386a24525cf603e2fb4ccd914c6fbbab171cf22510b09af6a70c3ee4d6289b4ecfe74b1b93ebcf73db97c29792c8bf7ece6986ae62cb4c398adb3da0df0438f919520d3c7fd2ac715f0e4e1a773a7b3638717bbb68adfdd834fb8c024413342cad7dd883490881cd3aa4e4a6bf1ad20b711d4e840a784c65bf3d9b8", 0xb7, 0x8}, {&(0x7f0000000640)="53e3c528e8294c616f2f81a64eaf6547fafb8cae8425433da31b977c0ccf42221d6ed703629e811f94ce32655732f6779ee8c46676c39218b1c4884387a90c3d15013b2a17d6340850ba8e46ed52a93ffd3d682cfdddb00a6f37406a062e16a96ef7a6e899b3e99a52d0a908a77e0733147052f2046966dd193e317c8d1234", 0x7f, 0xffffffffffffffff}], 0x20110c2, 0x0) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:33 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x48, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:33 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:33 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0xffffffff, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:33 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:36 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:36 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x4a, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:36 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x200, 0x101000) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) write$ppp(r0, &(0x7f00000001c0)="b1c6db8a5f5934cb10207429e5226b5e4dd2a82e25997aff7f2366a20794a2ec2cc7dc972ea337b5dd436594e02cb44a65b43ff548cca249ddbad732158da7c7ce41be03458a0cddc7b5443e688f176d681e55cb3d70a92d9b7f923d66b0b63aedd1c4ed816d734a58adc5fcc6a9b6b1bbf208be6389faf727923503047ded412a5e36ee702ba244f7aa100090cbdf18e394e4b48dab5790d8237de2a424fca04a6ed0eef8a289d4570e475967f8878dd4e153a076d2d4c0ff85587c4734bfafbdec78cce978a815b873d2c2f29ed234059171", 0xd3) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_LOG_STATUS(r8, 0x5646, 0x0) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:36 executing program 2: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x130000, 0x0) ioctl$VHOST_SET_VRING_KICK(r6, 0x4008af20, &(0x7f00000001c0)={0x3, r7}) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) pwrite64(r5, &(0x7f0000000200)="54cfd2e2c8da7c36ce267f0a9416cba7ee08e5418b50a2ae0365e3ffe2cbc87c4ccc7be056481fba82964e9c4a7fff3b3424a7be3253e26f6c39b2158351dda62ce219e9c3b0d7e8868e45680337a55f7734a1a685abab56b6dfb9ca0e2ec4f776a29472ecdd8fffd0380ae8caa67cd62c45dff01be952bffa82dce995675e4f069cbdcd25c51636c5e86f95c325e825b43f5d828b172d45715f77e58a1599f9117c53abcf8fc42b9ae1", 0xaa, 0x1a) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40082404, &(0x7f0000000140)=0x9) 16:50:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) lsetxattr$security_ima(0x0, &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:36 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x4c, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:36 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@empty, @in=@dev}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$USBDEVFS_DROP_PRIVILEGES(r8, 0x4004551e, &(0x7f00000002c0)=0x10001) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) lsetxattr$security_ima(0x0, &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 609.048186] net_ratelimit: 19 callbacks suppressed [ 609.048193] protocol 88fb is buggy, dev hsr_slave_0 [ 609.058509] protocol 88fb is buggy, dev hsr_slave_1 16:50:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x53, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 609.288215] protocol 88fb is buggy, dev hsr_slave_0 [ 609.293474] protocol 88fb is buggy, dev hsr_slave_1 [ 609.848356] protocol 88fb is buggy, dev hsr_slave_0 [ 609.853518] protocol 88fb is buggy, dev hsr_slave_1 [ 610.168143] protocol 88fb is buggy, dev hsr_slave_0 [ 610.168151] protocol 88fb is buggy, dev hsr_slave_0 [ 610.168257] protocol 88fb is buggy, dev hsr_slave_1 [ 610.173902] protocol 88fb is buggy, dev hsr_slave_1 16:50:39 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:39 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) lsetxattr$security_ima(0x0, &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:39 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000480)={0x4, 0x3f, 0x0, 0x8001, 0x4}, 0x14) r7 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r7, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r9}], {0x4, 0x1}, [{0x8, 0x6, r10}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) sendmsg$nl_route(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)=@ipv6_delroute={0xdc, 0x19, 0x10, 0x70bd26, 0x25dfdbfc, {0xa, 0x0, 0x80, 0x0, 0x1, 0x0, 0xfe, 0x52f67ea46d3d6a58, 0x100}, [@RTA_ENCAP={0x58, 0x16, @generic="098678cb0c9774bdbfb9f8a06c4c7f669e66dd682393bee3d5ddf6494efc5775fab5a006dedababdf73de40474e84d7753ee0b627dba81d1b44aa413beacb19f6fd43fe6be4a1d606b50f4cb2167103bd364e5"}, @RTA_ENCAP={0x18, 0x16, @nested={0x14, 0x96, [@typed={0x8, 0x6a, @u32=0x7f}, @typed={0x8, 0x75, @fd=r7}]}}, @RTA_ENCAP={0xc, 0x16, @typed={0x8, 0x85, @uid=r9}}, @RTA_METRICS={0x3c, 0x8, "ad6dc3ab2819ed0bdd24172ba4735263586e9ebcf28ba3bbe8fbbf1e43e62caee03a6e9c03db0fd8d191fce159704d152e14b9a98545f3"}, @RTA_ENCAP_TYPE={0x8}]}, 0xdc}, 0x1, 0x0, 0x0, 0x2000c0e1}, 0x80) 16:50:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x58, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:39 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000100)) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) r4 = semget(0x3, 0x2, 0xc10571773c8e9fe8) semctl$SETVAL(r4, 0x0, 0x10, 0x0) semctl$SETALL(r4, 0x0, 0x11, &(0x7f00000001c0)) semctl$SEM_STAT(r4, 0x1, 0x12, &(0x7f00000001c0)=""/163) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@ccm_128={{0x304}, "af8d03f1ecb8de14", "d0f321cbeca2c4d85d6db8cfa874e505", "98d17ab3", "a2c085f1eb17e538"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:39 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$USBDEVFS_RELEASEINTERFACE(r2, 0x80045510, &(0x7f0000000100)=0x8) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x7, 0x101081) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_open_dev$sndctrl(&(0x7f0000000080)='/dev/snd/controlC#\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r7, 0xc4c85512, &(0x7f0000002600)={{0x4}, 0x0, [], {0x0, 0x989680}}) r8 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) r9 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$VFIO_CHECK_EXTENSION(0xffffffffffffffff, 0x3b65, 0x6) r10 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm_plock\x00', 0x10000, 0x0) write$P9_RVERSION(r10, &(0x7f00000004c0)={0x13, 0x65, 0xffff, 0x40, 0x6, '9P2000'}, 0x13) ioctl$FS_IOC_GETFSMAP(r9, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000300)=0xe8) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="02000000010002000000000002000100", @ANYRES32=r13, @ANYBLOB="0400010000000000080006003007d3f30a0d5a021f518a27a647d94668496d1323dcf35de7c7e7a8a2dc5b16cdba233638b96a39368f1b193fb5eb7dcbef4579044af7553b4902dd8bbc10a6535693b3b6cef42d69b08d2172948b49dd4e95bc832c230fed0b1fac61049401452e844186355a6a50d19751427bb3ac9839912cddca937e4bd292fc5baf61be3ae88998e4bc6697843282dba15597", @ANYRES32=r14, @ANYBLOB="08000600", @ANYRES32=0x0, @ANYBLOB="10000200000000002000040000000000"], 0x3c, 0x6) fchown(r9, r11, r14) 16:50:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x60, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:39 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xffffffffffffff34) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r8, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000200)={0x6, 0x118, 0xfa00, {{0x6, 0x1, "855c441487d80af1c7cfadae0c50a34aeb38fad69f3c378bcd56d846cfa92cbedfe3bdde082284309983b2c44ff878cf905de7ae54cb7f4338b62ed94b090892671ee3603612963a8640b8052be76bc5dd3a6d7ecf312b78bea3db921d42ca5a3bd7d31cd64b185071b37ec86013fc10009716bd8e5fab783acf07b1e085a8ad6004a12a9a135484340f2bde4280a71ef3c7c2c6e3977f753761bfb54f5bb18161a9d34b00a002863413e7b8fc414956536c294d9ff5a9b3c58c22482d24aee7dd41da3e5bb1ca9c0aeaf27759ec0ad4d1671f93de0b348e680a45550d49a4042a6daadab08bcc1bca630f9a57601bccaaf3555c2bd716b5488bb7e95ce1aaa6", 0x40, 0x3, 0xff, 0xff, 0x9, 0xd2, 0x7f}, r9}}, 0x120) 16:50:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x68, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 614.328186] net_ratelimit: 20 callbacks suppressed [ 614.328193] protocol 88fb is buggy, dev hsr_slave_0 [ 614.338162] protocol 88fb is buggy, dev hsr_slave_0 [ 614.338629] protocol 88fb is buggy, dev hsr_slave_1 [ 614.343616] protocol 88fb is buggy, dev hsr_slave_1 [ 614.348634] protocol 88fb is buggy, dev hsr_slave_0 [ 614.358769] protocol 88fb is buggy, dev hsr_slave_1 16:50:42 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', 0x0, &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:42 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000a00)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r6, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x18, r7, 0x401, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_NET_GET(r5, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r7, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x20000940) close(r2) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) accept$unix(r4, &(0x7f0000000280), &(0x7f0000000300)=0x6e) setsockopt$inet6_tcp_int(r8, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r8, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r8, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r8, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x10000, 0xa8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x6c, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:42 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) ioctl$TIOCGPTLCK(0xffffffffffffffff, 0x80045439, &(0x7f0000000100)) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x400, 0x0) ioctl$EVIOCGSND(r4, 0x8040451a, &(0x7f0000000200)=""/224) 16:50:42 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:42 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:42 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:42 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:42 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x74, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:43 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x0) [ 615.288226] protocol 88fb is buggy, dev hsr_slave_0 [ 615.293592] protocol 88fb is buggy, dev hsr_slave_1 16:50:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 615.538187] protocol 88fb is buggy, dev hsr_slave_0 [ 615.543427] protocol 88fb is buggy, dev hsr_slave_1 16:50:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x0) 16:50:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x7a, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:43 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r7, 0x84, 0xe, &(0x7f0000000140)={r8, @in={{0x2, 0x0, @empty}}}, &(0x7f00000000c0)=0x100) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f0000000100)={r8, 0x1, 0x99c}, 0x8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', 0x0, 0x0, 0x1) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:43 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:43 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r6}], {0x4, 0x1}, [{0x8, 0x1, r7}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0xfffffffffffffd89, 0x6) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000100)={0x3, @default, r5}) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$bt_rfcomm(0x1f, 0x3, 0x3) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x0) 16:50:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10002, 0x0) 16:50:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10002, 0x0) 16:50:43 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:50:43 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:43 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0xc1, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:43 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10002, 0x0) 16:50:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x0) execve(0x0, 0x0, 0x0) 16:50:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x0) execve(0x0, 0x0, 0x0) 16:50:44 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:44 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:44 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000100)=0x8000001, 0x223) setsockopt$TIPC_MCAST_REPLICAST(0xffffffffffffffff, 0x10f, 0x86) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0xffffffffffffff9f) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:44 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$KVM_GET_NR_MMU_PAGES(r8, 0xae45, 0xfb0) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) read$usbfs(r1, &(0x7f0000000180)=""/207, 0xcf) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:44 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x0) execve(0x0, 0x0, 0x0) 16:50:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0xca, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:44 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:44 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r3, 0x107, 0x1, &(0x7f0000000140)={r4, 0x3, 0x6, @random="08f00793e142"}, 0x10) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0xe276, 0x95678d86075c0f43, 0x8000}, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f00000001c0)=ANY=[], 0x0) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0xd0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 616.904776] device team_slave_0 entered promiscuous mode 16:50:44 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) r7 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x6, 0x24000) setsockopt$netlink_NETLINK_NO_ENOBUFS(r7, 0x10e, 0x5, &(0x7f00000001c0)=0x1, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:45 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:45 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000600)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="cc000000240007051500"/20, @ANYRES32=r2, @ANYBLOB="00000000ffffffff00000000090001006e6574656d0000004c0002000000000000000000000000000000000000000000000000000c000800000000000000000024000500200002000000000000000b0000000000000000000c0003000000000000000000000001006874620000000200000005000000000007030500000000007eff02000300000000000000000000000000000000008d13000005000000000000000500000000000000020003000000000000000000000000000000000000000000050000000000000002000300"/224], 0xcc}}, 0x0) 16:50:45 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "5b41b405e3a25237", "be82db0000f832000000782cf89b08b8", "931ce236", "b6446d4e73f30b85"}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:45 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0xf0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:45 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10002, 0x0) 16:50:45 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10002, 0x0) [ 617.701966] device team_slave_0 left promiscuous mode [ 617.730197] device team_slave_0 entered promiscuous mode [ 617.737310] device team_slave_0 left promiscuous mode 16:50:45 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:45 executing program 5: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10002, 0x0) 16:50:45 executing program 0: 16:50:45 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x3, &(0x7f00000000c0)=0x10001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) r4 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0xfd3, 0x0) connect$unix(r4, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:45 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x10e, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:46 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:46 executing program 0: 16:50:46 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:46 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDGETKEYCODE(r4, 0x4b4c, &(0x7f0000000100)={0x2, 0x8}) close(r2) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x11a, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:46 executing program 0: 16:50:46 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:46 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:46 executing program 0: 16:50:46 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:46 executing program 1: prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f00000002c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback, 0xfffffff7}, 0xffffff7b) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x4e21, @empty}}, 0x0, 0x7b15, 0x0, "c7fda2cfdb48abf47a31a712816baf17acc7ef1eb39443541f290cef178fcb5ad8b86c686057b62d86a539d795e0711ed520d50d8900d6f44294a812fffc67ee853498dcf64f5e15cd383ca234dc82ae"}, 0xd8) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:46 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x14c, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x0) 16:50:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) creat(0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) r1 = getpid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() nanosleep(&(0x7f0000000000)={0x0, 0x1c9c380}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x6) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x145}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r2, 0x0, 0x0) 16:50:47 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:47 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) r7 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x80000, 0x84) ioctl$USBDEVFS_DISCARDURB(r7, 0x550b, &(0x7f00000001c0)=0x7) 16:50:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x14e, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000700)='./bus\x00', 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r1, 0x2081fc) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) r3 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f0000000100), 0xffffffffffffffff, 0x0, 0x0, 0x0) close(r3) r4 = open(&(0x7f0000000300)='./bus\x00', 0x141042, 0x0) sendfile(r3, r4, 0x0, 0x8000fffffffe) r5 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/create\x00', 0x2, 0x0) pwrite64(r5, &(0x7f00000003c0), 0x0, 0x0) 16:50:47 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f00000001c0)=0xb, 0x4) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$bt_rfcomm_RFCOMM_LM(r8, 0x12, 0x3, &(0x7f0000000100)=0x7a, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 619.448350] net_ratelimit: 20 callbacks suppressed [ 619.448357] protocol 88fb is buggy, dev hsr_slave_0 [ 619.458453] protocol 88fb is buggy, dev hsr_slave_1 16:50:47 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x196, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:47 executing program 0: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000001380)=[{&(0x7f0000003040)="02", 0x1}], 0x1, 0x0) fallocate(r0, 0x20, 0x0, 0xfffffeff000) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000000180)=[{&(0x7f0000000400)=""/127, 0x7f}], 0x1, &(0x7f0000000d40)=[{&(0x7f0000001880)=""/4096, 0x20000402}], 0x1, 0x0) 16:50:47 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f00000001c0)='\xfe\xff0\xeb', 0xffffff76) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$TIOCGISO7816(r11, 0x80285442, &(0x7f0000000200)) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:47 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000100)={0x1152688e, 0x9, 0x9, 0xc949, 0x16, 0x2, 0xff, 0x5, 0x8, 0x3ff, 0x7, 0x6}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x304}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "19008000"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:47 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, &(0x7f0000000100)={0x7, 0x1000}) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$rose(r7, 0x104, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 619.688173] protocol 88fb is buggy, dev hsr_slave_0 [ 619.693294] protocol 88fb is buggy, dev hsr_slave_1 16:50:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x0) 16:50:47 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400203) setsockopt$inet6_tcp_int(r5, 0x6, 0x10, &(0x7f00000000c0)=0xffffffef, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r6 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x7, 0x10bcdc4d04b657cf) ioctl$IMGETVERSION(r6, 0x80044942, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) r7 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200)='/dev/video35\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r7, 0x40106614, &(0x7f0000000240)) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r1, 0x4008ae48, &(0x7f0000000340)=0xf000) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r5, 0x84, 0x12, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r10 = fcntl$dupfd(r9, 0x0, r8) r11 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0xc000000000000000, 0x105400) ioctl$RTC_WIE_OFF(r11, 0x7010) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x4001fc) ioctl$PERF_EVENT_IOC_REFRESH(r13, 0x2402, 0x6013) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 620.248123] protocol 88fb is buggy, dev hsr_slave_0 [ 620.253402] protocol 88fb is buggy, dev hsr_slave_1 [ 620.568130] protocol 88fb is buggy, dev hsr_slave_0 [ 620.568147] protocol 88fb is buggy, dev hsr_slave_0 [ 620.573274] protocol 88fb is buggy, dev hsr_slave_1 [ 620.578286] protocol 88fb is buggy, dev hsr_slave_1 16:50:50 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x1b6, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:50 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x0, 0x0, 0x0) 16:50:50 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000140)=0x7, 0x0) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r0, 0x406, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:50 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[], 0xfffffffffffffc60) r3 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) splice(r3, 0x0, r1, 0x0, 0x10002, 0x2) 16:50:50 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x0) 16:50:50 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) sendmmsg$sock(r2, &(0x7f0000001180)=[{{&(0x7f00000001c0)=@rc={0x1f, {0x6, 0x1, 0xfd, 0x7, 0x1, 0x9b}, 0xcc}, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000240)="89c1589d6724149cd9f984858298292e6dd37705d4057a6a90ebd1223792a5d3727da96463b2557010b0e92dc5dd3dcdb1498bb2ec330f0d44a1f650d1721db60c0dc3a99c8bcf5d2832a4518d903c5b187995dbe86921971e8fd19d490684f44a68286b7204a36f9e9160878ed55af8eb8432c928339c64d4e0c3bbef8fcc7e27e9f19417ce3e7b47ee8b5fb85060dbbd5f382df4f6c0adf67a89", 0x9b}, {&(0x7f0000000300)="8ff4da6e9e89cb73ba397316d556d78fc4eb14532da427026b1810b0b1d59496f9d2434300cba58e068dae5dc9b59953e1f29b32594a5ae035745bab9c76b41ee4743ec72eac72283be0f845231fb96fe4908ad9280503e22cd50967e9126d76f197712b24abfef765e31e3d9528589df2dcfbd0f273d6f0c12553413b77a9e67e", 0x81}, {&(0x7f00000003c0)="7b91261a18763e45e456fdb2c15282f912985c1acd40fdbda40ef6aaffb6f36f855caebc8608cc8692587721820d8524b7a82eb2f2c6c48a24c98b382ab0c974eb1f72e9d7f267b6889d7f3b24dec500969985fba275144f1f30d3e3e66d77bb6a21f0e8c86b2393eafd21a6be26298e6b90ae5e50402272f283204bc4d33d9fc20487a2eca0958a263789f45dfb546fda3de9200d2bdc3809736ccb5f598782583d641b11e66be210621122a93495ad720d071f02d022a9586b40f30bcd208fec8a8ce00cfb92bc60e4d0153889248ea52a4009ad4c022937f08c782afb83ce78031ae45a16b77b3f60a250bb5425", 0xef}, {&(0x7f00000004c0)="5ad53869cb1f3129999efe1bd98553a9a7649f62bf14d288dbcb540d1f44345f82c70edefe577fad54f50d2a4bab8146bf3e618c56f92ef828afaeef635d43b153608bbebdd04ecd8498bc0bceddc11ecc424eccc0490fa661b5669784407abf25ec5467de38d9c02f240e975c6e65fa4cdb6cb326fd7de40e10b097b7026d575400f60c0c1ae3bb6f3e5dcb33ed37081c7ebb7872c6c380145ca7dc4dd27aaa6ea8390b306627703d0ee9a8647cda4d418d90acbc3dc09749c6c34bddb9", 0xbe}, {&(0x7f0000000580)="0080e6c62e9e00f1dda0d11d87418adc469b4abead0911bca1cfc82d58bce1804d8e03761c92f866600912f7c318719efa432063d8800e8050643e4fb172a00585fc6bc66851d4f69c22ff97263a374c6163e7c694d4cb7c7b909a4e33d0ae8adcd9fa0e5c8b87a6bf3f93d54ef1a687be", 0x71}, {&(0x7f0000000100)="2277381d3886970474b18429eb136af33f0c9b6f1a47201b870842a8b943aafc52f8a6", 0x23}, {&(0x7f0000000600)="b8dcc151980f8d68a20efcc0b98ddfcff287ffd2a0da3d6393acc38fd672f17791906f06c1141a1b6970cb0c738f0ec7a4063d5f1b14db09c2939e735bddf24ce3efea9565ba0f458003978f4fb83f0d715138f1ed94459aa1c1b803a7ab61edaea9fb166049e403a4fbdb6e947b2f343a0648da3c", 0x75}, {&(0x7f0000000680)="a379b12bc0a7b004ca5f8817f0e82c86bdbdb131295d81750c68ef5c44836dee238d9c531cedc35c5d82d2010191ab251f596c4cecdadfa9ebc1a7efd7bb176c674ed6cb62f6a0d0b8ac0a3442574f3285911f0015be8848b0293bbd5d8f97d76bb66e405c9cde4864217b", 0x6b}, {&(0x7f0000000700)="350baa2f5b1203b147340a667c77cb688301cae6339faeec2b6e6d8fad466318e1220fc92d7c914468914f3e306bf8fcaef027b6e0849c84e1edef37bb5e5568e81c62ea2c70e3cc801bc33c11b6c6ff75a672629ec434233efd2a014aeeb27b9f99c793e16bf7f399fe1bc1b10962a809db05c9133df1041fd691b1cbf817dae8ad79d99b7833ccbaf94a1d0ef5633bb59829a279c07ca52bc7ec3d749f2f3d5f4578bd5d6c9bff047b37b89791346e", 0xb0}, {&(0x7f00000007c0)="8380314686045dc2dfe29acbecbd781e8ab50c902ad66cc1da5c20438f2258e25d1a0496b39e2b87a50d2760d73bfe3396ecd6bc409771ed3fee941088f29af0339a31bdb68e507509e61c3eab1d9a4e884867a6bca5f1402839ec162df3566e83af6a9354168683bbd91c7d5064efc8333707964a0e2a0694cae593c57bc8e9a49ef8f80dd502e0820edef5d4d5a8fe8341682b5bc474c33d2962e6130fef408462658e1c52182037ed95dfb213df9ab16e3a334e6b5e19b10a8c976cbf49961a8b88d66d6951dadc124919f010abe9028acccad1d4125e90846cd3543d7b5a3c6871eb24434b89b924cf0a7d571f09f4aeed508b6ccfce29", 0xf9}], 0xa, &(0x7f0000000980)=[@mark={{0x14, 0x1, 0x24, 0x5}}, @mark={{0x14, 0x1, 0x24, 0xb2}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffe01}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}], 0x78}}, {{&(0x7f0000000a00)=@caif=@util={0x25, "8d5db8f2188516bcf1bd692892c654be"}, 0x80, &(0x7f0000001000)=[{&(0x7f0000000a80)="d831cf7f4a909943df77e4c2ad7d6c4461d07657de7c3d0faf57a265c48e3e2b9bb964662aa0ab994028eadb65546a19037312293b7ec25213afdbcf9c4473fd02482aabb0d895bccc3d9efe9afe361bc7d610c80c3ce3f7015909a5b3b78155862c1b406c6d8cac415e6dc39e040aa328963eb65b121b1eba1e9b976517d6505d7e9dafb8fe63b3dec6cd511d265ebdd8eec7f86da4798fcf13c3961dcc3fffb88f0a470a46c7e03862ca862651acbfc44a19efd9d4bc719f6686ad4b3d6c4006879b6feacf7f24c981a8b8e3108e8996d118184f0b53a40eb5ba8328abe38c67a91b2cafa554", 0xe7}, {&(0x7f0000000b80)="bcce05d50a5c25277bf4e8a917be0037d550c12972eb62a324b254f81fc0bc69cd7e4853ab8cd416a56eaf87f0dfbc9cd4515dac82e87c1967078c4d20e30833d8d4ac4b929cee7a9bff31165d24b8cadef76c8f2ad7daded0326dcaa01a3570c9df654fe29e84a755520b881393ef622a75bbda95a80806c5a4d9952e7de834f43a626a45d2ca8f12387e178b27fac9a7d46a5aaafbe351cf2bcd8805718d3ece052ab92d5cd31958ba2d0962527b11fdd4e8683588c36db8ac8b3220417873b1bc8f2aa241df3a9ee93ddf1b70debba432b28215218202737bd5ece4abb123c8eb3c679085603e75304f9de2", 0xed}, {&(0x7f0000000c80)="f0e2eb327beca248dba4afbccb9c3a284042599515356743bc65459fb60009bb788998d6a91cbab6abe7c73ce793183da0473ce56dbd751cc7f4bcd2503ec9b017baced3bf7b5afdb33522b9ce12b8d3cd8c9bebf86a529f676452d001448c9846a8be32df084bea4b6b2d429dbb5e90583baf5ea8b0ed97cf8d9c", 0x7b}, {&(0x7f0000000d00)="6ef33c785f2b37bbcf5327a0e3a5cbf20ad424d8f3281ef6797e5ea42117a4ded58a9ab9c8a096e18b2ff53cd82ab1cc50e5a50c28d474ae6ff67a0ba98fdb1821680d6b4a9db730a4fdc40892c2c62e901a1097d21e83fc5fd435c4e96e29219b8218657310", 0x66}, {&(0x7f0000000d80)="fb7a0a57ca8c5dce4b7f4237bc253eb7c1b8cf8df10b9eca4dbb2e0212b8ed04feee2e2eb250c1258bcc0d094aef54da6a414849284b9ab0febe5e0f9895cdc5718bc7ab0d80ee62d3429edb45966d66d4a684bb83ae86f99febec84a8257445108cb2c43bf61ac07269fbca5c5d", 0x6e}, {&(0x7f0000000e00)="150340755eddc77357f6387e785f146ecb170aa7efbb3149664c7ec88f0430c6de331544009ef334e01965224a0a5312492486bb5619d03c7185cb0ab80bd175c2d627d385888fdf25828475109b10e185eaf141faac12ad5e46045b3c845b262f2653354e69972edc119c53ab4e8d3f28e8d5", 0x73}, {&(0x7f0000000e80)="89eb4872ba2c3b3cd7fa50d091a655b6", 0x10}, {&(0x7f0000000ec0)="cc7267c78b0324790f5918ec125590bc7bcfb9e24ab88033f921e2f18627751fea9de2b8098f87ec8558936299dc9953e5e8306e8b075cb81b379105ccd32360b4753ed2b3c19316cd7b696ac30d61ba4d88b2da7507635bc9a6c77d5faa0606f421f1671970da4f7b719f2f5faac28b2754152d86b2ba41db4fa79bb595b054552d4649ff9f2718c5bf0c12990508b5", 0x90}, {&(0x7f0000000f80)="b4dfa3d0d411b7c0a7f876aad3ff2227e54abbdbada570fcd719dc937b1cffd3dfbf261a0706f7d7fa20c9e7f640598b86130984aae58ff6e53d5b5d6cc06d7ce0633a7845d8baf38687445956", 0x4d}], 0x9, &(0x7f00000010c0)=[@timestamping={{0x14, 0x1, 0x25, 0x10000}}, @mark={{0x14, 0x1, 0x24, 0xffffffff}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x1000}}, @txtime={{0x18, 0x1, 0x3d, 0xd80}}, @mark={{0x14, 0x1, 0x24, 0x6827dce9}}, @mark={{0x14, 0x1, 0x24, 0xfffffff8}}], 0xc0}}], 0x2, 0x8000) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:50 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x6, 0x400000) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:50 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x1e2, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x50aad39e641902d3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000003c0)="45e14f8d3305000bf5f6decb000065c352cfa85b0061") r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f00000002c0)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000100)={0x68}) write$sndseq(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0x72c6831c) 16:50:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x20000000084) clone(0x2002102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000000)={'n\xc7y\x00', 0x0, 0x0, 0x0, [], 0xfffffffffffffefa, 0x0, 0x0}, &(0x7f0000001280)=0x3d) 16:50:50 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) readv(0xffffffffffffffff, &(0x7f0000002a40)=[{&(0x7f0000000740)=""/78, 0x4e}, {&(0x7f00000007c0)=""/30, 0x1e}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/235, 0xeb}, {&(0x7f0000001900)=""/75, 0x4b}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000002980)=""/133, 0x85}], 0x7) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000002c80)=ANY=[@ANYBLOB="000000000000000026020000120000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001080000000000000000000000000200000000000000000000000000000000000000001b000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000288570d3e02d025cbeb9069424db3f00444b9334e34e94f98965620af768b6bd8e331932f218d972f645bb84a6ebe9e9d271488dc5568f5580fa2ff35d62ff4828ba59f5aeaf71be9f1e8b5fb6343ef696dae130a90118326446bbf266773f38fe8d5cd6d838962ce705392ee46742fed32b3edd42a626304ecaf6dace6011382f"]) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1bc06b92aaa8cab0, 0x810, r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r8, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000200)=0x10) ioctl$TIOCGICOUNT(r6, 0x545d, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) sendmsg$rds(r10, &(0x7f0000000700)={&(0x7f0000000100)={0x2, 0x4e20, @rand_addr=0x7}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000480)=""/20, 0x14}, {&(0x7f00000004c0)=""/248, 0xf8}], 0x2, &(0x7f0000000680)=[@cswp={0x58, 0x114, 0x7, {{0x1a, 0x4b}, &(0x7f0000000600)=0x40, &(0x7f0000000640)=0x9, 0x4, 0x7, 0xc73, 0x3, 0x8a62b3d895949946, 0x4}}, @rdma_dest={0x18, 0x114, 0x2, {0x6, 0x3}}], 0x70, 0x10}, 0x80) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b00)={0xffffffffffffffff, r1, 0x0, 0x10, &(0x7f0000002ac0)='/proc/self//exe\x00'}, 0x30) r14 = accept(0xffffffffffffffff, &(0x7f0000002b80)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}}}, &(0x7f0000002c00)=0x80) connect$vsock_stream(r14, &(0x7f0000002c40)={0x28, 0x0, 0x0, @hyper}, 0x10) sched_rr_get_interval(r13, &(0x7f0000002b40)) r15 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 624.728180] net_ratelimit: 19 callbacks suppressed [ 624.728187] protocol 88fb is buggy, dev hsr_slave_0 [ 624.738100] protocol 88fb is buggy, dev hsr_slave_0 [ 624.738266] protocol 88fb is buggy, dev hsr_slave_1 [ 624.743253] protocol 88fb is buggy, dev hsr_slave_1 [ 624.753314] protocol 88fb is buggy, dev hsr_slave_0 [ 624.758382] protocol 88fb is buggy, dev hsr_slave_1 16:50:53 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x1fc, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={@local, @broadcast, 0x0}, &(0x7f00000000c0)=0xc) getsockname(r0, &(0x7f00000045c0)=@hci={0x1f, 0x0}, &(0x7f0000004640)=0x80) socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000004680)=ANY=[@ANYBLOB="9c0000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="00200000000000007400120008000100736974006800020008000200", @ANYRES32=r1, @ANYBLOB="080011004e240000080011004e220000080005000900000008000200", @ANYRES32=r2, @ANYBLOB="080014001f0000000400130008000200", @ANYRES32, @ANYBLOB="03000000", @ANYRES32, @ANYBLOB="08000f0003000000080012004e230000080005001f0000000800040001000000080020003f000000"], 0x9c}}, 0x0) 16:50:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYPTR64], 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KDGETLED(r6, 0x4b31, &(0x7f0000000240)) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10002, 0x0) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="8807628d", @ANYRES32=0x0], &(0x7f0000000280)=0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r7, 0x84, 0xe, &(0x7f0000000140)={r8, @in={{0x2, 0x0, @empty}}}, &(0x7f00000000c0)=0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={r8, 0x7, 0x10}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r9, 0x4) 16:50:53 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10002, 0x0) 16:50:53 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x304}, '\x00', "36cddb6229f81c080000ba09009b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r6, 0x84, 0xe, &(0x7f0000000140)={r7, @in={{0x2, 0x0, @empty}}, [0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f]}, &(0x7f00000000c0)=0x100) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000100)={r7, 0x3}, 0x8) 16:50:53 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10002, 0x0) 16:50:53 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10002, 0x0) [ 625.352670] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 625.365290] netlink: 'syz-executor.0': attribute type 17 has an invalid length. [ 625.375226] netlink: 'syz-executor.0': attribute type 5 has an invalid length. [ 625.387137] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 16:50:53 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x11, &(0x7f0000000100), &(0x7f00000001c0)=0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet6_group_source_req(r2, 0x29, 0x2b, &(0x7f0000000380)={0x4, {{0xa, 0x4e23, 0x3, @local, 0xfffffff8}}, {{0xa, 0x4e22, 0x9, @mcast2, 0x1000}}}, 0x108) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) r9 = shmget(0x1, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_INFO(r9, 0xe, &(0x7f0000000340)=""/64) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) r10 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x20aa20, 0x0) getsockopt$inet_int(r10, 0x0, 0x29, &(0x7f00000002c0), &(0x7f0000000300)=0x4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r8, 0x84, 0xe, &(0x7f0000000140)={0x0, @in={{0x2, 0x0, @empty}}}, &(0x7f00000000c0)=0x100) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x13, &(0x7f0000000200)={0x0, 0x8000}, &(0x7f0000000240)=0x8) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) r11 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r11, 0xc0c0583b, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000002602000012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010800000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800"/695]) splice(r11, 0x0, r1, 0x0, 0x10002, 0x0) 16:50:53 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:53 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x25c, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:53 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10002, 0x0) [ 625.698205] protocol 88fb is buggy, dev hsr_slave_0 [ 625.703593] protocol 88fb is buggy, dev hsr_slave_1 [ 625.928151] protocol 88fb is buggy, dev hsr_slave_0 [ 625.933298] protocol 88fb is buggy, dev hsr_slave_1 16:50:56 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:56 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", '\x00', "73f30b8500"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r7, 0x29, 0x39, &(0x7f00000001c0)=@srh={0x3b, 0x14, 0x4, 0xa, 0x2, 0xc78f5c5b4dfb111f, 0x8001, [@mcast2, @remote, @remote, @rand_addr="04ac62ecc4e55527cc7fd90cc006e53f", @loopback, @mcast2, @dev={0xfe, 0x80, [], 0x16}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x15}, @mcast1]}, 0xa8) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) write$P9_RREADLINK(r0, &(0x7f0000000400)={0x9, 0x17, 0x1}, 0x9) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r8, 0x84, 0xe, &(0x7f0000000140)={r9, @in6={{0xa, 0x4e24, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}, [0x0, 0x0, 0x0, 0x0, 0x8]}, &(0x7f00000000c0)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000100)={r9, 0x7}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000002c0)={r10, @in6={{0xa, 0x4e20, 0x5, @empty, 0x8}}, [0x5, 0x0, 0x2, 0xe000000000, 0x80000000, 0x5e, 0x3, 0x7f, 0x10001, 0x101, 0x5, 0x9, 0x10001, 0xfffffffffffffffd, 0x40000000000]}, &(0x7f00000003c0)=0x100) 16:50:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x25e, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:56 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cd5b62290000000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:56 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r2, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:50:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:56 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x3, 0x10080) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r7, 0xc0105303, &(0x7f00000001c0)={0x5, 0x0, 0x40}) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:56 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x298, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 629.848186] net_ratelimit: 20 callbacks suppressed [ 629.853231] protocol 88fb is buggy, dev hsr_slave_0 [ 629.858340] protocol 88fb is buggy, dev hsr_slave_1 [ 630.088165] protocol 88fb is buggy, dev hsr_slave_0 [ 630.093259] protocol 88fb is buggy, dev hsr_slave_1 [ 630.648095] protocol 88fb is buggy, dev hsr_slave_0 [ 630.653198] protocol 88fb is buggy, dev hsr_slave_1 [ 630.968143] protocol 88fb is buggy, dev hsr_slave_0 [ 630.968148] protocol 88fb is buggy, dev hsr_slave_0 [ 630.968208] protocol 88fb is buggy, dev hsr_slave_1 [ 630.973258] protocol 88fb is buggy, dev hsr_slave_1 16:50:59 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:59 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f00000001c0)={'syz1', "375fd54ddf30f3dd83c93708dbb34452405893087e92e4e57d1d310cf0cd161f6201b3b8c3737cf767a31787d7e7653fa01e79de1c3c8db1712d57471ae118d8fb1ae31ef279eb103f5a8d923b97a69f4f8864dbe93f68940d898b9be29addb1de76885e3ad1323752fdecca7d1529e02e2ccc4dc9665309505fbd13ca1a9f892beadd833f6f"}, 0x8a) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x4000, 0x0) r5 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r6 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r6, 0xc0c0583b, &(0x7f0000000180)=ANY=[@ANYBLOB="00000000000000002602000012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000108000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eeffffffffffffff00"/697]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r9 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r12, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r13 = eventfd2(0x20, 0x1) r14 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r14, 0xc0c0583b, &(0x7f0000000a00)=ANY=[@ANYBLOB="0000000000000000260200001200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010800000000000000000000000002000000000000000000000000000000000000000000000001000000010000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009a35b6da0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e2ffffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000895a4ebe6533b872abcce038d73b0000000000000000000000000000000000f1ff000000000000000000000000000000000000000000000000000000000000000032e8b51200000000905c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000048d5bd2fb42593b13c92b70b071b0cdeac3656da0ae618db520bec27e9849589c2e9f2b63ef7e14e00000000000000"]) io_submit(0x0, 0x8, &(0x7f00000009c0)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x5, 0x3, 0xffffffffffffffff, &(0x7f0000000280)="b5ffb9e468746890da620fa08b140e45a224db2e0f0c7337f133280e85e71fd2b74ad78bac7ed1d61fe149906b0b282effa7280de5af9f8b3db078cb303d5c5484d335fcfd50c7b1158886642fc9ab3fbd82be81cfd3210ea96220c81272baf7910809c7342fbe65430dd5736bd9e92e8212d10a66d22fc7a7b9ed960604b704b2f4a038e610b28dfbfcd17f0e7b65da47c4c728de9bfe2c4b01b55ea9352bca7cf4", 0xa2, 0x0, 0x0, 0x184429efcff9201, r4}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x8c85, r5, &(0x7f0000000380)="5f6e5f2af02d864161cba8fe0eb0c7403001ec7c3f925d2576d62a533e0c8fe9d01a9908f589f41c25d596a3ec170f3458d815cdd720c459697559c572c3ecd4bd1ebc89b993d5125d98adbfa95492d21d33decfff6952f56ed73e845c7a66234b208e586f4e0456d5967897844a059ca7bb766df874d441cd647dfca774344c267db7d44e501076a6a23e471e36cc35c4563f0d0b7a733644c6123f104ccd2d19ab2c6e0e00e5bbd2d3c60bb561af469145946e8bbe1cd36552bc810d126fd8a696f29f97", 0xc5, 0x4}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x8, 0xccac, r6, &(0x7f00000004c0)="d20b44dc61d95ec484b33319b044361fee14a5d3945ba98fd526a2c1d0185890fd2c2e143dd95d43aa31bb3a57dd69e661c9fc104b98bbfa7ffeb3771fd615cacdb246f3eb29cae6617f99eae0d7c741926a9bd44f6e6af7b06accbce8aeffe893a49930812dda6dadaff02bd9c289643724bed15c0c", 0x76, 0x3, 0x0, 0xf4c1c4554cad52e1, r8}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x8, 0x1ff, 0xffffffffffffffff, &(0x7f0000000580)="542e17e66d5304187b080c78b6fb17a0ad6cc755432a0b6d658a6d698180d48e6a5217569a58181b5da71600790b61ce961793220f624b453b0d38f476766c83478d36a58ce9a3", 0x47, 0x4, 0x0, 0x2}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x1f8, 0xffffffffffffffff, &(0x7f0000000640)="7c6ed86dbf1f54e557bd4c525676cea3e6e17036733ef389bcf6f282e39f0039874b3a68fdc8ce6d80d8f93e9b585a5087f232d3086dbe788d248d0a626e1854c33c3f43f116b69fba1c7249532ffadabf864a36cb4d59fddb7236f37383df5ce8cd5818d3e82a94aed9f32903edb87a9f59656308549b2de6fbb8f13915e544cfcfc43a835e8f4578c1be3d2704b76ae219bd14cec91cab34f599b70373f2d2", 0xa0, 0x6, 0x0, 0x2}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x1, 0x6, r9, &(0x7f0000000740)="a5398943df40f8d36e0b7092495bf49a80c4196fe3f05816f3c447a9114bd73f10b3eb370037d52c0d81ad06268fb523449ea4ead1cb60abfcb2134016f5e99ec9f39c1cbd6c29490ffd69975a2c19674f6a21d2727661b1d3de31284cb8ee73bfe690e026d6043b60ebf25d287c06542452b887a00da5d88051b176ce9ad5fd2293263de07e62a91706e9c7c8c2879d2e09d7f5eca4ee4e783922629825d7a955b12969dbe50f4dfd5c4b84a85af90ae9481376627c", 0xb6, 0xfbb7, 0x0, 0x2, r11}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x1, 0x1f, r12, &(0x7f0000000840)="6c6c6574d5b8b550148122c5ebadf887066c2c558ba37f76420912935c479849301a6e4aa75a16e8c3dd9206ff3c7ac2365e566b84d4ca77537ce195f84b50cc08654d2afcbf90a37cae079b8b9d0f7429c23532cdeeb1fa378d96193f8075a3d150775a89b89a45dec4c49a07723512c32f2eac7f1f6855b11bbacd131792a466b9196318d7ffd3124e8da5bfbc17f12e8e3901722cf2bf4e176599ec5e7df60b8de4434290594d248f17840c7cd103491709c0ebb2", 0xb6, 0x100000001, 0x0, 0xa93f00d137212264, r13}, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x8, 0x4, r14, &(0x7f0000000940)="2a9424cf2b27c93d83fc73fc168965a6c82531f1b66181b6704e93fc9463ab066edc15b966", 0x25, 0x5, 0x0, 0x0, r1}]) r15 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x1) 16:50:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x2d8, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:59 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) getresgid(&(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200)) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:59 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x2e0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:50:59 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) syz_open_procfs(0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) fcntl$getflags(r4, 0x408) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0xd) write(r3, &(0x7f0000000040), 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:50:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) 16:51:02 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x2e8, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:02 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, 0x0) r2 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r2}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r1, @ANYBLOB="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", @ANYRES64=r2]) ptrace$getregset(0x4204, r2, 0x0, &(0x7f0000000340)={0x0}) getresuid(&(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200)=0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r6}], {0x4, 0x1}, [{0x8, 0x6, r7}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={r2, r4, r7}, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = socket$inet_udp(0x2, 0x2, 0x0) close(r10) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r11, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r12 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x840) ioctl$IMSETDEVNAME(r12, 0x80184947, &(0x7f0000000300)={0x8000, 'syz0\x00'}) connect$inet6(r11, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r11, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r11, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = fcntl$dupfd(r14, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) write$binfmt_elf32(r9, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r8, 0x0, r10, 0x0, 0x10002, 0x0) 16:51:02 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:02 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r6, 0x40505331, &(0x7f0000000480)={{0x9, 0x80}, {0x2, 0x1f}, 0x7ff, 0xac2c662b5d6680b1, 0x1}) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) write$binfmt_elf32(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="2882392fd60666aff2913d9794e055d057feb8209ffd116edb7319c95cb8e01639e88e802c7d384bc5c9e3e8eba4baded6b607ff17f149060c94b01ddeac30db062082480ddca1c049960da46ac827d0b2803922e2436987ee8ad5e4a5484a5afa24a6ddd0fc6d542c95b259d1fc91cbf45c540317d53e1c7e4beb41b3667dd57c4f124086742129626af9c88e538d55e8a6c57d64bb18d7eee2664297532b7c3394d4f11dbf30e05b404c753d2780662e5aa7e88346312d796be0e6faea8ca96dfb84e196c7175c99c77dfb692c42c2562e925af1ebea0384477615"], 0xae) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) 16:51:02 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_FMT(r5, 0xc0585605, &(0x7f00000001c0)={0x0, 0x0, {0x4, 0x20, 0x42c9d74b9591d5c3, 0x7, 0x7, 0x1, 0x0, 0x1}}) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:02 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_G_AUDOUT(r5, 0x80345631, &(0x7f0000000100)) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000001c0)={0xff, 0x75, 0x1, {0xf4, "9231b503a17caba5b17ad54d2ad2671f9e37f0b8f54d5ec84827327ec4d496f8fcb22633005e2e7b216ccfa49671acfbef3b447b1cc9f20398c608495cb0c9764235ccf94d8982f8e2c6cba5033b4cbf395271451a3478bbf6327ba42e10ff2106e38135c85b2c45b7e109f08e982d4bdfb71b85d77c4b3dee6517b937c7c29bd124e57c307a1f99a2527ceabe700b7402dcc29f0cb750d206f9275bcb115989a6e66188d6d2121ea686fb1f4ec97f313bb44914fc5c117cb9712f5c5f29dd1c4120c0d47ba2a2abf1abf3a6bbfb02b937b24aacd62d267b95ec34ae882aafd08eba0f1520620348e295c04ce0708a2161a7d742"}}, 0xff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x2f4, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:02 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f00000001c0)=0x18, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) sched_getparam(0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:02 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x300, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:02 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_S_PRIORITY(r5, 0x40045644, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) r10 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x800, 0x0) getsockopt$ax25_int(r10, 0x101, 0xa, &(0x7f0000000b80), &(0x7f0000000bc0)=0x4) ioctl$FS_IOC_GETFSMAP(r9, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) write$binfmt_aout(r9, &(0x7f00000001c0)={{0x10b, 0x20, 0x8, 0x33e, 0x242, 0x7fff, 0x2d4, 0x70000000}, "e0389a2f8187e7e7c010c68fd297d0397f2a7d003d93b3cc6cc22bcf6cd650b50b0177db36aebf9ca5838292b1bdfbc5fb7029c86e89cad29cb9e123c4d69fa38d9a1b0cc3a89facd11b4464ba4e661593fbddea15e7914e24f9091fa1b8d6bf764ea9e5f014392732bb7f65afba09387d9f3db17a2b3488d3ae8c040964f3e6626b0395d814cb5184844a766d0980f1", [[], [], [], [], [], [], [], [], []]}, 0x9b0) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 635.128125] net_ratelimit: 20 callbacks suppressed [ 635.128134] protocol 88fb is buggy, dev hsr_slave_0 [ 635.128170] protocol 88fb is buggy, dev hsr_slave_1 [ 635.133192] protocol 88fb is buggy, dev hsr_slave_1 [ 635.148359] protocol 88fb is buggy, dev hsr_slave_0 [ 635.153443] protocol 88fb is buggy, dev hsr_slave_1 [ 636.088512] protocol 88fb is buggy, dev hsr_slave_0 [ 636.093676] protocol 88fb is buggy, dev hsr_slave_1 [ 636.328161] protocol 88fb is buggy, dev hsr_slave_0 [ 636.333256] protocol 88fb is buggy, dev hsr_slave_1 [ 636.888112] protocol 88fb is buggy, dev hsr_slave_0 16:51:05 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:05 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000100)=0x1008) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000001200)=@assoc_value={r7, 0x8000}, 0x8) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r8, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r8, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r8, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r8, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x34c, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:05 executing program 4: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10002, 0x0) 16:51:05 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) 16:51:05 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_SET_MEM_TABLE(r4, 0x4008af03, &(0x7f0000001500)={0x7, 0x0, [{0x102004, 0xe, &(0x7f0000000100)=""/14}, {0x0, 0xea, &(0x7f00000001c0)=""/234}, {0x6000, 0x72, &(0x7f00000002c0)=""/114}, {0x2, 0xff, &(0x7f0000000340)=""/255}, {0x0, 0x1000, &(0x7f0000000440)=""/4096}, {0x100000, 0x7f, &(0x7f0000001440)=""/127}, {0x5000, 0xb, &(0x7f00000014c0)=""/11}]}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:05 executing program 4: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10002, 0x0) 16:51:05 executing program 4: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10002, 0x0) 16:51:05 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) bind$inet(r3, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) bind$inet(r3, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) close(r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TCSETXW(0xffffffffffffffff, 0x5435, &(0x7f0000000100)={0x52dc, 0x5, [0x401, 0x0, 0x3a5f, 0x3f, 0x401], 0x400}) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:05 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x356, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x390, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 640.248229] net_ratelimit: 19 callbacks suppressed [ 640.248237] protocol 88fb is buggy, dev hsr_slave_0 [ 640.258384] protocol 88fb is buggy, dev hsr_slave_1 [ 640.488216] protocol 88fb is buggy, dev hsr_slave_0 [ 640.493390] protocol 88fb is buggy, dev hsr_slave_1 16:51:08 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x3be, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:08 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:08 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f00000001c0)=0xffff, 0x4) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @remote}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) r4 = socket$bt_hidp(0x1f, 0x3, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r10, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r11, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000f000094e083cbdcd1c625fb45548acaf33e00"], 0x48}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x74, 0x24, 0x507, 0x0, 0x0, {0x0, r11, {0x0, 0x2}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x48}}]}, 0x74}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@gettfilter={0x24, 0x2d, 0xf71c7633af80b1ed, 0x0, 0x0, {0x0, r11}}, 0x24}}, 0x0) r12 = socket$nl_route(0x10, 0x3, 0x0) r13 = socket$nl_route(0x10, 0x3, 0x0) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r14, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r16, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000f000094e083cbdcd1c625fb45548acaf33e00"], 0x48}}, 0x0) sendmsg$nl_route_sched(r13, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x74, 0x24, 0x507, 0x0, 0x0, {0x0, r16, {0x0, 0x2}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x48, 0x2, {{}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2}}}}]}, 0x74}}, 0x0) sendmsg$nl_route_sched(r12, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@gettfilter={0x24, 0x2d, 0xf71c7633af80b1ed, 0x0, 0x0, {0x0, r16}}, 0x24}}, 0x0) r17 = socket$nl_route(0x10, 0x3, 0x0) r18 = socket$nl_route(0x10, 0x3, 0x0) r19 = socket$netlink(0x10, 0x3, 0x0) r20 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r20, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r20, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r19, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000006780)=ANY=[@ANYBLOB="48000000100005072200"/20, @ANYRES32=r21, @ANYBLOB="0000000000000000280012000c00010076657468000000001800020014000100000000007e3ecdf4c9cf2dff6a4b1530fdcf8534e78ec87178a2ea1eef0b85109c639d36dccb", @ANYRES32=0x0, @ANYBLOB="000000000f000094e083cbdcd1c625fb45548acaf33e00"], 0x48}}, 0x0) sendmsg$nl_route_sched(r18, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x74, 0x24, 0x507, 0x0, 0x0, {0x0, r21, {0x0, 0x2}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x48}}]}, 0x74}}, 0x0) sendmsg$nl_route_sched(r17, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@gettfilter={0x24, 0x2d, 0xf71c7633af80b1ed, 0x0, 0x0, {0x0, r21}}, 0x24}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000006240)={'lapb0\x00', 0x0}) sendmmsg$inet6(r6, &(0x7f0000006580)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x39fe, @loopback, 0x7fff}, 0x1c, &(0x7f0000001700)=[{&(0x7f0000000240)="74ee77008bf27fa61d2dcba2262b9489f2d2bebf82342f4b7b8c25fec7b987966184d8dae9fa1f4e51ac6df72e04cedc3d6756a98df3180501e9b33e6d9be48ae7b1bf3e029c0042f939e961379504ee6df453da3a13418ddebcfa64be01bc31bf438f19af8e182a8ea0e826f24010d7ec48ee220eb91531cf868ed49f6abee7dd25769dd6644166a62b1de8244700f48da2360a003a47eb855123ada276b62169dfe14512aef826212c0337c6e5da4f35330ad3234af1da6a129089f16e04dc24dfbfd803bbb301603b3e66ce9b9ad24c8e9b448efe3fe39615921895b114ab2c6fff76eddea5f28302e28549cf", 0xee}, {&(0x7f0000000340)="32c81a2c2a5a4f75fbce390f41e60642740857076936ebd3caaa4e1045c5bd2996ddb50a91d2513d26114f6751be7dc07b914ce0c992623e708354bc29a7ab1fbdb51dd682d86f9bb9b4bd412a8956ee0158294e1c83af20a3d2895d3736657cf17067ceac276baad144eb1b0b06b85b2bfcf532a216f3c745787fac098706695e85f4db1afd622cef175b074ca351c8b894d84d0ec6ae87148d58838af19e5c06f036791ba871938c6059328cff491482193946558e7790fdb40aacd28398dd59bd26b269175b31d56eb887c67c1bc40cedcf58c4a813ea87f5913cc9e6f3503d66dec694bde5ccfe888e799fb685", 0xef}, {&(0x7f0000000440)="40c199888c968b0642a2a1a8b0271e05787cd99852a6133d593056a817b47973867cf35e12f6edc2c15a146306a0d6782c5b33a53080939dc87ed4bb1fd381b512815713fdb015e4993618d4d0fefaf6f7cd6ee841c5a4aa32279d40709b474bfbefe1276e6b66214c9408c743ae2523814b6fca81756b2e6a9bcf25ab54f4f2fc5a4e52449875736a16b095f88b1aea7e2a62ee9280ed434038349fe98a42396eeffb694e0e99e64560d628e1b81e6222cb6513c8983a52fbf46715d94f1c44f2d2795ea1ab7cee97ef377a6c3d675d544d87e36d338b61720c680443db6d726db4cb93a6fb1afc61f8989d6864b22efb886df67799795c95fcfab0c318c6da3c4307fb6410eae6acd67a934427e5016b7a09850eddb939a9b958c212900964172775ffba7ea94a033f0aa6dd4bbf4d96d06ecec9248777b4305ff187e560ae7ce70f35066cbefa6b6318a608ad6fc64411c13ba913432e7a4b4ac40140fd71e3d572616c44a829f301bcf92fa2646277254a319c693a9f318d7b0e0ab8b77c2aea825b9e4b1fba3faf618d4e4132a9fd8e2c9f906baac4dbbbd42e55731c66ca47bcc52c030341006ae0dfbfa7405f0ff0c76a0508c3562870e92c17e21147b13e4e15346c6bc4b0322bcc91cbc083139ffae40872ef6709a2f6efd6973a5c90f7637aaab2ac0a0e7c946f6ea260614d88b22dbf96127504ad9cea6521f98a7b094f1c7d8b26d2df1fed990dc909fd5458eb798ef070441939d5c3a8c7411f48c00880150b91c4e67c3df1a06b4d3016813fd13190ec61d2cabb266ae9388ea55b7881b9511a19b37d165241c54b3f7411a5f40204f54d740b1a9e55ff18af88dd994dd1351a86d01bf4fbeb1f4576eebc6ec4077f81025a4aaad3aea915eadf6b845d278a2cfcfa45f081afe031e4d85d90b2dc31e9e738136a8160d0f6452b55a12950a55043faf490a52c506a14333930fe8ad0ad35689daa507a07f23b4ff11835d66b290feb30372ddb3c0692932009cf8a9f9ad55f7f57d62185bdbddd62f13f7d7de65a7eba38ee7bf082b986f2e5f6fb97f6ec42421c7df9b0dbcf5048f1013b597d58d6dad67da384831b55e11d17b5b8de21c74735c7e9290efbd0ceb78d240bde083450b342010f24966ccfa476b3a06d04d14f8080cc0ddebae5e114e5cc4b8c4e5a6b67248a1c1833171251f01a32adaf15ae2eda6b079f88827c0c0905eceba123ee9e5ec63b0183299162a82b8b6ec34029de078bf5835d9d63bc2843b1ca854164f0871e6df6acbb4d394d82af02e12d5a367867108eadcbe793971f9a2c554b51ba722fcf973a56ec904a3d93d3ca8f45b891e52ac14eeaa69b9c4332faa0372597daf2de696a619922b59f110b5b9c663f41e693b9307d157ca71baa5ad984c10ca617532fba4b090282aa2742c11552e88e6297574d0143b712f9fed9f6572322db25390febc018b3f709feb0a5c8c007ed60b4cb3559a4f65184217c8e53f213c692a9ac219acab3c0001373e8ab2a3f8ada3c6cb48dd04a4f2860ab7b8065beee232d6f2b42970fd47cdfc190fcf756cd4583a7943c662fcf7b41058dcf03473ca37405f4e16df69bfa763104dbf9b24725085a4944321178b3bd50553f7d1a7e72d9269adedc34eeb930139c50fd8a5b7156fb9b0734cff29f9cc9b65e44ad773db24f03bf70db959b14e8a06065ef1072487e1f18f03962805719a4e68340a3b12aa1af0a586ba31cc53454ebe1f8458408c949d5e5f64a3fcb0e06a08de8ef221777918e0dc858d9049292edef426d760e985a0fed335227fa6b3cb5a6f815decdac8b87314242e2a734419402739de317755edcd84e8962330e9bd600eee32a66465f56627381f11ef7dc0eabc9344c50678a848c09303ee66df1a2e319ba7b5df5f3a773c745e71f4cedbe9ce3b79efefcc07434984b2ef937986ad275f951c99efc755a7ee5875a63ccd404ca3065b270d5c298fb1aa6d87e65548e3bb4564a9ec719e9a8c51920c121a4bffee78b51930b7cf3c20139457e6e08b72115788a8a12ae5924ea254c4cde658d1e187fdd3bd280cb7ae18287b60c8effc3b64c73cca7b07a9865edef1b59cdc48acc9935873e13c781ae54e64b75b9db6917b27ab484970f3379fa42ac3b60d6064f00b0c5437821a4e8f30559dde4a862723c0d49ee47a03870e5fbc5fa816d38dd40a01b963122ce8674dc486b662cdc657c4d82d6f8ff8ded9b6e8eab021642d477e397c475d20a8e2c4bf87b9d1b52e1887c0ab394860fb45880a783448b717c52d3aaf7375f85c144c016a411e07808f1aee9bcd8272ba24ade9f005871c0d6ae1dfef8a06bab020603e8b7bfe7cb5dda12d30ba07558fb2e1ac12990941916f0c3ff2c976438d125c49c428662ae2115fb7cd6a38bc83ee0fbd57a655e8567991f1ec779de28a02b2ad91ce2acc9c28d84d11c3f76677457b38b91054146e9bea7bd11dac2f34b223e445ad7e743fda5bfd0651b48b53ade68839b734437db6eae16bcb86602d215c3f90b800d4e44024fb485b454b740fcdba6ba42d4b9d4baba2d61de8102b8c8ff9fac7ec211e907e15026ef9dc5eb4ba931334d5f71606d459657bcef49cdb9a9742e39eb0664ecef7526d13e2ae393bedee66be088c8ef20d71aa0c7d836afc4bd5d2a3ca15049fe5e322879a168687802aba6847e5b20660cc69527b18ed5587a75004655ea3df47c545a14ec9d21fde0f662881c18ad429c5898aaa696e19c0b640ca94f9573e6b6a6a05eaa1ff072b25adf6a1a4d2012bbf00b3bd6f6381793404cdb57d730381c9321f8c3b0fa8ff6ad20acdd2f74fd5a94b43a910e4dd619e02041f59d335c6ed7fa82870c6ce35fe81ad6cfcf4e39cb4c59de49ef805dd68b539459af65f8c1c515dc50271f61a25e999e26cd223d2134512e3539c7b2e834b9068a05488662dddc76e6f0a7e3586d71098eab1f8f2064ed714b1ad1971fea0fb77624db22c92d66f068440f66e5d505403a0615b232ed4876261de8ed9cc38fcd53c4d6390e1ebad838bd3275bf3fca6219e1f164959055f7ff1645b1e469d782eafaa8a23d05c522144cfd63037d8c421bccced4b9f22764a219e91a797e11b569a494b7f530dea75efe17891f50f07e25a1681edded06251feee00716c33b57720bfb09cf931837dd20d5d717ebb20db105f42f30bcffcdfacab4e246b595ec0ab8414809fa090d36bf280e00a9743958e6603389053b3353add00825e64ac8f8e4cacb106ed8211d2aea55d73ce9d9fbf2ce84bf3aa33e7d7c52f87d840a6261b352f45a61aab8a28dec5344ee76ffef48ac05983c9fcfc2082eec3e3055b406336aeff53baca3ac2a835432922e4692e4d2f2de829368c27d07087265e253853d56c938e641ffb723f98ea7df9748a20d7f039aeda0bd9101bcd2213d01dc4c21c2428a842d1be24bc076e432c848e357403ff9faf40fefcef672923c6892a708bb43fb8a30514836d7c800e45f997d59c56cd296f8b6de0dc2d4e64a8d91ce6ea0c6500667a78e8867e2b2bc47bab3927207cf64bac9c6b379504c183207f7eefa71848bd1ec6a1cc894d9a93eb205b7fadea0a1a4afa4185b34730c52c4cecccc17da2963e553441f82630450651518f685bc1ba9ae1855417d95241741b02c2bea17e13367ee770b49a69e31e891d5b1ac880f9c3cc6f064053364306b9d23a51adc92be27db2eec8ed458062483556d353b4e1af6932c875ae0862788f5f8dd94b7f45fe490e1dfa9660c040821a77a78fd891577387ed5e1c360e5214eea94e1e1776486ad39e4153f924690876cb0e2a678f57835b4e3df61f4e93f6dbf7a096c60ea5c53fe35dc47977ca399bcbbed314301576f3123748b8fb2b25e5493d48b8d6f317410828113b1aca672c0d33556a5fd67bed3394b4c893f31b45c34b00d9486cf16c3167ccdd95b4ed3c6c2b364abf0740553374112ea5ea8579a6ff00f7e4803aebba17b84638b786537eaa905e04f83d3334b36459f5cc3701121c519d45387cfee2c59694731c847a55b5ca716ae2d32a25a51ff3c8b3ba0d31dbaa7921cd2fbefff64aea89e8851fe572e2018c512d5ab3711751f21ff084e207da4137037207e815e97ca5f227bc47c9dce5b33dc60e2da5d2e716e65bc749cd5d9a842b80525d11ad03a60d569fbf02d1e8146268fdc25224694474dc4f15ba51e531ca1a2b9091572903a7b243fb2598c00c9acda5a07a7422aeb01e0ef86f3d47343b87a68c0ca5322d854c0dd582dc12b4a003231e2a4bf158df9c834025eba83c0e0b27e4a1d7d14d22389f49b2eaa01a4769e0d35a8b9366b02578f0abe3e94fd39aadc1c37267284dc021c06418607342610719088c511f45ae606fd3baf6c87dd0b3a16fef38c591056e219f129d49e193a483e79729c4f29b74217e0e77802194afa3733fa3dee91f29bb2be5b4b41c0ea57237271016c6d541e15315784fd1856f42e9a16c6843717fed3dc984ec2898c62fb1782af0b0f4ea6ae947e01c322536c2c81fc605a003b6d2125e476e408a8692b057e00a5fdf90e16cdbfdda922557b6afa7a4db8cba2312797f43849afcd2913e99c9918307401d36a4debe4598eba046db347320da95a67847ceaea7b37504a842b3943263e55bf3aa425b1f7391647223606a514657917a8d7affcf694955eac1266543fe303fe088e945ef875d3e97d4035d904bf127d3b0140ec6c6acd51a7c7d924e23095f091cff539a83693f3a43972b8661aba3c54e1add345b14486628832be0e6c8a932686b0a4b4dc51c50c52cdea23ef7af67b8bd8ec076d813c4a1e59e5462b628cc13ca34ef07c8cd2a8d5fc79d2a43fc71b11a707d14ca22b733a7389f54839c4edb1ebd59277b9bc655fb47853b5aa0256ab2d2ff5c5adbd2bbd889bfad45827c8b70049e0f7a7cdd9ad1c89f7fb503d36e585ef7ece8c8de0199c4cc119c3aecbab6570692d4f88aab3fbbc93f4f09ea2c681c7453c691833df22acee82462f412cbea2f0a1086a1bbe8b0fad222f82ddbbeb4c40d35f398db67d536906c11f36fbf3519fb09dabd03c4ce2787f965c8a08574139537c7b2ca72c37b9f4450652ae44f866d52a98a5c9a02de5bf89c2b2bc19f66bd91938b2b9c66b819b1c19f6d8a18e86c4fb6204775a56470308b93d272a2642c212fa7e42bed042b2fa383410881197e489b963bca235e86331a312c971c95f610c1498baca5660d8a27a77879884130b62a01e009483e0d8612aeec14f0510dbb5322e02afdd2f96cc8aeacead467af0fce1b868ac198e9686168314f9c134371b1a3fdb198add15118195bae39e4673fc27a3a69ed364c0eda0461a6eeefdcc29670b5abf0b0b3aa3851da48aa31bb168ea14933923e75ca36b13b711c74b5acc0ee81b648809bc38fc42ba650da2bc3e59b4db6f48f59b2d58146e44a31fc9c387486a547d577a5300aa76edb1d0f457ea2f73da39e0145bc9833c99c02fb620aec3df0dc76c3a7fc367d76e113081203b6fb85fdad1fab2c4f0a5d498231c22a7746bcb9a3a4b011047d286229b16ac8f3bb31cc290542f353a75fcf57c643630813ce085667d53c37208021a00f354b04d0a7230701a15f65b255bde355892c52951bea2ef6a6b87b09f6504e162a0c284fcecd2cda98c4716c3bbb5b4fc2c46ff114ef344f02247532663e93ec00ac3ef3b54eb2e1cdd2c923cc2b4ebe89e6f621630931c9d84da5132f00065b6888fc7bfd213c0b53cf9304ad4", 0x1000}, {&(0x7f0000001440)="6f93a89c2e34f740836c231400f2bff328a6bb05a45c845af96ee1c7aae3db2e491e7350273062b949f90379dfaed16e516e3b4326e8714718f6c62c3e32ee3a0c8ac9521fc8bc27449cf642df8a6238213b6d4eefbae99bbd5c7f5224afe58fbaaef2ec0bc9e0921ae8bfe4f77449c1c8f2e4c14d441ad0a88c199f14c0751891d83667ebd5b7d65a81e47e6d63caa6fcdbfa2169c645ef4006808cff6df31a2c066a1475f3cc8c340bcffdb4e2a331ba963c83a705a5f824a9afdbc5a8c6f45c1e0543cd2e84c7e1", 0xc9}, {&(0x7f0000001540)="d4529a3db59002a247365676943510c4f0c34a4ad5a27db991b5c4d09655b42bc1d5c04d89bc70f69a106b7dc7739ba13700db1be9b791769c01a98d4027c8de914f7064aa28fc55b6bdcb7e5706811dd63429da0d6781d58f827295db8e29c466f056d856ecc511248cf04f5990147267dc7bfbd65dc8fa4f312214cd359a50cf59e45624201d037607245f92585308092ae42e460956d1d7f8762197ff17", 0x9f}, {&(0x7f0000001600)="6b24e86f89613501640eea2e570487163d0d48105c383ea4be6dd052030751e4b4cd02c14b10a1cce9129fddbe7d3f9d1aea55c0ba08e8d600c4b3a8ddef9e2fef14559bbfc9ee47ee7f5124b1a396d7fec5d92f01081ee151a7086c7b36fd61be728397d221065d83b4fc1b36559450b7d06e36cce327adb4aa3a073e13def1b79ffb22acf0ea02d0d9c7f27b0f0af62d5213b20d2e98897bd705781201a519637cdd6eb37e4869aa35d457ea8394454b9daba9394a48faaeedc6ab2de40614f5339efca2d6", 0xc6}], 0x6, &(0x7f0000001780)=[@hoplimit={{0x14, 0x29, 0x34, 0x3}}, @hopopts_2292={{0x40, 0x29, 0x36, {0x27, 0x4, [], [@calipso={0x7, 0x8, {0x4, 0x0, 0x0, 0x20}}, @calipso={0x7, 0x8, {0x7ff, 0x0, 0x4, 0xb29}}, @hao={0xc9, 0x10, @local}]}}}, @dstopts={{0x20, 0x29, 0x37, {0x899202c084ec619d, 0x0, [], [@ra={0x5, 0x2, 0x4}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xe8}}, @dstopts={{0x20, 0x29, 0x37, {0x4a, 0x0, [], [@jumbo={0xc2, 0x4, 0xfffffff8}]}}}], 0xb0}}, {{&(0x7f0000001880)={0xa, 0x4e23, 0x6, @mcast1, 0x7}, 0x1c, &(0x7f0000001b40)=[{&(0x7f00000018c0)="0b90f6737a504bbaffbdf7bd33de36e19aa3b85ef7b4ac695736a96c9df4b0ba943d", 0x22}, {&(0x7f0000001900)="e3a5663722e4b68e04e596", 0xb}, {&(0x7f0000001940)="ad28e8e84f36b5343e819f80b453d7a96c0dbf9ae2b181adcd308cf62df6bfd62e83002dae4b81819e714223d76f1ea8515ecad61cb6348b858f35a5769a8cc2399f62b1b8ae9d0510bdf1e8c54cfb044ee77dba1c14b99cb79d2886d6db12be419ccc7be622730a02eca0af4dd3428824a42a7356d79f7d9ff22effba3e2eb11e144ca2076ce33d82e7133d1c600e142e555bec447ea3b443c5b90cffe84e9a1e9643e176cf8a73febd8686029f29c7ecd01b457c94e6a239f209bd38185bc80aa8a6194ca9bdccf7dec336bf1590bf55ece1d615f62ff40aa6824b38295d75aa417c1196cba08ae1cfd3bbf45fda40d2", 0xf1}, {&(0x7f0000001a40)="67713f0caa31509c8ea9326c6fe7617e642f2669d235df28963a8506f0730218ea57549785e68a0bfbeb513967df91576d04b7de31822da82d828a0f8dfff237fa92732e3548ab4a62ea4e0f5ff05aed830ca1365b5f56272086a483f08bb214bfe6472781e7c26afac6f11468cbc5eb6e9b5d22", 0x74}, {&(0x7f0000001ac0)="7f705a6f5709de4876b5316a6eb8f0b24bdc32d9567e584227152c985d1cefb49dcaa6b77f8a135c04a5fd112366f710be0021d3dba832e0f908df8cb39ca3d3b68d6eb986bd7180119fc207f8bba7893cf25699f2e5f8a51d5477c142f5aa838285f9e097bebfeb02d8fd3b5587a5e7b2", 0x71}], 0x5, &(0x7f0000001bc0)=ANY=[@ANYBLOB="280000000000000029000000390000002f02020000000000fe8000000000000000000000000000bb1400000000000000290000000b000000000000000000000024000000000000002900000032000000ff020000000000000000000000000001", @ANYRES32=r11, @ANYBLOB="0000000024000000000000002900000032000100fe880000000000000000001100000101", @ANYRES32=r16, @ANYBLOB="00000000140000000000000029000000080000000200000000000000300000000000000029000000360000000002000000000000c96dfe8800000000000000000000000000010000000000001400000000000000290000000b000000ffffffe3000000001400000000000000290000003e0000003204000000000000"], 0x108}}, {{0x0, 0x0, &(0x7f0000002fc0)=[{&(0x7f0000001d00)="c7361954e6ead7fc26f971ce1a246d40e83573516f94edad2126ce95b06bc78679e5999246b45adc10f625aa24dccb8d023e184fe63de3fcb5f6acc6e0e46833dfd0f8", 0x43}, {&(0x7f0000001d80)="fd6ad4dc24e781fdb06348dba659", 0xe}, {&(0x7f0000001dc0)="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", 0x1000}, {&(0x7f0000002dc0)="de48def41bc1210d5a69f74cd498249eb2b2063d59b52adefb63e7a0d93f57164d78fb172d4f18c8f54e849cb84fe93583418fbb6a96e8c0a58cf03b26abaf25eb6838775ded7cc8385f008d8bd1c33047b539e05e884958e72dbd27d79450192e98200a8d47ad978a5c4bb935b2fda900cb0bf39146109bb38ccb723bddeb4d2e611f6e9ea722824c9327a58482", 0x8e}, {&(0x7f0000002e80)="87271c15f9806f34dd897f73efb93973cfd2da5810afa65dce06e238447d9d429857c8120896b4867fba11cec6e6e93e206722f6792cc8010aac0c70b9494f5d04e58b339129978b9bfa3606e496c5c36a3a219e1900b19d8c10bd3dfd9378773f4f131ca1a1a76bf779231f2997c2ac607dc1ddbe1da4f6f8d34b833c6277dd4057ea36764ce6963a3bbff15dac33a3e86b03ad26afbbfe895dfe10e04a29f268963ce64690a1ef9b6a42af", 0xac}, {&(0x7f0000002f40)="6bf92d191b29edec22628c3528aeec75e02a9470b5d3488cdf257d052ccc9ff43ed7bfafd3b7cca60dc8176609a5182127bda7d5acb858a7898b8003d286493dfc", 0x41}], 0x6, &(0x7f0000003040)=[@hopopts={{0x68, 0x29, 0x36, {0x2f, 0x9, [], [@calipso={0x7, 0x10, {0xfff, 0x2, 0x1f, 0x7, [0x0]}}, @ra={0x5, 0x2, 0x5}, @enc_lim={0x4, 0x1, 0x3f}, @pad1, @enc_lim={0x4, 0x1, 0x4}, @jumbo={0xc2, 0x4, 0x42}, @calipso={0x7, 0x20, {0x400, 0x6, 0x40, 0x100, [0x1, 0x8a2, 0x8]}}]}}}, @rthdr={{0x68, 0x29, 0x39, {0x62, 0xa, 0x0, 0x8, 0x0, [@mcast1, @mcast1, @rand_addr="0004000004100058aa33ddca63a500", @remote, @loopback]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2, r21}}}, @dstopts_2292={{0x162, 0x29, 0x4, {0x2b, 0x6, [], [@hao={0xc9, 0x10, @loopback}, @hao={0xc9, 0x10, @loopback}, @ra={0x5, 0x2, 0x4}, @enc_lim={0x4, 0x1, 0x2}, @jumbo={0xc2, 0x4, 0x400}, @pad1]}}}, @dstopts_2292={{0x30, 0x29, 0x4, {0x27, 0x2, [], [@enc_lim={0x4, 0x1, 0x3}, @padn={0x1, 0x1, [0x0]}, @ra={0x5, 0x2, 0x80}, @ra={0x5, 0x2, 0x1f}, @ra={0x5, 0x2, 0x4}]}}}], 0x178}}, {{&(0x7f00000031c0)={0xa, 0x4e24, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x80000001}, 0x1c, &(0x7f0000003500)=[{&(0x7f0000003200)="1f25a4c51909a45632a98ab3dbb3ad32f8b45252455bf95887ba0cf09c5356017ec9840e0f5acbb6a6e21b25b2754a6f3190feeb5111232a6c2298bfc3628db1fd9d44ac16a16113e9bfe9b81085ccc9d698d1ba3c428f5eb63e99f33fa8245e0983a6dcf11229b43600c1346ebd199973d63562c807dc2316b27ed86f06a3c898cde68eccd6bda1a72d486c0d639043a32bea5e5ee267f829abf58094003ae262e9b202efd7ef7ecd0ed81cc84bd93d5b011b38691af40b67d320cca6a3b66cddc14ad0b05f5ec74d0661d80ab4abef947596309b2dda92b2c998", 0xdb}, {&(0x7f0000003300)="47f871278f862c58e29257794a872a03672c1cdeba2973bf971376daa8f72e52c87e5c3186f6836038ba7bfbcb6756a5ad3bcb474b70f8bd504d05c5db7f95c5ac8d974546763353358f60967d7359b6eddf4e71c2c3a80617a4a8e832f4ac8c7a7efddc8eb2b7e33ced6679256565deeaa8290120cd68c0695b208e7a529f430522b24c4b86b5f74a0f84b64aeeaf9453dc7bb600d7", 0x96}, {&(0x7f00000033c0)="1bfad6e8", 0x4}, {&(0x7f0000003400)="6e3409f30e7a8198468fef248efe5ce9a39fef80b17ef25212ebfea6190347ef2f3a0cb9c48de62cadd7664aaf005843423a008ce30f21671f28069d92ac043ed7720ae73bd8bcfa73a86de99e2d57cbe0814a0f75d01f68c1d5434f37324ce69d6068b06d68bbd32dc6f3fa466f800dbd3c982464168fb09a932bb9", 0x7c}, {&(0x7f0000003480)="4784d1ac0a80c87dc63be5e930413adfff237d8db5518bb8f469264d2ee45b5365b9a720256952cb438ea9901e48ac43f3593f140a5212e2e9da003b752a4bc6ec1394b6fd1149dfef52a0d42ea9714edc0443d0163b17c6d3b4d4485641d79c4eb90acdcdc63ad70c169b04aa4156054c76fed704", 0x75}], 0x5, &(0x7f0000003580)=[@hopopts={{0x28, 0x29, 0x36, {0x1, 0x1, [], [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @rthdrdstopts={{0x20, 0x29, 0x37, {0x6646f41002adf110, 0x0, [], [@ra={0x5, 0x2, 0x20}]}}}, @rthdr_2292={{0x58, 0x29, 0x39, {0xd, 0x8, 0x0, 0x11, 0x0, [@dev={0xfe, 0x80, [], 0xa}, @dev={0xfe, 0x80, [], 0x1a}, @local, @loopback]}}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x94, 0x0, [], [@enc_lim={0x4, 0x1, 0xf7}, @pad1]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x2}}, @flowinfo={{0x14, 0x29, 0xb, 0xfffffff8}}, @hopopts_2292={{0x1048, 0x29, 0x36, {0x3c, 0x205, [], [@calipso={0x7, 0x20, {0x8, 0x6, 0x3f, 0xd7d0, [0x0, 0xff, 0x9]}}, @ra={0x5, 0x2, 0xe28}, @padn, @generic={0xa9, 0x1000, "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"}]}}}, @dstopts={{0x18, 0x29, 0x37, {0x32}}}, @rthdr={{0x38, 0x29, 0x39, {0x2f, 0x4, 0x0, 0x0, 0x0, [@loopback, @mcast2]}}}], 0x1188}}, {{&(0x7f00000047c0)={0xa, 0x4e24, 0xb987, @dev={0xfe, 0x80, [], 0x17}, 0xb4}, 0x1c, &(0x7f0000005940)=[{&(0x7f0000004800)="91a792026c8e44a133df1e0869d85e380bd7a966ac4a94bcc9ffb4633fd2a44b4675fcaa99b861eba5f5848039bc", 0x2e}, {&(0x7f0000004840)="6827c2910c7e9c0dc2e2d02ff7c7fa0fdd56ae4958", 0x15}, {&(0x7f0000004880)="a4b1302b", 0x4}, {&(0x7f00000048c0)="d0e1b5e895264ed862e3bbf38a0af76ab3c7f6d7e28efed3bfd561a0bc1989404d8c4c77361a1229b86eb515451168de3792fc541c6d2dd40bb177914b24c97804b7e07c13ff", 0x46}, {&(0x7f0000004940)="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", 0x1000}], 0x5, &(0x7f00000059c0), 0x50}}, {{&(0x7f0000005a40)={0xa, 0x4e20, 0x1000, @loopback, 0x2}, 0x1c, &(0x7f0000005c40)=[{&(0x7f0000005a80)="5b37fa17f9fea5750c347ef09cec8bd7a0c1a814243eff061947781d73a5256186a8fdd041897df393801f9461253e9df4159afb2c7a968c14bef3045ccc021e3c8c445f5fe9409c19a6b6395c5ff1643da08df36f4e90f158a18fe86a1d3b9ee02c2d25d123030cc572658e9d8d77e3f62ae5ebecb78903093332c5c48cb437a49ad6b06543888e271266c64cd61934601b63d29030dde3b8d6b76842411beeb829416c2efa21daa562bae21e517d8c33ea27a1d08d0f659740d4b9519f89fbe9a17a6d2e6af499e60edf3f24f3c86d98a0340a4f339bedc54d1d9ae2", 0xdd}, {&(0x7f0000005b80)="6515859f92f2cd0632856a8f9518264df3e403c37f3ed4db43b82bf74173807fa0c93354a4cab5a6180cc5296698133d7d1e91c98c0bfea5f4a9c799e3e3f981bbda06ea88081f758f45deb4131f940bbbc56ed3732b5bae66b847a76c4fd9fcf552bd8ed16a0fb238810daece2d6ab0c0dcf086c004eec74c324eb2f921064032a96818b5e73b19aba5aa3101b72bc120e09c6e91", 0x95}], 0x2, &(0x7f0000005c80)=[@hopopts={{0x20, 0x29, 0x36, {0x2b, 0x0, [], [@enc_lim={0x4, 0x1, 0x1}]}}}, @rthdr_2292={{0x18, 0x29, 0x39, {0x81cf424e24aef12a, 0x0, 0x1, 0x81}}}], 0x38}}, {{&(0x7f0000005cc0)={0xa, 0x4e24, 0x100, @remote, 0x3}, 0x1c, &(0x7f0000005f00)=[{&(0x7f0000005d00)="8231d00d6357ffcc3e887ae0627a2a90cf1b5f2e1268b8856076c102cf56488e2021869ea64c154b2a3cc3b174d7c6183e3977cc123421181c96e494a2411d687c0cbd0c2a0e02a6db5381ce0b1ef6b65dd27c00cffd646f268922b4576c52ad69ecab251ee1d4ab2764e65b096470a7f39ef1cdfdc2ba8ebe2db8b750dc00385247ddefd199c3d833fdc46ac089731f", 0x90}, {&(0x7f0000005dc0)="01df303a1a6831abe9d93c07a721e22ee947610ac6e8bbf3e9846579fafbca22eb9e85f9a602dabd8c57b5ee546023c21dd62619b16a1eb1def80f55d46170013f3430d193dd11fb1ed0e5c980d7a25c261a82c3c61bb58834efdab9d8b1322fabb0eb8462f4c83a7b27645f0c8031b91ed235f28b71c950d3892d602b02e8c06e9ada3af6f624736697ec7e33c302e023bbc7a05c203626274557e470a086e8d274bf8075668d0e53e152bb7eeef6a2b90d2e23d9415e02138fc31cc3cb36efdc5da79a369002f4525b1b848df6328bce9f59f94d11a0f6501e4b0638bb492bd018e74f6c4b5c6f358fa45235f51038d31e", 0xf2}, {&(0x7f0000005ec0)="a344cd4aaa1de332bdbdd77308f8e7b6bd36c144a89565b6d8968933755fafdb", 0x20}], 0x3, &(0x7f0000005f40)=[@tclass={{0x14, 0x29, 0x43, 0x19ec6a19}}, @flowinfo={{0x14, 0x29, 0xb, 0x4}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x101}}, @dontfrag={{0x14, 0x29, 0x3e, 0x80000000}}, @hopopts={{0x18, 0x29, 0x36, {0x73}}}, @flowinfo={{0x14, 0x29, 0xb, 0x20}}, @hopopts={{0x20, 0x29, 0x36, {0x33, 0x1, [], [@jumbo={0xc2, 0x4, 0x1}, @generic={0x1f}]}}}, @rthdr_2292={{0x58, 0x29, 0x39, {0x0, 0x8, 0x2, 0x1f, 0x0, [@local, @local, @local, @remote]}}}], 0x108}}, {{&(0x7f0000006080)={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x90, 0x0}}, 0x1c, &(0x7f0000006200)=[{&(0x7f00000060c0)="5061c844551285f43dc04404626065eed7e2f29813bbbc7266e2c295315d4fa2ab9c0db873be0544c32c67f5549ef59c4452335c73d9be0ae357cc86ab54a956609e3658de59c4d2a3c5a667d9265a41e7d11c2d3279a90f0ee30d55bd906f6cdd4a073f0d75b688d8708cc8865f3f7bca01810a9ec2093e05cc639f4cc38955965931d9cfd6640550ddbc063c", 0x8d}, {&(0x7f0000006180)="0b2a755605c6eccbd58ee5642afe0c949160c98a26c5e339c0142295af7dc5772eaa6f004465d23c44b2ae7d74284d7fabf79ec92796f7918479088f86b8e430ce988b5e4b1b3f96f4c0aeb1d79ed02ceb83aec65d2e91c8e939a551b7de2e", 0x5f}], 0x2, &(0x7f0000006280)=[@pktinfo={{0x24, 0x29, 0x32, {@ipv4={[], [], @empty}, r22}}}, @hoplimit={{0x14, 0x29, 0x34, 0x20}}, @rthdr_2292={{0x88, 0x29, 0x39, {0x33, 0xe, 0x1, 0x4, 0x0, [@initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x21}, @rand_addr="d700", @dev={0xfe, 0x80, [], 0xb}, @mcast1, @loopback, @local]}}}, @dstopts={{0x1d8, 0x29, 0x37, {0x62, 0x37, [], [@ra={0x5, 0x2, 0xffff}, @ra={0x5, 0x2, 0x8}, @enc_lim={0x4, 0x1, 0x3}, @generic={0x4, 0xe7, "e82d43f5152335b22b27e1775b566f28c33ff895382f2412c4c251235c016432379a200f4468af5521aac909b0846b3206c86c3b9ceb36a257b7019c9381ec4813344cbed7b220574da50b337ee13808ebaf3a9ff0c550f32ae73095c417e843ba207b613333bb1bb57cde37550e7fb0d0ce511d074b86a513c4263b2342f684ad472a193a08ae381039b11961bd8e29406f86c21f1208f01710ad7b0457600a3e03e81477bd673efa2e066566e851f0c52c54dcf2c2977cc812b0f3bf374d156878b9377d67ac16d01f485177f5147e497746fda6ea4360bbe93af3cdab3eee7feb3d69852505"}, @calipso={0x7, 0x48, {0x1f, 0x10, 0x4, 0x8, [0x2, 0xffff, 0xfff, 0x4b, 0x80bc, 0x7f, 0x0, 0x7f]}}, @calipso={0x7, 0x10, {0x8, 0x2, 0x81, 0x800, [0x8001]}}, @generic={0x6, 0x6c, "414119c140a25fe58b95d6bda25530e4fa27240a10835b9e3f4537bc9aab1a3aa7f9f1d4fc6b52fd4d6eb82c10f394fc45417b5f17f86a30145f4d94c94cb2ba87e97996637fd6f073f8d695a9c432a67860a731429ddac51daff954b690b89e673b33504470c50612e2dcd3"}]}}}, @rthdr={{0x28, 0x29, 0x39, {0xda, 0x2, 0x2, 0x1f, 0x0, [@dev={0xfe, 0x80, [], 0xa}]}}}], 0x2c8}}], 0x8, 0x4000) setsockopt$bt_BT_POWER(r4, 0x112, 0x9, &(0x7f0000000100)=0xff, 0x1) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000200)=@ccm_128={{0x303}, "2529f86662c4887e", "da3588e5aa00", '\x00', "a0f8fb8dc686d785"}, 0x16) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 640.874157] device veth22 entered promiscuous mode 16:51:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x3ce, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:08 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r4, 0x6, 0x1, &(0x7f0000000100)=@ccm_128={{0x303}, "5b992f95eeb048d6", "964a5250f50af490bb73a3d9607d8510", "36e37fcf", "dcaf0068c648aa59"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 641.048135] protocol 88fb is buggy, dev hsr_slave_0 [ 641.053320] protocol 88fb is buggy, dev hsr_slave_1 16:51:09 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x3f4, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 641.368107] protocol 88fb is buggy, dev hsr_slave_0 [ 641.368954] protocol 88fb is buggy, dev hsr_slave_0 [ 641.373324] protocol 88fb is buggy, dev hsr_slave_1 [ 641.378817] protocol 88fb is buggy, dev hsr_slave_1 16:51:09 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:11 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x3fa, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:11 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r5 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/user\x00', 0x2, 0x0) splice(r4, &(0x7f00000001c0), r5, &(0x7f0000000240), 0x2, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:11 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) openat$md(0xffffffffffffff9c, &(0x7f0000000340)='/dev/md0\x00', 0x49000, 0x0) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r5 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r6 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r6, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) accept4$ax25(r8, &(0x7f00000003c0)={{0x3, @rose}, [@bcast, @rose, @null, @null, @bcast, @remote, @netrom, @netrom]}, &(0x7f0000000440)=0x48, 0x80000) openat$tun(0xffffffffffffff9c, &(0x7f0000001a80)='/dev/net/tun\x00', 0x40000, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000001ac0)='/dev/md0\x00', 0x400040, 0x0) r9 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r9, 0xc0c0583b, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000260200001200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010800000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c645000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020"]) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = openat$cgroup_ro(r12, &(0x7f0000000280)='t\xb4\xe6_3\x82E\'p', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(r15, 0xc0206434, &(0x7f00000001c0)={0xffffffff, 0x0, 0x10001, 0x1}) ioctl$DRM_IOCTL_AGP_ALLOC(r13, 0xc0206434, &(0x7f0000000200)={0x3ff, r16, 0x10000, 0x1a}) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_BINDTODEVICE(r13, 0x1, 0x19, &(0x7f0000000240)='ip6_vti0\x00', 0x10) r19 = fcntl$dupfd(r18, 0x0, r17) r20 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r20, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r20, 0x107, 0x1, &(0x7f0000000140)={r21, 0x3, 0x6, @random="08f00793e142"}, 0x10) getsockopt$IP_VS_SO_GET_SERVICE(r20, 0x0, 0x483, &(0x7f00000002c0), &(0x7f0000000100)=0x68) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:11 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:11 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x500, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:11 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:11 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:11 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 645.528132] net_ratelimit: 20 callbacks suppressed [ 645.528140] protocol 88fb is buggy, dev hsr_slave_0 [ 645.528154] protocol 88fb is buggy, dev hsr_slave_0 [ 645.533192] protocol 88fb is buggy, dev hsr_slave_1 [ 645.538199] protocol 88fb is buggy, dev hsr_slave_1 [ 645.543267] protocol 88fb is buggy, dev hsr_slave_0 [ 645.558317] protocol 88fb is buggy, dev hsr_slave_1 [ 646.488226] protocol 88fb is buggy, dev hsr_slave_0 [ 646.493410] protocol 88fb is buggy, dev hsr_slave_1 16:51:14 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:14 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:14 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x600, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:14 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f0000000100)=0x3, 0x4) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0xffff, 0x0, @loopback, 0x6}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) r4 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, r4, &(0x7f0000000400)='dns_resolver\x00', &(0x7f0000001d80)={'syz', 0x1, 0x2e}, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r4, 0x0, &(0x7f00000001c0)='\x00', &(0x7f0000000200)) [ 646.728136] protocol 88fb is buggy, dev hsr_slave_0 [ 646.733307] protocol 88fb is buggy, dev hsr_slave_1 16:51:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:14 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:14 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x700, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:14 executing program 1: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000240)='/dev/cachefiles\x00', 0x50100, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r4, 0x0, 0x3, &(0x7f0000000280)=0x7, 0x4) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/ubi_ctrl\x00', 0x131181, 0x0) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:14 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:17 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:17 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:17 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4400804}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xf8, r3, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x1, @loopback, 0x7}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x944b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x3ff, @mcast2, 0x1000000}}}}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xec6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ADDR={0x8}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x440}, 0x4024008) close(r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x900, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:17 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDSETMODE(r5, 0x4b3a, 0x2) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:17 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:17 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x0) 16:51:17 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000001380)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) openat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x12, [], [{0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x801, 0x0, 0x2000000000000}]}) r6 = fcntl$dupfd(r5, 0x406, r4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000001240)='nodevsystemem1wlan0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f0000001280)='/dev/ppp\x00', 0x4000, 0x0) r7 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/s\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r7, 0xc0c0583b, &(0x7f00000013c0)=ANY=[@ANYBLOB="0000000000000000260200001200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010800000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a981d2a1c11d4d6715f6329ff8cf00"/718]) r8 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r8, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) r9 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r9, 0xc0c0583b, &(0x7f0000001340)=ANY=[@ANYRES16=r5]) r10 = socket$vsock_dgram(0x28, 0x2, 0x0) r11 = openat$vsock(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/vsock\x00', 0x40400, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r11, 0xc0206416, &(0x7f0000001300)={0x6574, 0x6, 0x4, 0xffff, 0x6, 0x2}) r12 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r12, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x100}, 0x8) llistxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=""/4096, 0x1000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:17 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:17 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0xa00, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 650.648214] net_ratelimit: 20 callbacks suppressed [ 650.648222] protocol 88fb is buggy, dev hsr_slave_0 [ 650.658376] protocol 88fb is buggy, dev hsr_slave_1 [ 650.888164] protocol 88fb is buggy, dev hsr_slave_0 [ 650.893263] protocol 88fb is buggy, dev hsr_slave_1 [ 651.448180] protocol 88fb is buggy, dev hsr_slave_0 [ 651.453311] protocol 88fb is buggy, dev hsr_slave_1 [ 651.768119] protocol 88fb is buggy, dev hsr_slave_0 [ 651.773199] protocol 88fb is buggy, dev hsr_slave_1 [ 651.778115] protocol 88fb is buggy, dev hsr_slave_0 [ 651.778315] protocol 88fb is buggy, dev hsr_slave_0 16:51:20 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:20 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x0) 16:51:20 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) perf_event_open(&(0x7f0000000380)={0x5, 0x70, 0x4, 0x3, 0xa1, 0x6, 0x0, 0x2, 0x8000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x6, 0xfffffffffffffff8}, 0x401, 0x0, 0x0, 0x1, 0x8, 0x8d, 0x1}, 0x0, 0x9, r6, 0x2) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) r7 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r7, 0x80045300, 0x0) r8 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r8}) r9 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r9, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r7, @ANYBLOB="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", @ANYRES64=r8]) ptrace$getregset(0x4204, r8, 0x0, &(0x7f0000000340)={0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000800)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r10}, 0x30) r11 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r11, 0x107, 0x1, &(0x7f0000000140)={r12, 0x3, 0x6, @random="08f00793e142"}, 0x10) setsockopt$sock_void(r11, 0x1, 0x24, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r8, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000100)='tls\x00', r10}, 0x30) write(r13, &(0x7f0000000200)="7e12164a7664219303dcd92cd39b1097748c27dc56596df9da4d61a9896bce0d7cb3d1e587ef403ad01dbf2580e423b79bd3adf429a7e9743d5042fea79b7e56c2c91bdb30a6ba7f598f26c4985689569f0c1b570e4a19c817c5bb2b0eb916788d80456c8e1e7b825699cbf423b294cc687b4af23439592012ac78a21e0c451fbc1f271e5ae00f7f9032d43b4a", 0x8d) 16:51:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0xc00, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:20 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0x1000002a6) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x0) 16:51:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10002, 0x0) 16:51:20 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:20 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0xe00, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:20 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10002, 0x0) 16:51:23 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:23 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001580)=[{{0x0, 0x0, &(0x7f0000001540), 0x10000000000001fb, 0x0, 0xffffffb0}}], 0x1, 0x10) write$apparmor_current(r6, &(0x7f0000000580)=@hat={'changehat ', 0x4, 0x5e, ['NETMAP\x00', 'vboxnet1\x00']}, 0x2d) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) r9 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r9, 0x80045300, 0x0) r10 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r10}) r11 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r11, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r9, @ANYBLOB="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", @ANYRES64=r10]) ptrace$getregset(0x4204, r10, 0x0, &(0x7f0000000340)={0x0}) capget(&(0x7f0000000500)={0xf1504, r10}, &(0x7f0000000540)={0x4, 0x20, 0x7, 0x20, 0x7fff, 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$IMGETCOUNT(r8, 0x80044943, &(0x7f00000015c0)) r12 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x4ca640, 0x10) execveat(r12, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000440)=[&(0x7f0000000200)='tls\x00', &(0x7f0000000240)='keyringvboxnet1em1eth1selinux)posix_acl_accessvmnet0trustedbdevvboxnet0vboxnet0eth0\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='@-\x00', &(0x7f0000000340)='tls\x00', &(0x7f0000000380)='tls\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='tls\x00'], &(0x7f0000000480), 0x400) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000480)={'NETMAP\x00'}, &(0x7f00000004c0)=0x1e) 16:51:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10002, 0x0) 16:51:23 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:23 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0xe01, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:23 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000740)={0x0, 0x0, 0x8, 0x12, [], [{0x0, 0x3}, {0x801, 0x8000000, 0x7fffffff}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) close(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000005c0)={0x0, 0xff, 0x20, 0x3f, 0xb, 0x1d, 0x4e, 0x8, 0x7fffffff, 0x2, 0x0, 0x80000001}) utime(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x9, 0x8}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) ioctl$SG_GET_VERSION_NUM(r7, 0x2282, &(0x7f0000000100)) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x5) setsockopt$inet_MCAST_LEAVE_GROUP(r9, 0x0, 0x2d, &(0x7f0000000480)={0x2, {{0x2, 0x4e20, @loopback}}}, 0x88) [ 655.928116] net_ratelimit: 20 callbacks suppressed [ 655.928125] protocol 88fb is buggy, dev hsr_slave_0 [ 655.928157] protocol 88fb is buggy, dev hsr_slave_1 [ 655.933131] protocol 88fb is buggy, dev hsr_slave_1 [ 655.948329] protocol 88fb is buggy, dev hsr_slave_0 [ 655.953429] protocol 88fb is buggy, dev hsr_slave_1 16:51:23 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:23 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:23 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:24 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:24 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) close(r0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockname$netrom(r10, &(0x7f0000000480)={{}, [@bcast, @default, @null, @default, @bcast, @netrom, @null, @default]}, &(0x7f0000000100)=0x48) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x1200, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:24 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, 0x0, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:24 executing program 0: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10002, 0x0) 16:51:24 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, 0x0, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:24 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) 16:51:24 executing program 0: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10002, 0x0) 16:51:24 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0x8713f840) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x100, 0x0) getsockopt$inet6_mreq(r4, 0x29, 0x20, &(0x7f00000001c0)={@loopback}, &(0x7f0000000200)=0x14) 16:51:24 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, 0x0, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:24 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, 0x0, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:24 executing program 0: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10002, 0x0) 16:51:24 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000440)=0x20002) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000380)={0x53, 0xfffffffffffffffb, 0x28, 0x6, @scatter={0x1, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)=""/243, 0xf3}]}, &(0x7f00000002c0)="d732aa2fc89c7c7e330227ae61f44e25240f524121654d65e984782a58a6133d6df12279fb1fd8d1", &(0x7f0000000300)=""/24, 0x2, 0x2, 0x1, &(0x7f0000000340)}) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) connect$inet6(r7, &(0x7f0000000180)={0xa, 0x1, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$SG_SET_KEEP_ORPHAN(r12, 0x2287, &(0x7f0000000400)=0xffffffff) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:24 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x1300, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:24 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, 0x0, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:24 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:24 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, 0x0, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:24 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) [ 656.888221] protocol 88fb is buggy, dev hsr_slave_0 [ 656.893412] protocol 88fb is buggy, dev hsr_slave_1 16:51:24 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:24 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x9, @remote}, 0x2f5) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 657.138148] protocol 88fb is buggy, dev hsr_slave_0 [ 657.143330] protocol 88fb is buggy, dev hsr_slave_1 16:51:25 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) r4 = openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r5, 0x80045300, 0x0) r6 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r6}) r7 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r7, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r5, @ANYBLOB="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", @ANYRES64=r6]) ptrace$getregset(0x4204, r6, 0x0, &(0x7f0000000340)={0x0}) fcntl$lock(r4, 0x2f, &(0x7f00000001c0)={0x17b6a2bd0f011c2a, 0x4, 0x8, 0x0, r6}) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:25 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:25 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x1a01, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:25 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/load\x00', 0x2, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) modify_ldt$write2(0x11, &(0x7f00000004c0)={0x7, 0x800, 0x1000, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1}, 0x10) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) sendfile(r2, r3, &(0x7f00000001c0), 0x5) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/mls\x00', 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x10002, 0x0) [ 657.688135] protocol 88fb is buggy, dev hsr_slave_0 16:51:25 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) 16:51:25 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:25 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x4080, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000100)=ANY=[@ANYBLOB='A\x00\x00\x00', @ANYRES32=0x0], &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000200)={r5, 0xca6}, 0x8) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$selinux_attr(r7, &(0x7f0000000240)='system_u:object_r:traceroute_exec_t:s0\x00', 0x27) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000280)=0x8) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x1c00, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:25 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:25 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x12, [], [{0x0, 0x0, 0x0, 0x400}, {0x7, 0x0, 0x2000000000000, 0x0, 0x4}]}) fcntl$dupfd(r0, 0x406, r4) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @rand_addr="a2d96d2776b4af1d9a15d3b9e59aa5dd"}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) r5 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0xffffffffffffffc1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r5, 0x84, 0xe, &(0x7f0000000140)={0x0, @in={{0x2, 0x0, @loopback}}}, &(0x7f00000000c0)=0x100) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000600)={0x0, 0x8, 0x2}, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_XFRM_POLICY(r12, 0x0, 0x11, &(0x7f0000000480)={{{@in=@broadcast, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) bind$xdp(r11, &(0x7f0000000580)={0x2c, 0x14, r13, 0x3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = fcntl$dupfd(r15, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) r17 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r17, 0x80045300, 0x0) r18 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r18}) r19 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r19, 0x400442c8, &(0x7f0000000c80)=ANY=[@ANYRESOCT=r17, @ANYBLOB="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", @ANYRES64=r18]) ptrace$getregset(0x4204, r18, 0x0, &(0x7f0000000340)={0x0}) syz_open_procfs(r18, &(0x7f00000005c0)='net/ip6_flowlabel\x00') splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:25 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x1f00, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:26 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x5bcd7c605e5ce746, 0x0) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f00000001c0)={0x8, @broadcast, 0x4e22, 0x3, 'fo\x00', 0x20, 0x40, 0x36}, 0x2c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) lsetxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.selinux\x00', &(0x7f0000000340)='system_u:object_r:watchdog_device_t:s0\x00', 0x27, 0x1) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0xf2dad85472e2a370, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) socket(0x9, 0x2, 0xf9) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:26 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:26 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x11, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f00000001c0)=0x7, 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x2000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:26 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:26 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) 16:51:26 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:26 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = epoll_create1(0x0) read(r3, &(0x7f00000001c0)=""/15, 0xf) close(r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x22, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000100)={0x0, @loopback, 0x4e21, 0x4, 'nq\x00', 0x4, 0x8000, 0x44}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x2400, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 658.847507] IPVS: set_ctl: invalid protocol: 0 127.0.0.1:20001 16:51:26 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:26 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) rseq(&(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x4, 0x5, 0x5}, 0x1}, 0x20, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f00000003c0)=""/38, &(0x7f0000000400)=0x26) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r8, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)={0x58, r9, 0x101, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, '\x00\x00\x02\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x58}}, 0x0) sendmsg$IPVS_CMD_SET_DEST(r7, &(0x7f0000000380)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x114, r9, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xa7}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x800}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfe}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x14}}]}, @IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xa0000000}]}, 0x114}, 0x1, 0x0, 0x0, 0x20000000}, 0x84000) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) write$binfmt_misc(r4, &(0x7f0000000540)={'syz1', "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"}, 0x1004) r10 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm_plock\x00', 0x107000, 0x0) setsockopt$RDS_GET_MR(r10, 0x114, 0x2, &(0x7f0000001600)={{&(0x7f0000001580)=""/61, 0x3d}, &(0x7f00000015c0), 0x26}, 0x20) 16:51:26 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 659.062867] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 16:51:27 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r4 = socket$kcm(0x29, 0x5, 0x0) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb62291096adef7d7d34599b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x3c00, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:27 executing program 1: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) openat$vhci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhci\x00', 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RTC_WIE_OFF(r5, 0x7010) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000200)={0x7fffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) setsockopt$bt_hci_HCI_FILTER(r8, 0x0, 0x2, &(0x7f00000001c0)={0x0, 0x3, 0x10000}, 0x10) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)) ioctl$BLKROSET(r1, 0x125d, &(0x7f0000000100)=0x2) 16:51:27 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:27 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:27 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:27 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x3f00, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:27 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f00000024c0)=ANY=[@ANYBLOB="0000000000000000260200001200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ebbac03dc7dbf44a86bf3d670b23b36e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001080000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020f6d349941600"/726]) pwritev(r3, &(0x7f0000002440)=[{&(0x7f00000001c0)="ce0c42661d30d21efebd35b96510c989603a7484c1be92a5ac47884a9528b9fe04338b5eb766d9f8b914c5bad9fc972e637c085d2edb4644b99686ee5a6027e13c2b8bc7b63383af31fe3eaabc985325a03138d4df1ae6ea027b9ef7abf2b74324cfc98836f4a06caeec61bf205983e61eaa1bda0bf6bac0559c3ab0138c974e15e2be5dd8e1810701805825584c4ad9ef45a35189f718e7d73337c0813146a1b18cb34c44351c4175936fbde8ed25236ac1fa0487bd95fd0e518ceb32062a15d59309e98d6529d02918cf75e39c9f51f95230d2a0f980f3d8a1fa26f2f8d37461e4c2257baf0f77474393f9191161c653e8b3bcb16c807c865eeee3abab85c5dbf18a18d00234c163e8ae348291d8f286a77093cc6f41894bbfcb0192fab16cf10d8221ea775128b36f83d10771a062ebabbb6ee52cc07f8a78d3a114c1941ce78c43d0f41154c413949bd0f91445a7d31be8dc46c4adf90a932d520670e100d6b38ffb74d8e9b5b5a815874ea3bd46e138b087cfb37d909541817288cc1e30d86f6a0b6acc35ccc242627fe13858a49f00da178ab698ca1248ed75d95e05c53f4d0e5183d4cc562d8ba7bdc05458c3c8f0d530867390416606085db0a72f24b078b0cf8a48fdc1cac416c6ffe4cb54ad2a53c998d9bb369677a365e9cd65506dfdfed03330d409ae1606de54cd77b1dac245a158b9539e3e9bf30a49edf18825bb039f44e53aa1590f50bf0b1274dd8a36c551aec7b5230c488074552660aefbb4b4296df1af0b981744c2c9fcbdf45ac38f46eaafc96cb6837b466e223529677a4a624bf2d46be2c6bd51cec50b690fe32c41fc41088db4decabff37f8e14b31682050d18e3acb73f4c9362d0f9413b4b3751ba077d95fc3ef2aab007a2c1796c9667eda8ac36a45bfb5a6f20fa82ade0cc99e7b011ee634830bddf081a95cf2ac8914a0e65c9c850f3aa0d2c84a6f77722ed6b6abfced1cb8253af77987d9291790c2426e03f2ec7c528b6338e4dcecc52bbc54509535e04742a529733e1366b872bab1ae1bcb7ee9cfbb233a75495114f88c84c17ab3de5d7870f9b6f293d8d0e89d675fbc931ae59dcf86e105c4920bf8a5cd9e348f2e6fa82c635284970931f53b7d797de3cdcbe6311f57759002b865522eee487ad933e36ba9d711fd91ce80bf6fa2710af497c9457cfe889111b36fbcecc6f5bc9d0aa69fc548ae65a99fbfc4430026b7662124d50cb7215bc24aa4e754fa22f6b8241df8d143ceb4ebd6c22c80b2f3104800ffa1b50698e6d35db7b94ae2836af77fd101c033de20ff1b1c0aa3b752583ff1829d125afedb1b7070e56f808705cf6a3f91aef2d5a59877397c6541f7476e753d1f66cbd79b5421948c0a2b67680af3a4df5d56466bd39d8bc88fb11cb95c0835563ab3bd2e1108312e243e5f305a564765ab8f9e7a2a362d35c94a24437e4a297dc685e371a13bd95fd67b762cf390b09832793c1d4faef49d35a9bad0c09acf9679289d573c35db82d720e2d55df41a7317645e557fffcba85f6f7929eb3719304314e4be11ebd41c5499865aca354c68249580e4414ba7be1086dc86a1a90b57c7031151c20ebaac3f9540eb4f6d76873b0796dc9714d173f255a3b46b0450bdb4b0996aede0457d29278e5b580c67e1c5179d108b797266e691a0afd6dc9cbd5276d4dc63b32ad01b2c929034ebe0ca96039630333bd152739a4bfb0a98906ca143068a591d82d9e43e91cb3699103d8992d37e54caa07f06cd95bd27c0aaa6eef58124689d2bf6d9aea7414c57d635e7d410bfdaaa2ce21480dad44f84f71a2de5ef15ec591ce3e1c627410b938510e74e5f1c9931fe2bcdea6e5299462c23c1175618d27b6b48edcadf9b18134ff919a73c041fbef08d20e2fc61cf2dbf4dbd9cbdbf6a687c4069da23578763a812e735b8cd8f0a894b6c112ca14057f4c3592a5a22e049f1754c45160ae649d56eba4baa2a93c73a2825bd790ea735ae85eeb0a7a9850c66f0624ad08ce85e6ffa84d6ae2b397eafa51f9a2282f31141e4e04db8bed3fb265f2ddc4e4dba8d7c51f600ec7e6c13776de031e408c169b0fd71c76f587ad823364c9691042f188171a06ff7f2611b3a139ce75ee9dc263ad5442279b6cc1c83fb519a289d3cf8c26adabd16703f84a7cfbe3bf6d742cef4f880e6af2c305b9f8c629b869a4e8f26a61d039b778d25c57225e90d95b638a2fbecced9b34e3dbdf857254279464e25798a177329a65e43eb0a0a743b935d797abcd6d55d0c50ed14cb702356c816835acd5c06e7e597ae458a9e1d9191a0d16e98dab759f9685a5fb6d23e1031f0f0374c8537a9c1d4d7372f0715d695b5e04e975792d6606f4a11591892d6f2c1b8c5fa3d16179950b4b66feb74bbb3f18ea31f6984c0070d8b043e95f4fcb84f89667a6121fa0a8bb946e5fa62ffe6b5d533651762be7d26cfb703212d337637f0fc051894067d5c5c258be04afc087fc6463239dae5e2a688533b1b42a6f63407fffce14305203e736a8d023a0f79c9b624e1af897a236a64c2ec50dc2bb323999b0c2726e26801ae0326be968132eeebc7f9139de4850fffb9a0c7a4443ed6763c8ec03d3e8dfeacc4b5ece27a39e0e5047f0b3bebc6c2552d89a15bb0937983514ecd86bff73932f195965472dbcf30a140ac61f330f27b800bb1ef293526c1c8bcf7f7409be784183a2524d7666e14c14e92ae1a252d2dc4f1fe922de9e5bf09f5c35bb29550fc6af4557a61f4b21f7652b7fc808015911e9093330c2f6c0475e8c82703da8058f7156b373554bd12d290c49402340bf0f58bfc055939bc249f7f0f31f675b75ee5647c2fd46914cddfbcacc22902d44cbe705c6d234a786a4b1ce0651464825ba7fd5d9e45c83818f84da5a01700569da146db4fe48ce62bbc35ce2df59daad844f4d0599d9574210b527b8f91ca8b37eaa9b7b2b599c4508c37f115ff0fcf138c910fb1806a69abba6f0877094b01ea0e5eee8a1f630c5bcfb1957b6b606e92035980889e8f88721437fde9b70b96b5959d2c3092f1f2754db4dc23ff18f674a1691957a561e812ae8796bb458e59efeb4d8cae7b158be7aed8c1bc4478691827df762a358b63507bd0db2068038275b7eb27ac4278780cdcd2699fe2182e5b2bbcae34d4acf0daad509022207c34e00fc9438b793644e45f57d87e55d71b33100c91d2ab1f2a0abbe711e59265cfd8b7fdf75322a621eac81cc2c46b89b79abc99e5182124d92b79b491a06c11ff869a4de25a568541ae93596fafaa92b99d83abb9cb26aa621980c3988cab1c6d51db662203cfd586602623f671fcfe16a0c3dae4b3cb35600a82c602d6f8a598225ea7e3b6a7b4726998aba20da747ce7c670098edf3d919213d7f3b0faec5c5218e6435bc4bc229238e3b6ee041c8b999dc4433ad6371ddba6e5142c0a8ff18a015691d5d867bd824a17ec4c539342b1ea5d82ff6d85bfa8056aa04bd7316cd96a1c92b36bdbf1eb4af39578b279146741b5e3f9a7801a9295d89345cc0e493be66ed9bd769fb7ec9879547e0be17f04d2a34fe2ae1e75b0622e1f5f29382f4e0351e9ecfcc80de24008f32d48af3523acd0d785947d4b5983d70094354711ad62b4fcce1378d394f0441eba58afc6ae6abf58517af0398143f67ed71e3b693bf297fa10304e2cef1989ff58ef2626b42b65795f67ce493561cd2e62f84c14ad5111048180e339fbb27732b273b7af1301fac46297eefdd6ab74e4bc91e0dd56fc332408d7ada04c5570b9d20ad499e1a265ebdc341bfe33485f9baf0bacd0094439406e94727d269e25f6731d078129541252a9dc7e0279283a9f5ce104b1e397d84524f69d4b7ba31ec15702de1b8d0f02251b9c6463122fcad231e96be46dc11378ed28c7a76e6de39ad2365c759351770353139520e2d511e508d6f07f7db9aa6d369307dcef9eef49e4a6b0c9b2cbfab48c44b2fe149f4dbafaae80d691a15e4b9cac1bfe1826aa70feb6b72dc4682d984919e3857d69fa4640c11bfdc7abfef80fe5de3e7f77c17d643590ee9b3bbbb524c122efd8ae8aa8597e4c23b1340adaac8ac9ecf5b72ef9741a93c5bf77f0628694cd75f196fc91397392b018b8df2069caec08e70c426ede66bc7ab591b7d0d7727dcf39598ef98384d0a9b798048627d98d82019587c7ba7fed17dc47f2847c21eb722653ff5366fe7689a614d24dbd2524a59c03e35b79d05eec7853a167246288305f5297cfbb445f303374525de9d7bef79bf6e5b9d64d74058232044e4e2545a24e548110a56227e677eae34cdbbbd1176af9c15e389c19a26ada3caadbbc52afe1593f3a2116138933cf5dae1f68369e490735c66d73c2e817468557f31cc6ae94f0baef3c0cfff2133242ea0fe9d1cf1df7be7851214120cf6bfae0a72d5a8fa1ad9720a69c65def1ed24a8b1ecce052fe0a2b7f008b46fcf820c8f6e2ad5236fcdb7c22fbc2c41287473bf76ff67626536b4b6eae93a411ad810319a59046d4cdd8b198c19cff76c4d8bc800269f6de8c258e7e8a9ab85d41c1264edf523c2e3cec4eabf07939a69ed4c74045f5be6259d86b1c61dad8a8aa1d834e5ab23fa5010e7a0ec5aaeb5e8ac78aa3ed202d586d00c6ada90de40d3985f2f9204d5f13ffb9295c4831d7e49bb7273e2c0a26c41734bf52dace4513b893c8c295abd4a40a5981d403d4dfc39422061a07907ce53001b963c0031a19935f4794a84cb49cd13d966b0d95830a92abe7280bac4341b778b8d26998292448a3695fea409b3a42fdcc74f41a1bfd97ad93174ae0a492e90f77bc7576517aaeca1b1ed64ebe3a57d9b9c6571de46102ecea83b8a29ee4a193db679e6e9f0aa560cbdd95a84e4cc5f7cf47805e702ec19d02016789783e50e5aef4e1c086b332802af892315771c726bb26634cd5dbadff6beeeb7e1197912c8380452cd53115950d208d2d44d7d212fbf2559cec6426ac141ffd1b40a07927ec606a9d56346a07c4f1dbca23b2e15c990efaa3995d8d71e86091f86d687c7c24d14b19bfac53c40ee95ce33c9bf41c6b1f3a4358b650dd7f9b24d00594e240012ed9f29c550dbaa45c328a96721ebcfd7da9b306415eb93dd50097b673fb3cdb0b424deda62ae780d97c65d12899d8730f04e7ff97c28d71251cfbc74ad668e146368e30b9a1624b4edc65deba36dcb1992dae199e6089ac119230234eada440910285af68d9586c1c40238bddf04097ac378d9fd23ec401ba6aa29a2db8ad8ce16ba25b66ee7fa784e710839317c2e018bb4fbfa5858d1b49c58284558be2a5cba1ba49de0c66e65e9c4db51e631d5f7f53194f5c78518c7d270343a8331d819a9609be89f529c5b9a043f00e792ac0be0d6a141b1d2687c75bc298afd87fcb13a9a300eb1ea3c0c7c2ce26aa54bb18154a84c04e811b0444ef1b4586645f28dcfa12ec02d3e42bca5d548516a36c4ed6d9c541271c885e918c5fd2f372d55a967b9dc04fd741b26e226fabb62d1499134d1a22796d4215bce3a329f86d493b5dcd5a0ba83b9b4006c0e1afd1a4583ce52b1651d4eba77c42df595b1ebbe040819c37c7acfdb81e546e56cd048c441f4e2685804214c08067c893654356a923013450a1e875a823fc0b05dced2b7522810b779ff3147186e2658bb36c928f8f659f1cba5e6f909be19873bcdc2f45b90cd9961b4cbae6eaaef12b2256b24e74ededf223e4bd443f2215754009a0026501f906388026f73b2d43288240f4281fb27e9", 0x1000}, {&(0x7f00000011c0)="b481f29f8b3446fd693963e607f7eaeda8a92bc45e465c7c6e84b6d421fb5d5d39e4b917233e327a960518e79d68712bef7f418d59df4fe4e8fccb9642009bb2ee18a2a5ba002c4500bd4454a14eb5db1bfb244569fd8182251e5d42cfcb6864d6c3b72a0103f1e04c85", 0x6a}, {&(0x7f0000000100)="6006c85ab3674d6d6868211a58716d7c77b5", 0x12}, {&(0x7f0000001240)}, {&(0x7f0000001280)="5cb69cbb96dea44a28916663b8d2eec14cac831574f519c042bab29a599fccda9bc0f2bd9a827e933e87465f6cd30e7c250a3460ccb690f4c3131655fb063584445ea395418ad03a8ab2ae81bb23e21cbb26a807fd6bb8278fef4a527033ac28d0922a759eaac6b8dc452a8cf0ea9c4bfa308a73ce3d0a4447d16ffce8c124dd6cb9a13e440daf22e39a2c3b691e4bc8d08d0427c5f37f8ba4d7b05b0d92ef9faf2d8d516679e76917c2e37600b7294b5ec26452afae79828607c3c74b1a46cc5ac7e290f3dda13784b16d1b6b8e5fcf44feb341b2f7df", 0xd7}, {&(0x7f0000001380)="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", 0x1000}, {&(0x7f0000002380)="00e80bed813a47dc28fe41f6d481377c9a60c0e1a06c40f1842c6ee3361ff6dac0666784472a55652f2c77560e09dc1c7ec164da36d06cd7c33ae0f4be23b0a29ff53828dc0c3a45fa9007c93e4adc7bf34f8c5e2d", 0x55}, {&(0x7f0000002400)="26429b7f12403ffaa579f59014381bb556b3", 0x12}], 0x8, 0x0) close(r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$BINDER_THREAD_EXIT(r6, 0x40046208, 0x0) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:27 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, 0x0, 0x0) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:27 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x1f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x1, 0x2) ioctl$EVIOCGUNIQ(r6, 0x80404508, &(0x7f00000001c0)=""/119) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) splice(r7, 0x0, r1, 0x0, 0x3, 0x1) 16:51:27 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x4000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:28 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000200)='/dev/sg#\x00', 0x0, 0x0) socket$inet(0xa, 0x801, 0x84) r0 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x100, 0x400) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000340)={0x84, 0x1000, 0x0, 0x1, 0x7, 0x41, 0x40, 0x4, 0x4, 0x1f}) setsockopt$RDS_GET_MR(0xffffffffffffffff, 0x114, 0x2, 0x0, 0x0) pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x41395527) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000440)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f00000002c0)="db62a3b489268e90fc4b0ffd5fb48336dab01a229b78ca4f000000000000", 0x1e}], 0x1, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r4, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) r7 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x161900, 0x0) getsockopt$netrom_NETROM_N2(r7, 0x103, 0x3, &(0x7f00000001c0)=0x20, &(0x7f0000000240)=0x4) splice(r3, 0x0, r5, 0x0, 0x10002, 0x0) 16:51:28 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:28 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x3, 0x2) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x14000100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)={0x148, r5, 0x75efeba2d9d26c2, 0x70bd26, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}, @IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xf6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x400}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2eb}, @IPVS_CMD_ATTR_DEST={0x18, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x1d}}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2a}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xb283}]}, 0x148}, 0x1, 0x0, 0x0, 0x8000}, 0x48881) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x4087, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:28 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:28 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:28 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x4800, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:28 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) io_setup(0x401, &(0x7f0000000100)=0x0) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) io_pgetevents(r4, 0x9, 0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000300)={r5, r6+10000000}, &(0x7f0000000380)={&(0x7f0000000340)={0xe1}, 0x8}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:28 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:28 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x4a00, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:28 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 661.048182] net_ratelimit: 19 callbacks suppressed [ 661.048188] protocol 88fb is buggy, dev hsr_slave_0 [ 661.058389] protocol 88fb is buggy, dev hsr_slave_1 [ 661.288190] protocol 88fb is buggy, dev hsr_slave_0 [ 661.293397] protocol 88fb is buggy, dev hsr_slave_1 16:51:29 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:29 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x440001, 0x0) signalfd4(r6, &(0x7f00000001c0)={0x4782}, 0x8, 0x0) r7 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x4c00, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:29 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:29 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:29 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_ENUMINPUT(r5, 0xc050561a, &(0x7f00000001c0)={0x4, "1ef879d904661f17efe50eaadeffd2b8f2b849b9ba8e0c91a1432752f4d06ee6", 0x3, 0x9, 0x3, 0x100000, 0x12, 0x8}) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:29 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:29 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, 0x0, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:29 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, 0x0, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:29 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, 0x0, 0x0) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:29 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x2) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$netrom_NETROM_T4(r8, 0x103, 0x6, &(0x7f0000000100)=0x4, 0x4) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x4c01, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:29 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) 16:51:29 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000100)=@ccm_128={{0x303}, "db3702b5f7b39564", "f742b8a634e914b6a9c8dd4fead1f726", "dec4e014", "fc4a58a4c1767044"}, 0x28) r6 = fcntl$dupfd(r5, 0x0, r4) modify_ldt$read(0x0, &(0x7f00000001c0)=""/79, 0x4f) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:29 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x4c03, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 661.858112] protocol 88fb is buggy, dev hsr_slave_0 [ 661.863214] protocol 88fb is buggy, dev hsr_slave_1 16:51:30 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:30 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 662.168109] protocol 88fb is buggy, dev hsr_slave_0 [ 662.168134] protocol 88fb is buggy, dev hsr_slave_0 [ 662.173265] protocol 88fb is buggy, dev hsr_slave_1 [ 662.178315] protocol 88fb is buggy, dev hsr_slave_1 16:51:30 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r3 = socket$inet_smc(0x2b, 0x1, 0x0) splice(r2, &(0x7f0000000200), r3, &(0x7f0000000240), 0xfffffffffffff61f, 0x1) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r7, 0x8038550a, &(0x7f0000002800)=@urb_type_control={0x2, {}, 0x0, 0x43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r8, 0x84, 0x1e, &(0x7f0000000100), &(0x7f00000001c0)=0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r4, 0x0, 0x10002, 0x0) 16:51:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x4e01, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:30 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:30 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r8, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000f000094e083cbdcd1c625fb45548acaf33e00"], 0x48}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x74, 0x24, 0x507, 0x0, 0x0, {0x0, r8, {0x0, 0x2}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x48}}]}, 0x74}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@gettfilter={0x24, 0x2d, 0xf71c7633af80b1ed, 0x0, 0x0, {0x0, r8}}, 0x24}}, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r3, 0x114, 0x7, &(0x7f0000000200)={@ll={0x11, 0xc, r8, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, {&(0x7f0000000100)=""/41, 0x29}, &(0x7f00000001c0), 0x4}, 0xa0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) r9 = socket$inet_udp(0x2, 0x2, 0x0) close(r9) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r10, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r10, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r10, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r10, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r9, 0x0, 0x10002, 0x0) 16:51:30 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:30 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:30 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:30 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) 16:51:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x5300, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:30 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:30 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:30 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000140)={r3, 0x3, 0x6, @random="08f00793e142"}, 0x10) getsockopt$IP_VS_SO_GET_DESTS(r2, 0x0, 0x484, &(0x7f0000000240)=""/102, &(0x7f00000002c0)=0x66) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet6_tcp_int(r1, 0x6, 0x18, &(0x7f00000004c0)=0x4, 0xffffffffffffffec) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rfkill\x00', 0x10800, 0x0) r8 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r8, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r9 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r9, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r10 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r10, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r11 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r11, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r12 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r12, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r13 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r13, 0x11a, 0x1, &(0x7f0000000000)=@ccm_128={{0x304}, "539de05446eac6b9", "e0e4987e50db5874f25600065c0f6dec", "2619c950", "fa534fc58cafeeb6"}, 0xffffffffffffff48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = fcntl$dupfd(r15, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) r17 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r17, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r17, 0x107, 0x1, &(0x7f0000000140)={r18, 0x3, 0x6, @random="08f00793e142"}, 0x10) ioctl$sock_SIOCADDDLCI(r17, 0x8980, &(0x7f0000000300)={'lapb0\x00', 0x1}) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) r19 = syz_open_dev$vivid(&(0x7f0000000100)='/dev/video#\x00', 0x0, 0x2) r20 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$USBDEVFS_REAPURB(r20, 0x4008550c, &(0x7f0000000200)) r21 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x40002, 0x0) ioctl$TCSETX(r21, 0x5433, &(0x7f00000003c0)={0x20, 0x8, [0x6, 0x7fff, 0x6, 0x800, 0x4], 0xec}) fcntl$notify(r19, 0x402, 0x4) splice(r0, 0x0, r4, 0x0, 0x10002, 0x0) 16:51:30 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:30 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x5603, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:30 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:31 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:31 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000280)={0x3, &(0x7f0000000100)=[{}, {}, {}]}) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = accept4$inet6(r6, &(0x7f0000000000), &(0x7f0000000380)=0x1c, 0x80000) connect$inet6(r7, &(0x7f00000003c0)={0xa, 0x4e24, 0x400, @loopback, 0x5}, 0x1c) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r8, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r8, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r8, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r8, 0x11a, 0x1, &(0x7f0000000340)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r11, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r11, 0x84, 0xe, &(0x7f0000000140)={r12, @in={{0x2, 0x0, @empty}}}, &(0x7f00000000c0)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x66, &(0x7f00000002c0)={r12, 0x4223af9b}, &(0x7f0000000300)=0x8) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000001c0)={0x0, 0x0, [], @bt={0x1f, 0x9, 0x6, 0x3, 0x4, 0x5, 0x8, 0xa}}) 16:51:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x5800, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:31 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x9c0c0, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r7, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) write$binfmt_elf32(r1, &(0x7f0000000100)=ANY=[@ANYRESOCT=r7], 0x17) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:31 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) 16:51:31 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 663.370748] audit: type=1800 audit(1571503891.222:1787): pid=24684 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="kvm" dev="sda1" ino=17251 res=0 16:51:31 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:31 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) setsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f0000000100)={0x1, 0x6}, 0x8) 16:51:31 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:31 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:31 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x5865, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:31 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:31 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x400, 0x2000) accept4$ax25(r7, &(0x7f00000001c0)={{0x3, @null}, [@default, @bcast, @remote, @netrom, @rose, @bcast, @default, @netrom]}, &(0x7f0000000240)=0x48, 0x800) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r9, 0xc02c5341, &(0x7f0000000280)) 16:51:31 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x361600, 0x0) ioctl$KVM_GET_FPU(r4, 0x81a0ae8c, &(0x7f00000001c0)) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:31 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:31 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000002c0)=@gcm_256={{0x304}, "31aaf492c3020722", "daea1b5935caeae571bcec7c31067775bba36856e93894acaa160979ff71fa7a", '\x00', "ce5ac9a59b78f08c"}, 0x38) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f0000000140)={r8, 0x3, 0x6, @random="08f00793e142"}, 0x10) getpeername(r7, &(0x7f00000001c0)=@x25, &(0x7f0000000240)=0x80) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000100)={0xb, 0x102, 0x2, {0x1, 0x122b, 0xabc8, 0x6}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:32 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x5c02, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:32 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:32 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) connect$can_bcm(0xffffffffffffffff, &(0x7f0000000100), 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) write$cgroup_type(r1, &(0x7f0000000300)='threaded\x00', 0x9) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000200)) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000240)={0x0, @reserved}) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:32 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:32 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:32 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:32 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4000000105042, 0x0) write(r2, &(0x7f0000000200)="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", 0x1ffe00) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0xffffc00000000000, 0x9, 0x0, 0x2, 0xe, 0x5, "8ea6d01fabe1b364ded13de7e76ff64205c4330da805f2f84e5d60ceaf5f6acb7c4094284625dd9117e4113055c1a2d7fbea920297e8eb17b5e730aa81088fc3", "5acb4ddb0f46d5ed0025f079d8e7e729a9a895a24629c92de80fef2e052e18af3e8819fe20ac848e5e90b8f483b5de1194cf55fec95fe9b8d5f9b2aea17aa133", "dd084aca218c643e5997d5f25d39f8115aa944e0fdc7490e1e1d444c2f94917f", [0x8a, 0x6]}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r4, 0x6, 0x14, &(0x7f0000000100)=0x2, 0x4) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r3, 0x0, 0x10002, 0x0) 16:51:32 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x5e02, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 664.797384] audit: type=1800 audit(1571503892.642:1788): pid=25147 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="nullb0" dev="sda1" ino=16542 res=0 16:51:32 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:32 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:32 executing program 1: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000283000/0x3000)=nil, 0x3000, 0x200000e, 0x11, r4, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) preadv(r5, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) stat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$vbi(0x0, 0x3, 0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nullb0\x00', 0x4040, 0x0) preadv(r8, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x3ffc00}], 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r10, 0x0, r9) r11 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x80004001fe) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 665.062199] audit: type=1800 audit(1571503892.912:1789): pid=25262 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="nullb0" dev="sda1" ino=16542 res=0 [ 665.112959] audit: type=1400 audit(1571503892.932:1790): avc: denied { map } for pid=25261 comm="syz-executor.1" path="/dev/nullb0" dev="sda1" ino=16542 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 16:51:33 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x6000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:33 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10002, 0x0) [ 665.164279] audit: type=1800 audit(1571503892.932:1791): pid=25262 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="nullb0" dev="sda1" ino=16542 res=0 16:51:33 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10002, 0x0) [ 665.205682] audit: type=1804 audit(1571503892.932:1792): pid=25262 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="nullb0" dev="sda1" ino=16542 res=1 16:51:33 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RLERROR(r3, &(0x7f0000000100)={0xd, 0x7, 0x2, {0x4, 'tls\x00'}}, 0xd) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddf6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r4, 0x0, 0x10002, 0x0) [ 665.285676] audit: type=1800 audit(1571503892.942:1793): pid=25262 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="nullb0" dev="sda1" ino=16542 res=0 16:51:33 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:33 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10002, 0x0) 16:51:33 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x304}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x6558, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:33 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x0) 16:51:33 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) read$alg(r1, &(0x7f0000000100)=""/46, 0x2e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x1ff}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) r8 = fcntl$dupfd(0xffffffffffffffff, 0xc86e172039034869, 0xffffffffffffffff) ioctl$IOC_PR_PREEMPT_ABORT(r8, 0x401870cc, &(0x7f0000000240)={0x7, 0x251, 0x3, 0x8}) ioctl$BLKDISCARD(r8, 0x1277, &(0x7f00000001c0)=0x2) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000200)={0x8}, 0x4) 16:51:33 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x0) 16:51:33 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:33 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_GET_MSRS(r5, 0xc008ae88, &(0x7f00000001c0)={0x6, 0x0, [{}, {}, {}, {}, {}, {}]}) setsockopt$inet6_tcp_int(r2, 0x6, 0x0, &(0x7f0000000100)=0x410, 0x1f8) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf32(r4, &(0x7f0000000240)=ANY=[@ANYRESHEX=r6, @ANYRES16], 0x14) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) 16:51:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x6800, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:33 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x0) 16:51:33 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) r4 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000380)={'team_slave_0\x00', 0x0}) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000140)={r5, 0x3, 0x6, @random="08f00793e142"}, 0x10) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000240)=0x4) recvfrom(r4, &(0x7f0000000100)=""/48, 0x30, 0x10000, &(0x7f00000001c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'jitterentropy_rng\x00'}, 0x80) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 666.077722] device team_slave_0 entered promiscuous mode [ 666.328143] net_ratelimit: 19 callbacks suppressed [ 666.328151] protocol 88fb is buggy, dev hsr_slave_0 [ 666.328204] protocol 88fb is buggy, dev hsr_slave_0 [ 666.333206] protocol 88fb is buggy, dev hsr_slave_1 [ 666.338241] protocol 88fb is buggy, dev hsr_slave_1 [ 666.343375] protocol 88fb is buggy, dev hsr_slave_0 [ 666.358460] protocol 88fb is buggy, dev hsr_slave_1 16:51:34 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:34 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 16:51:34 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[], 0x0) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x6c00, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:34 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 16:51:34 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 16:51:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 666.870606] device team_slave_0 left promiscuous mode 16:51:34 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0x0, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:34 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x7400, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:34 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f0000000240)=ANY=[@ANYBLOB="2154d9ee6b245ab8311a1f16699f796deb7dcc5915355de54b6c4d183fc639c1ffbd34b9b4573e8fda8b89a93080f98929cc2eb7533660eb406d4f7fba182439f200bd339f5ae25becf2e75125b1e3fef3ac0b5bf7713a0439ac0f66751f30df4a8ba40d41a19cc0917fe85751a6d5c18dc429e25be76e82205e208eecd1f98ecae7874a690c36f89156b69a2114573d8809eb445001a56799243b436e57f9a53cad95", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r6, 0x84, 0xe, &(0x7f0000000140)={r7, @in={{0x2, 0x0, @empty}}}, &(0x7f00000000c0)=0x100) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f00000001c0)={r7, 0xad, 0x20}, 0xc) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", ' \x00'}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) fstatfs(r0, &(0x7f0000000100)=""/32) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:34 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0x0, 0x0, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:34 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 667.288184] protocol 88fb is buggy, dev hsr_slave_0 [ 667.293396] protocol 88fb is buggy, dev hsr_slave_1 16:51:35 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x7a00, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:35 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:35 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001200)={r0, 0x10, &(0x7f00000011c0)={&(0x7f00000001c0)=""/4096, 0x1000}}, 0x10) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$USBDEVFS_DROP_PRIVILEGES(r5, 0x4004551e, &(0x7f0000001480)=0xf16) close(r3) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r6, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) syz_open_dev$mouse(&(0x7f0000001240)='/dev/input/mousu#\x00', 0x8309, 0x80440) fstat(r8, &(0x7f0000001280)) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000001340)={{0x4, 0x0, 0x800, 0x0, 'syz0\x00', 0x8}, 0x3, 0x3, 0x1, 0x0, 0x3, 0x100, 'syz0\x00', &(0x7f0000001300)=['\x00', 'tls\x00', 'selinuxkeyring-!][\x00'], 0x18, [], [0x1b5, 0xffff, 0x6, 0x8]}) 16:51:35 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:35 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "d12c57f741572605", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d5373f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:35 executing program 5: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) syz_open_procfs(0x0, 0x0) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x8000000000000802, 0x0) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) fcntl$getflags(r4, 0x408) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0xd) write(r3, &(0x7f0000000040), 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:35 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 667.528123] protocol 88fb is buggy, dev hsr_slave_0 [ 667.533258] protocol 88fb is buggy, dev hsr_slave_1 16:51:35 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:35 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x8100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:35 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:35 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f00000001c0), &(0x7f0000000200)=0xb) unlinkat(r4, &(0x7f0000000100)='./file0\x00', 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:35 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) write$P9_RWALK(r4, &(0x7f0000000480)={0x30, 0x6f, 0x2, {0x3, [{0x4, 0x2, 0x5}, {0x4, 0x2, 0x2}, {0x1, 0x4, 0x5}]}}, 0x30) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockname$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000001c0)=0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$binfmt_elf32(r0, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) r10 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r10, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) splice(r8, 0x0, r0, 0x0, 0x2, 0x4) 16:51:35 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:36 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:36 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:36 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) mknod(&(0x7f0000000100)='./file0\x00', 0xe2cb08a4e02e3e7, 0x6) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x9003, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:36 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:36 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x406, r3) socket$tipc(0x1e, 0x8, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r7, 0x84, 0x21, &(0x7f0000000100)=0x6, 0x4) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:36 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:36 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x9601, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:36 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) ioctl$VIDIOC_G_SLICED_VBI_CAP(r1, 0xc0745645, &(0x7f00000001c0)={0x3b, [0x1, 0x6, 0x2, 0xb975, 0x1000, 0x1, 0xfffb, 0x2, 0x1f, 0xff80, 0x3, 0x30e, 0x8, 0x8000, 0x5, 0x2, 0x4, 0xfff7, 0xf9, 0x0, 0x9c09, 0x2, 0x7, 0x4, 0x7f, 0x9, 0x20, 0x8, 0xc4, 0x81, 0x6ba, 0x5, 0xffff, 0x2, 0x627, 0x0, 0x8871, 0x2, 0x9e7a, 0x7f, 0xfff9, 0x1ff, 0x20, 0x6, 0xf001, 0x93, 0x9, 0x40], 0x12}) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r6, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) fcntl$F_GET_RW_HINT(r6, 0x40b, &(0x7f0000000100)) r7 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:36 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:36 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0xfffd, 0x0) 16:51:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:36 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:36 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$cgroup_subtree(r1, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0x9802, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:37 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:37 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:37 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x22, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vga_arbiter\x00', 0x20800, 0x0) ioctl$EVIOCGKEYCODE(r4, 0x80084504, &(0x7f0000000440)=""/22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$bt_sco_SCO_OPTIONS(r8, 0x11, 0x1, &(0x7f0000000240)=""/126, &(0x7f0000000100)=0x7e) r9 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$SIOCAX25GETINFO(r11, 0x89ed, &(0x7f00000001c0)) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f00000003c0)={0x10, 0x0, &(0x7f00000002c0)=[@request_death={0x400c630e, 0x2}], 0x8e, 0x0, &(0x7f0000000300)="71a8142d647d784e1b1756eeae993d0da3d3062b305d74a9f7a91bf077fd502c61975e0b3a801e444a5b19e374bcd42e732809ba359bd200f0a1a608e93dd68ce8892141ef45fc329968326fbb7ca5b4c2554e3d87f8b7f268cd8128d6c671ce5d5492727dea1512fa39830408fce7284ac85ea8628599a079ea091124357ab4acc6fd81cbbdb02cd0240d8eb426"}) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:37 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:37 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:37 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0xb601, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:37 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x10, 0x3, 0xc) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:51:37 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f00000001c0)={{0x1, 0x0, @reserved="49e54edd188052e487292c6893e175fd941ab90fe154a04519f058f21eacff4a"}, 0x67, [], "4871bb756ebbf3d72aa8d69cafe69e5431db8bc834cc758872a6679bef33f043647179f2ac82664fb74a7c1a56bef76577204fee3165a1974ffd52a147e52e207e1e0c7cdead73478a1db0b8211d858ec867766b4658944c24c0ca875efcc000f24c94b5d8f27e"}) close(r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='\x03\a\x00\x8d', 0x11) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0x16, 0x20a200) ioctl$IMGETDEVINFO(r7, 0x80044944, &(0x7f00000002c0)={0x3}) r8 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SG_EMULATED_HOST(r10, 0x2203, &(0x7f0000000100)) 16:51:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:37 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:38 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10002, 0x0) 16:51:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:38 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10002, 0x0) 16:51:38 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000000100)={'lo\x00', 0x418}) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f00000001c0)={0x2, 0x129ea5437fe79fd0, 0x7, {0x14, 0x9, 0xa775, 0xe985}}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) 16:51:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0xbe03, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:38 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x10002, 0x0) 16:51:38 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:38 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) set_thread_area(&(0x7f0000000100)={0x80000000, 0x20000800, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1}) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[], 0xfffffffffffffee7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$ARPT_SO_GET_REVISION_TARGET(r5, 0x0, 0x63, &(0x7f0000000240)={'TPROXY\x00'}, &(0x7f0000000200)=0xf) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r7, 0x111, 0x2, 0x0, 0x4) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:38 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback, 0x1000}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:38 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x0) 16:51:38 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x0) 16:51:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0xc100, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:38 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10002, 0x0) 16:51:39 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 16:51:39 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r4, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r5 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000002580)='/dev/video36\x00', 0x2, 0x0) r6 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r6, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r7 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r7, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r8 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r8, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r9 = syz_open_dev$binderN(&(0x7f00000025c0)='/dev/binder#\x00', 0x0, 0x2) r10 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r11 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000002600)='/proc/self\x00', 0x2000, 0x0) r12 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r13}], {0x4, 0x1}, [{0x8, 0x6, r14}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) r15 = getgid() r16 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r16, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r18 = dup(r17) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) r19 = socket$nl_route(0x10, 0x3, 0x0) r20 = socket$nl_route(0x10, 0x3, 0x0) r21 = socket$netlink(0x10, 0x3, 0x0) r22 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r22, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r22, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r21, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r23, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="000000000f000094e083cbdcd1c625fb45548acaf33e00"], 0x48}}, 0x0) sendmsg$nl_route_sched(r20, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)=@newqdisc={0x74, 0x24, 0x507, 0x0, 0x0, {0x0, r23, {0x0, 0x2}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x48}}]}, 0x74}}, 0x0) sendmsg$nl_route_sched(r19, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=@gettfilter={0x24, 0x2d, 0xf71c7633af80b1ed, 0x0, 0x0, {0x0, r23}}, 0x24}}, 0x0) r24 = bpf$PROG_LOAD(0x5, &(0x7f00000027c0)={0x13, 0xe, &(0x7f0000002640)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0xff}, @exit, @ldst={0x2, 0x2, 0x5, 0x8457a050e99a299a, 0x2, 0xfffffffffffffff8}, @map_val={0x18, 0x2, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x8}, @map_val={0x18, 0x0, 0x2, 0x0, r18, 0x0, 0x0, 0x0, 0x5}, @alu={0x7, 0x0, 0x8, 0xb, 0x8, 0xc, 0x3fc3d159947d78c6}, @ldst={0x3, 0x0, 0x0, 0x1, 0x4, 0x8000000000000033, 0x8}, @map_val={0x18, 0xb, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, @alu={0x4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffe0, 0xfffffffffffffff0}, @alu={0x7, 0x0, 0x7, 0x5, 0x698da9654a618ac6, 0x10, 0x7fffffffffffffe3}], &(0x7f00000026c0)='syzkaller\x00', 0x1f, 0x23, &(0x7f0000002700)=""/35, 0x40f00, 0x1, [], r23, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000002740)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000002780)={0x1, 0x2, 0x8, 0x445}, 0x10}, 0x70) r25 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r25, 0x80045300, 0x0) r26 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r26}) r27 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r27, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r25, @ANYBLOB="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", @ANYRES64=r26]) ptrace$getregset(0x4204, r26, 0x0, &(0x7f0000000340)={0x0}) r28 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r28, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r29}], {0x4, 0x1}, [{0x8, 0x6, r30}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) r31 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r31, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, 0x0) stat(&(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000440)={{}, {0x1, 0x2}, [{0x2, 0x1, r32}], {0x4, 0x1}, [{0x8, 0x6, r33}, {0x8, 0x6}], {0x10, 0x2}, {0x20, 0x4}}, 0x3c, 0x6) r34 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self//exe\x00', 0x3, 0x0) ioctl$FS_IOC_GETFSMAP(r34, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x400000000000226, 0x12, [], [{}, {0x801, 0x0, 0x2000000000000}], [[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [], [], [], [], [], [], []]}) r35 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r35, 0x80045300, 0x0) r36 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r36}) r37 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r37, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r35, @ANYBLOB="0a1ccea8e34a80262b913abc1d92bfd832dae67e15689fbf693203011419b8d02e6d41365af2072aeae0bf538fe954c7edae1266666e87244ad48840ae55f6eebda217952f2cd5d45d9708acca471f5fd430138f0a1635a4c181328c9ebf9a985b62cb8de86957f84d1256b736d4332b0ee2ee517a799950bfdfc0e2b37ff35447e661e0f3757f00009be013ed275303000000fc54c0cdfef9254141baebc3de2d11a21e6977763379060c2d14ce1e95267baf83244ed087a8333dbc0cc84e0d06e154c21ad4f0fd05b40c754200000000d92481f6d2891e55f43339c833854af66d8c9ff93afe1c8a253ad3352ea052e294fb47be373e3d3f934e877ae879ee57cfad0da7880acf68d78eb5805dde3c8815e26ac500c53182dd92ca9127b7e7a173f6dd11920c736f0cf10dd58ca3d6506f96a582a00e40c1f2792e344c30e04be9f44119416b74492b0ee68250a5863c29e7eccfcf5555cc027aa54d6019698c0a9ee5fbe3049134622ec4fb380480abdd4d4f23c085af6e3b2c2e4e799305a2ca553944e29527e2257f90c03607358ca8e6d77fe3caa9f7a4356616e9ad3621137366d1aa64da35661239d180530b5e93a52f08eda2457b819675bd1d8c85e1e954c75a6794b5f4010101e960bd93c8ea65649122360be98e863f816f5b95f6737d0631f9d2e7c24986dc5cb389c4f7d153c57d4c941b2fc54e360613dc38188636143f64ded2601987b3a6", @ANYRES64=r36]) ptrace$getregset(0x4204, r36, 0x302, &(0x7f0000002ac0)={0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000002840)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@empty}}, &(0x7f0000002940)=0xe8) r39 = getegid() sendmsg$netlink(r1, &(0x7f0000002a80)={&(0x7f0000000100)=@proc={0x10, 0x0, 0x25dfdbfb, 0x20000}, 0xc, &(0x7f0000002540)=[{&(0x7f00000001c0)={0x21fc, 0x24, 0x800, 0x70bd28, 0x25dfdbff, "", [@nested={0x12c, 0x6, [@typed={0xc, 0x8e, @u64=0xfffffffffffffffb}, @typed={0x8, 0x18, @fd=r2}, @generic="eb3f5c49db77c0ff7b007fac94fb72bd9f97c75363812304f47169377445d323e6c722d860fd46285b802d183f541a2768917ddc038dec9671fa8f5647fa30d84222402f516da37e9d33a556de4e0f45f85a", @generic="84e6865f9376dfc6ed7dd89733e23daa00d708b734ca87095508d5751dd9419d5b4ef169d91d1f195bdf4b4935d72439cce030c2d8aa9a892dc8c55b9542e0ea695905a32744c7baf49b8a2814d98b2eac9e0b3187586bd7aeb8ab88e880075384dd53769aeb0324a9ad71c7eb5502b77021bf76423ff32ee04e56dd73d12228d01e5e4bd3be342720a3a8301a5e42a411f800", @generic="f3a0aafee9c40f6989c28d8303541d2803ca6f6cc2fcd4a37bb570c732a24837f55b6c25e4267de889695369"]}, @generic="090d00e22eb1e511cae4f220650e402f903381de98b40f560c5fd0b5bb61231878c4be5d2f3e865a213a46e7c1a939d613083dbca87515e2fdb706085af4f61ac05ec087e988f20815d4ebc01f687265f5b8c20d2906c1ba7abdf9aa2028c46bf0992a6d27a111b5141ec598cc384e8375db1bbfbdf0a822c4c9c1ff54deba275059b792ee2a6052a06d48f15fc9abf38565fbbd33a29be396ce8ddaa2c48132918fe0b8a4ee01910cd6cf5ead845215ed51968a45a47a1e2bb87b4f241b8481b6d85ecf559606d276f1402da0d13f58dbd4537281babc28962d34a57168a03e5282e657ca158a8274865751474f1a4187b609b83b7e1abb1874b2a93c5fa3b1e2790a6e99b55b22aee4301b1436ab9005f91e2e60f431ea15cbd6bfb13e0b47257e81f3055127f051e414d5b87e6d92006ea29efc3112d9a5fd134a26ccbe2e5f634ea60f94b5712cd82fc608d6f475c7545932458820b95c78560ec513dadc9c6afd96300fcde492dabb3fd37ba9f18430ee44948f338e9218abb12f3e33dddabdd54c980013e8521537657df1115f7e2fa7c6d7e785321834f22f78bf5d21d24b537896cad67d2041cf64e35af94cb99be4e88e190bdad3a9311d4f165d703507ad76d68eda514364845b80e7f32e1b40052694b02c49b2605a993343f9842095c8effda9ce96b4c5dad2b1a2eff9aa29309e0253fd0b89c70a34a4bdea0545ab60b729036970becfe5d369b2a1e3a5115958c577292d45d6b54e7a5f0969c52c19c1d6900e902cb9ddcec08e55383bc62980dcca61917a147198d80d9b9595cbde0f60f906b6545a6ddb7cc815f623bacf738a35119dfb952c9981e4b5fe83c73687e42b9aeb9e4e99bb1c05436b101e48964a4065da43629077a1f79321b6428d1e831bea54c9d9ff6d5b681447e5177a7dc1ade211a0581e9259740cd1bd3eb7904fcaf09b0603f51298eb2453d995597c7f5885503b1aecef8ca7c5eae6e3090b8a9fcf20f99942fe569d9ad34b50c66b667eb19e1b0464d9393b0e4488d2d2f451f402ccb7fa52ba63de377ee91b53fc92988d6565419f7c9633d581888ae2d58c04e50ae15825b8b9f7d3d857dc35a55ba42295283a1f0aeeee3458bb03e1aeefcb499f1e8603561fb9b8e53e199f9b7c93b9a5bd615f4e3660cca7bb221df495674cd517d166b8e7f24e234c9e83198d7ab41e2b0704a93a207af86f2e296928e658bf822bb041cf2c75baf7a2f5967b1515afb6740e4af9284d69e992124ee77230b7be583748f50f89948f58e08a4f95f48f52dc2426391a9773aa34bd8a11771f0ee9cf1f26694eead3251771fd196f844c135c11ba2572c8c1bed72b8a8c4c3c172bf65ac06b3599491ad5289e9bbd2e6238a44b723d8a7b7491209c5e6b7a6603b4526ae2ca4b9a8d732f98aadcd7261b01a92aca7ac1ff0ac93d94eac76816ada634a582d68f7f8f1d6c7270ee98dfb8b4137674ce176709e004520b3435f665f9ad95a0f1e21d4f98c12a755f1b15fbff781f369a183dd87a07099c454a296d6a983310f0265a76d0ecc01f479373d69d22060b76d2f894cead55ad1df7eb73ee10da6e5cdc031f09c887eee051149d9538792ba0d8953ae61164cc278aa542699342ced84f61892f1212ef194803abcc2ff1105591a41e5f6e684183554c49eabfb8a1ef4e10ba2e7aa748c022141ba41668a00b1e4c6e9b5c9e5528b35a229bad172ebf69ded8df066e75caf227807abb6dfcb7ff57508ca7f3abb98512f83b3811a6da51d1618c0c9e5e0c4d8b065bd2e5c456d61c58cb2bc0e775cc722d1ef6bbc2b59e14d99f22ba13424cb851c89323322a9b7965732678fd10beb8d851f712cd1269eab359a66fb88ae6d3116a5e86cfdb0026a5216bb57b6962e8ccf652338315d29727f4ce039b34d2b08fae0a14c943c6a8e201b2c14d242d9d542fc3dabf024aab50700452b0523f8c13ad0d1bc95c9034be23ea7776ba29f13223998f99e459bdd45486ade05fe03063a3c8e1792fa5f61cab4c06a756661e1b7c32e8d803a4b4f1bde388f6bc38747750ef69f2c169467fe957e3d02f19e19746555738cc80d8441090f31a6b3e631196a9f711570cd2c76af15555e7faaae5d9b204620b4194e6a96d324341ae1564d5605e4bc071c57b954a96b0d52c5c75d67af94e1241a9426f3d28da57f918868a30b0e1357d60d2b1cbad46607f63e44823538f68c4e5943a9bc514ba3f20f17c9c694f588ede7cd3f605db33f0e98864d440501b768d9ad5ba169252907de975201cad4414dc606489b8ca034b8057c3548dea59c355c64f7323b0e603e55268a638a9d66a538b55c21087e548a486c143ae0cac7ae0cc804d60d692cf25f0ab43d029b2223138db5d22f22b894e9afbd7d9d2a08a1cc7096b6c4e3aca3dbc3d833e5eabfb38839e1291a5eda7ab62882b5ec5cec48950487045c42243b777d0c080f81162bbbf56755d1aa51081cca4d978d060b99501da7de16f9eeba67614cac259f4b060f45511aeb5998df800238d014d99d12cf3f53d9256d3ea47018b3f1a056c5faf459e0e93508db21bb433a25f704a135540d91f4177398700dea0b51f0b8ebf14723c2e467f9acc375c298d4344a029ef6a8872541128bef7455b4a99972737ce59c695a28b5ec5be9ce031e2d24c59ee7c831e9dfb17bc9d48eae787b886d329c8edc870336e9edb37497a744b12c11dad31c57b9a6db95a0fe44813890cd21f023835c9ca397a9b1b43dec7e5fb49492607dff857c4db18fda410a11d98496c1d7acab9907bd81e6c7f174341a9564ba887f1c3e3e57abb5870a3f5ba560283ac3bbfe7ffed1375db105f5a6551cf3610450355bdfbd57424958652a87657d6414ee12437d5bd0623a9fca3c5fda8a11dd7dd076aed0d0549f08d7fc2b7e050154ad90ec16fb5818d56e377e78545a3c0d69128fe8ff1c3b25d2bb3b77d1ddbc0322f752872e46dda90a4182b4c22a6bddf6e71882daf300cbc87d804b565a585b41e232a3e8533cdc05498abd9d1793e96ee70f984774b48cd9012174fac2c9f473065fe7a7aa1e56b3d76f07c6c676463b2dc2b728f8f57d4b2c9cdd9f13ef1a337a0ae8b5741bfe325982eff9a6df4bc4ec81b5bb763113b5f8c0cfad8aaaeb0bfaafca24432dc5232fbfae1ee0fbc919e7a9f93612a8713b8c01aabfce1a16a9878a82c8a007c9b1eb0a13436cf03fa9b9679ce1304211fe0880c878307126d68f58147496f70fc6f58f232921fdfacba305f02127a43a6e75b4fc1352b3f306983f51299708d744e534e87413199868f9d3105272c524dd7db88494104fa3633acce0f10bd688bd6fc1470131fb63d139e1414185b81a453fe0ddbad16fccf8e240b1526b05499bed472d5e2599bc34775f6148586bf0cdb5a050b8916184c293ffdaba02b7feb2d015d2ba5ec06bf88a79f867b59419b8b4804b091dfa492aa3176f8a9ecb8e518f66af6c85cc664f749c96d829c9c097cbcc066cef3338a5ed926e1195443421d32d865e8552dcc4dbbc1b9408d1dc3daea82ce0ab6fc8402d1e93e6e9974018803d2dcc9a91366e532e6628699e5c4aea7bd7454390739c366d0f46a2e4700e6c58456d1a90ff266bfb95d604614809d8df13c9fb09aa9664bac38217ff95be92804a50ddeb330f34c6970cdf1e0316909aa510bee6c596e8f8b457b023cb1a73c2c5780514afd8bf0a7a3833553eede7e726b46546d98624b73d11a3b047e4819fbb57ccbeedad7f912181b6fa1e219818c5326f7a374d109e5ab9612dda283c2e04aaf49ecaa7528ceee6f5389aa9ee47e7a06661e3534b11a83f355eae6b4b69527574ebe1204325f2629b5a940be1cacd09c4e10e48721874ea14f5df1a2289591e00c8922fa585e9e2d6222d45435818492889d5e324c363c5a25f85a3aca67ee366e1aaf612d4479cec66e27ca55dcc41abb4d4b0694be3ea4467d0a5ddca757e149f55501dfc187577b6aa78cf3c05d017f5ace9d6362fe8f3c99477b976edf4b5b41382405df0e62a893b21b04d40187ae484ba99c78f371498cfee20a3ee0200ee808efe75e9e499c211d3ab4c3af5f93bfb2f20d37f113f431c247d1b1058a250128c8c14d864b5ee2ecd997da31e1bcfb575dcd0bab89a8e4ef356708cd84c07e3312030e0cd7e860b57e0b0c214fa97f1f564437dfacd7df5fa6b254929abca431d448c532de74fa3de4c192433d531e4d370f4885d77e4f671531f28e293711585a7d360cd5605c384ca7341ea7f859b361f804fec9ac4d4fd6b260277198482506d1d2b1969cc084a33f7bf8ceda01c4e0d726ee6687ac861e344ca520e01f4494cf0140db414ffac71d42764a15d3542f28c0dadc9bbe87d96458a9b22f4ca88a5f1ca28bad007331fd66789648df44090e434ea7d7a91bb5eee09eab9b142e7e90ffff8c560e3ba69f7e921a2848ab6ec0dbc8cd919c07e3bf0b94596e862572ac6a97372774ce50390d50b524cf677475fa6e0545b9cc15dd3de81095edefa4c63dd89d69da4df8dfb813bbf019ecc29d48890e149908f1aa638d7399a60b10fee7bb1400c6bdde191e9ae60755067c481ae06ee3f24356e0760f0e2b2df5464a2763f4786068e8a1841886ccace3623f29cc1fb303dffa2cf2e36893a2cfdb30e773525357ec33552c678e8fce7cd72055c6078082743b3966d2478ded05f63ffe4fa40fc76aa2ca04e8f331c5a7661b1ea2903832f2235dae2382d437ceac8dc6ed3dfe7013bd5be9eb314f8d7ef4c09c76c884073b3d98ec9ce7b0f740724e88111415fe737191b2fa59f8e61ac23ccea3450a616b184ef660db0f7e4a8a2f473344373928faa31c0c14b33d2389d5abfad4d16ef066be1858abf75df46c53835d1699f7d5d0eadfc59658e0968b1dbaae222968bc5837c0d822a3f909d4203c92262f31d4bdb55ac220324c991948effaaf45c30e8e901ea9c0e7301dc8c9ce653f51d0ccdb311258cb09838bc252f5b10cd86895cff16e08d904ffbee6714b01b5806881eb074d418de8b3f913130f944b31b2fe9e87e7c72432c1a2c59d52343b01bd6635cd7ca42565da24143fc5d5cdf377dc9b95592e2005891f259c28f303ec707e99577b561bdc8899c6b08c90998a4d46c51e835a837a759350c77132128908ab7ab890ba76e874d718983cee99c19c1ca8be37d2da793d7beac37da9e4950429895bc44076af64ad724b0a23cf02bf128d534ccf3b605bc783a57836a7d544a0eecc36aea18b3b6702b0a12b34bfb4adc3b1888a61ab875f278b1c470531650f5cd7c9da006b4f67c9b0e90923c2371493c849b330a758bf4683e02722241413479be0d4ce904fa492c238d4abf91de5aa181922edb8f92752ff2b921ae626617587052af9f2f1c25c2efa5a164e88592c4f94c1db34f4c4f7fbce249412ee9117bd22cecf79393deadf7ec1182e441447acdc8bd0535a206e3ca2b94e2d5b607e1faee0facde8eb5f4e6947a606cc6bab8c3be4eabeac63caae24dee3f076809bf28511ea51f74db4a68d79b295fd44e5e18ad74764ed6b1716e7e1fe602b3ee7ada62b03a021a39608660de217872786387e4715ae7d103a3938482140167c6e763e7e1ec8df4f871f1c40bbaf108139da691e5f98ccadb58ac2b6413233263f76abe28248c6499cf52e6251669d7d5e5238a5ea7fb5da9710e32d405deb32b8afd45d666dcbe194f17db5f891147ad160f48ccb2b84bcf8161f4e6da2ceeed089deb07bce4f", @typed={0x1004, 0x73, @binary="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"}, @typed={0xc, 0x17, @u64=0x10e}, @generic="03ce1d2cb74c07392e99388011b066a14bbc4556476b58c23817701070b04b25801934d100f43c5402", @generic="797b1102ea17a74b8d9aaf12c16d14e23f6d48332f3e5b434c0437bb19f6ad6e010fe20c77936446b2ea6a5375698e912ad9b6b35eb60ea7aa186b6ba102a6070f6a14e391a725cc124238f25c8ea2f90eda6d8af755fd03b39b6bac254510654d4f35d8fb58fa86be11735a59ca234b8ea09905c514e0b671b06b6c589066e851ba", @typed={0x4}]}, 0x21fc}, {&(0x7f00000023c0)={0x68, 0x10, 0x20, 0x70bd27, 0x25dfdbfc, "", [@generic="d4633719bbe27b4712f4e0b0b333a07d6b311e15571db7811115654c0f67cd733fe7943721a277882aa69c15289ceba55ab50baf5029d3b8e08084b8d519959ec0e23481429677d949f37f972d0a1f958b4fe71262"]}, 0x68}, {&(0x7f0000002440)={0xfc, 0x22, 0x2, 0x70bd2b, 0x25dfdbfe, "", [@typed={0x8, 0x37, @ipv4=@multicast2}, @generic="59d3bff4b3222abb6ec6d83f98f67a950fae487c1708f0cef04f42e49f0f802350d525e600ec663b1cd3a2eab971d30494405db52a01f40568cb3903a083c7819442e1f62afa194d7676b78a230e18f774dc1284e52790f2c72cd320ca2656aa931c984e06a902225229cbf3516f99f6382d90282bb2a3c8a03207", @generic="2a07cdb854bcf2f3966885b7f46c2def325a53179380cb68f135f781ce5a93d30cd4edbb511a44cdd08bb6b59e2b1e657f0b5a5972f0d2ecabee6968b016bb74a2d032a6b6796213802005a7fc145db08ca4e8", @typed={0x14, 0x4c, @ipv6=@dev={0xfe, 0x80, [], 0x1c}}]}, 0xfc}], 0x3, &(0x7f0000002980)=[@rights={{0x24, 0x1, 0x1, [r3, r4, r1, r5, r6]}}, @rights={{0x2c, 0x1, 0x1, [r1, r7, 0xffffffffffffffff, r8, r9, r10, r11]}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r13, r15}}}, @rights={{0x1c, 0x1, 0x1, [r16, r24, r0]}}, @cred={{0x1c, 0x1, 0x2, {r26, r29, r33}}}, @rights={{0x14, 0x1, 0x1, [r34]}}, @cred={{0x1c, 0x1, 0x2, {r36, r38, r39}}}], 0xf0, 0x24000000}, 0x40000) r40 = socket$inet_udp(0x2, 0x2, 0x0) close(r40) r41 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r41, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r41, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r41, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r41, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r44 = fcntl$dupfd(r43, 0x0, r42) ioctl$PERF_EVENT_IOC_ENABLE(r44, 0x8912, 0x400200) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r40, 0x0, 0x10002, 0x0) [ 671.448217] net_ratelimit: 19 callbacks suppressed [ 671.448224] protocol 88fb is buggy, dev hsr_slave_0 [ 671.458362] protocol 88fb is buggy, dev hsr_slave_1 16:51:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) 16:51:39 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 16:51:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0xca00, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:39 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 671.691577] protocol 88fb is buggy, dev hsr_slave_0 [ 671.697720] protocol 88fb is buggy, dev hsr_slave_1 16:51:39 executing program 2 (fault-call:9 fault-nth:0): pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:39 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x1, 0x80) accept4$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @empty}, &(0x7f0000000200)=0x10, 0x800) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x22) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) fcntl$setlease(r1, 0x400, 0x0) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r5, 0x80045300, 0x0) r6 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0401273, &(0x7f00000001c0)={[], 0x69, 0x6, 0x0, 0x6, 0x0, r6}) r7 = socket(0x10, 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r7, 0x400442c8, &(0x7f0000000700)=ANY=[@ANYRESOCT=r5, @ANYBLOB="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", @ANYRES64=r6]) ptrace$getregset(0x4204, r6, 0x0, &(0x7f0000000340)={0x0}) move_pages(r6, 0x2, &(0x7f0000000240)=[&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil], &(0x7f0000000280)=[0x6, 0x8, 0x1], &(0x7f00000002c0)=[0x0], 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$USBDEVFS_RELEASE_PORT(r9, 0x80045519, &(0x7f00000003c0)=0x5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_COOKIE(r7, 0x1, 0x39, &(0x7f0000000300), &(0x7f0000000380)=0x8) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r1, 0x0, r3, 0x0, 0x10002, 0x0) 16:51:39 executing program 0: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 16:51:39 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0xce03, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:39 executing program 0 (fault-call:9 fault-nth:0): pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 671.842930] FAULT_INJECTION: forcing a failure. [ 671.842930] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 671.902907] CPU: 1 PID: 27186 Comm: syz-executor.2 Not tainted 4.19.80 #0 [ 671.909888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 671.919251] Call Trace: [ 671.921863] dump_stack+0x172/0x1f0 [ 671.925504] should_fail.cold+0xa/0x1b [ 671.929397] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 671.934507] __alloc_pages_nodemask+0x1ee/0x750 [ 671.939173] ? __alloc_pages_slowpath+0x2870/0x2870 [ 671.944187] ? mark_held_locks+0x100/0x100 [ 671.948436] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 671.953963] alloc_pages_current+0x107/0x210 [ 671.958366] skb_page_frag_refill+0x277/0x460 [ 671.963031] sk_page_frag_refill+0x55/0x1f0 [ 671.967343] sk_alloc_sg+0x14c/0x790 [ 671.971048] ? trace_hardirqs_on+0x67/0x220 [ 671.975383] alloc_encrypted_sg+0x8d/0x110 [ 671.979618] tls_sw_sendpage+0x63c/0xd50 [ 671.983713] ? tls_sw_sendmsg+0x1240/0x1240 [ 671.988074] ? pipe_lock+0x6e/0x80 [ 671.991635] ? tls_sw_sendmsg+0x1240/0x1240 [ 671.996129] inet_sendpage+0x168/0x630 [ 672.000382] kernel_sendpage+0x92/0xf0 [ 672.004449] ? inet_sendmsg+0x5d0/0x5d0 [ 672.008449] sock_sendpage+0x8b/0xc0 [ 672.012176] pipe_to_sendpage+0x296/0x360 [ 672.016318] ? kernel_sendpage+0xf0/0xf0 [ 672.020378] ? direct_splice_actor+0x190/0x190 [ 672.024965] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.030602] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 672.036048] __splice_from_pipe+0x391/0x7d0 [ 672.040371] ? direct_splice_actor+0x190/0x190 [ 672.045048] ? direct_splice_actor+0x190/0x190 [ 672.049623] splice_from_pipe+0x108/0x170 [ 672.053898] ? splice_shrink_spd+0xd0/0xd0 [ 672.058131] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.063656] ? security_file_permission+0x89/0x230 [ 672.068598] generic_splice_sendpage+0x3c/0x50 [ 672.073168] ? splice_from_pipe+0x170/0x170 [ 672.077477] do_splice+0x642/0x12c0 [ 672.081116] ? opipe_prep.part.0+0x2d0/0x2d0 [ 672.085532] ? __fget_light+0x1a9/0x230 [ 672.089521] __x64_sys_splice+0x2c6/0x330 [ 672.093677] do_syscall_64+0xfd/0x620 [ 672.097479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.102751] RIP: 0033:0x459a59 [ 672.105939] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 672.124833] RSP: 002b:00007fb857bdbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 672.132544] RAX: ffffffffffffffda RBX: 00007fb857bdbc90 RCX: 0000000000459a59 [ 672.139807] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 672.147065] RBP: 000000000075bf20 R08: 0000000000010002 R09: 0000000000000000 [ 672.154335] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb857bdc6d4 [ 672.161615] R13: 00000000004c954e R14: 00000000004dffb0 R15: 0000000000000006 [ 672.176531] FAULT_INJECTION: forcing a failure. [ 672.176531] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 672.190643] CPU: 1 PID: 27240 Comm: syz-executor.0 Not tainted 4.19.80 #0 [ 672.197860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.207302] Call Trace: [ 672.207329] dump_stack+0x172/0x1f0 [ 672.213566] should_fail.cold+0xa/0x1b [ 672.217476] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 672.222591] __alloc_pages_nodemask+0x1ee/0x750 [ 672.222615] ? __alloc_pages_slowpath+0x2870/0x2870 [ 672.222638] ? mark_held_locks+0x100/0x100 [ 672.222654] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 672.222672] alloc_pages_current+0x107/0x210 [ 672.222691] skb_page_frag_refill+0x277/0x460 [ 672.232457] sk_page_frag_refill+0x55/0x1f0 [ 672.232473] sk_alloc_sg+0x14c/0x790 [ 672.242221] ? trace_hardirqs_on+0x67/0x220 [ 672.242244] alloc_encrypted_sg+0x8d/0x110 [ 672.242263] tls_sw_sendpage+0x63c/0xd50 [ 672.242290] ? tls_sw_sendmsg+0x1240/0x1240 [ 672.242309] ? pipe_lock+0x6e/0x80 [ 672.251307] ? tls_sw_sendmsg+0x1240/0x1240 [ 672.251325] inet_sendpage+0x168/0x630 [ 672.251347] kernel_sendpage+0x92/0xf0 [ 672.259374] ? inet_sendmsg+0x5d0/0x5d0 [ 672.259395] sock_sendpage+0x8b/0xc0 [ 672.259415] pipe_to_sendpage+0x296/0x360 [ 672.259430] ? kernel_sendpage+0xf0/0xf0 [ 672.259447] ? direct_splice_actor+0x190/0x190 [ 672.259463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.268088] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 672.268109] __splice_from_pipe+0x391/0x7d0 [ 672.268125] ? direct_splice_actor+0x190/0x190 [ 672.268147] ? direct_splice_actor+0x190/0x190 [ 672.268161] splice_from_pipe+0x108/0x170 [ 672.268178] ? splice_shrink_spd+0xd0/0xd0 [ 672.276637] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.276656] ? security_file_permission+0x89/0x230 [ 672.284507] generic_splice_sendpage+0x3c/0x50 [ 672.284524] ? splice_from_pipe+0x170/0x170 [ 672.292298] do_splice+0x642/0x12c0 [ 672.292323] ? opipe_prep.part.0+0x2d0/0x2d0 [ 672.299981] ? __fget_light+0x1a9/0x230 [ 672.300000] __x64_sys_splice+0x2c6/0x330 [ 672.300024] do_syscall_64+0xfd/0x620 [ 672.300042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.300057] RIP: 0033:0x459a59 16:51:40 executing program 1 (fault-call:7 fault-nth:0): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 16:51:40 executing program 2 (fault-call:9 fault-nth:1): pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 672.308233] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 672.308242] RSP: 002b:00007f48cdf5cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 672.308257] RAX: ffffffffffffffda RBX: 00007f48cdf5cc90 RCX: 0000000000459a59 [ 672.308265] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 672.308273] RBP: 000000000075bf20 R08: 0000000000010002 R09: 0000000000000000 [ 672.308282] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f48cdf5d6d4 [ 672.308289] R13: 00000000004c954e R14: 00000000004dffb0 R15: 0000000000000006 [ 672.308624] protocol 88fb is buggy, dev hsr_slave_0 [ 672.318488] protocol 88fb is buggy, dev hsr_slave_1 [ 672.456525] FAULT_INJECTION: forcing a failure. [ 672.456525] name failslab, interval 1, probability 0, space 0, times 0 [ 672.470465] CPU: 1 PID: 27297 Comm: syz-executor.2 Not tainted 4.19.80 #0 [ 672.485695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.495055] Call Trace: [ 672.497741] dump_stack+0x172/0x1f0 [ 672.501391] should_fail.cold+0xa/0x1b [ 672.505284] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 672.510403] ? lock_downgrade+0x880/0x880 [ 672.514572] __should_failslab+0x121/0x190 [ 672.518819] should_failslab+0x9/0x14 [ 672.522637] kmem_cache_alloc_node_trace+0x274/0x720 [ 672.527741] ? __alloc_skb+0xd5/0x5f0 [ 672.531536] __kmalloc_node_track_caller+0x3d/0x80 [ 672.536452] __kmalloc_reserve.isra.0+0x40/0xf0 [ 672.541112] __alloc_skb+0x10b/0x5f0 [ 672.544810] ? skb_scrub_packet+0x490/0x490 [ 672.549226] ? __schedule+0x86e/0x1dc0 [ 672.553101] sk_stream_alloc_skb+0xc8/0x860 [ 672.557427] do_tcp_sendpages+0x8f5/0x1a10 [ 672.561672] ? find_held_lock+0x35/0x130 [ 672.565746] ? mark_held_locks+0xb1/0x100 [ 672.568113] protocol 88fb is buggy, dev hsr_slave_0 [ 672.569897] ? sk_stream_alloc_skb+0x860/0x860 [ 672.574940] protocol 88fb is buggy, dev hsr_slave_1 [ 672.579455] ? __local_bh_enable_ip+0x15a/0x270 [ 672.579476] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 672.579493] tcp_sendpage_locked+0x84/0xd0 [ 672.579511] tcp_sendpage+0x3f/0x60 [ 672.601978] ? tcp_sendpage_locked+0xd0/0xd0 [ 672.606381] inet_sendpage+0x168/0x630 [ 672.610260] kernel_sendpage+0x92/0xf0 [ 672.614142] ? inet_sendmsg+0x5d0/0x5d0 [ 672.618118] sock_sendpage+0x8b/0xc0 [ 672.621838] pipe_to_sendpage+0x296/0x360 [ 672.625979] ? kernel_sendpage+0xf0/0xf0 [ 672.630032] ? direct_splice_actor+0x190/0x190 [ 672.634603] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.640129] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 672.645489] __splice_from_pipe+0x391/0x7d0 [ 672.649806] ? direct_splice_actor+0x190/0x190 [ 672.654386] ? direct_splice_actor+0x190/0x190 [ 672.658964] splice_from_pipe+0x108/0x170 [ 672.663095] ? splice_shrink_spd+0xd0/0xd0 [ 672.667353] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.672875] ? security_file_permission+0x89/0x230 [ 672.677790] generic_splice_sendpage+0x3c/0x50 [ 672.682354] ? splice_from_pipe+0x170/0x170 [ 672.686657] do_splice+0x642/0x12c0 [ 672.690273] ? opipe_prep.part.0+0x2d0/0x2d0 [ 672.694666] ? __fget_light+0x1a9/0x230 [ 672.698627] __x64_sys_splice+0x2c6/0x330 [ 672.702762] do_syscall_64+0xfd/0x620 [ 672.706582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 672.711751] RIP: 0033:0x459a59 [ 672.714926] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 672.733847] RSP: 002b:00007fb857bbac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 672.741538] RAX: ffffffffffffffda RBX: 00007fb857bbac90 RCX: 0000000000459a59 [ 672.748789] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 16:51:40 executing program 0 (fault-call:9 fault-nth:1): pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x10002, 0x0) 16:51:40 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 672.756065] RBP: 000000000075bfc8 R08: 0000000000010002 R09: 0000000000000000 [ 672.763316] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb857bbb6d4 [ 672.770567] R13: 00000000004c954e R14: 00000000004dffb0 R15: 0000000000000006 [ 672.778228] protocol 88fb is buggy, dev hsr_slave_0 [ 672.783331] protocol 88fb is buggy, dev hsr_slave_1 [ 672.861115] FAULT_INJECTION: forcing a failure. [ 672.861115] name failslab, interval 1, probability 0, space 0, times 0 [ 672.888153] CPU: 1 PID: 27401 Comm: syz-executor.0 Not tainted 4.19.80 #0 [ 672.895131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.904494] Call Trace: [ 672.907103] dump_stack+0x172/0x1f0 [ 672.910754] should_fail.cold+0xa/0x1b [ 672.914662] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 672.919777] ? lock_downgrade+0x880/0x880 [ 672.923926] __should_failslab+0x121/0x190 [ 672.928147] should_failslab+0x9/0x14 [ 672.931933] __kmalloc+0x2e2/0x750 [ 672.935462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.940993] ? __sk_mem_schedule+0xac/0xe0 [ 672.945227] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 672.950839] ? tls_push_record+0x107/0x13a0 [ 672.955148] tls_push_record+0x107/0x13a0 [ 672.959302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 672.964848] ? alloc_encrypted_sg+0xa8/0x110 [ 672.969242] tls_sw_sendpage+0x538/0xd50 [ 672.973295] ? tls_sw_sendmsg+0x1240/0x1240 [ 672.977601] ? pipe_lock+0x6e/0x80 [ 672.981133] ? tls_sw_sendmsg+0x1240/0x1240 [ 672.985453] inet_sendpage+0x168/0x630 [ 672.989329] kernel_sendpage+0x92/0xf0 [ 672.993200] ? inet_sendmsg+0x5d0/0x5d0 [ 672.997175] sock_sendpage+0x8b/0xc0 [ 673.000891] pipe_to_sendpage+0x296/0x360 [ 673.005037] ? kernel_sendpage+0xf0/0xf0 [ 673.009093] ? direct_splice_actor+0x190/0x190 [ 673.013663] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 673.019193] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 673.024557] __splice_from_pipe+0x391/0x7d0 [ 673.028863] ? direct_splice_actor+0x190/0x190 [ 673.033434] ? direct_splice_actor+0x190/0x190 [ 673.038003] splice_from_pipe+0x108/0x170 [ 673.042165] ? splice_shrink_spd+0xd0/0xd0 [ 673.046402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 673.051926] ? security_file_permission+0x89/0x230 [ 673.056843] generic_splice_sendpage+0x3c/0x50 [ 673.061420] ? splice_from_pipe+0x170/0x170 [ 673.065745] do_splice+0x642/0x12c0 [ 673.069371] ? opipe_prep.part.0+0x2d0/0x2d0 [ 673.073780] ? __fget_light+0x1a9/0x230 [ 673.077766] __x64_sys_splice+0x2c6/0x330 [ 673.081929] do_syscall_64+0xfd/0x620 [ 673.085727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 673.090910] RIP: 0033:0x459a59 16:51:41 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b80)=@newlink={0x3c, 0x10, 0x401, 0xd000, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MCAST_HASH_MAX={0x8}]}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 16:51:41 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) close(r2) lsetxattr$security_ima(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@sha1={0x1, "c76410a3218bd0e115a16b7bdf9e6f0d968a5959"}, 0x15, 0x0) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 673.094095] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 673.112986] RSP: 002b:00007f48cdf5cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 673.120694] RAX: ffffffffffffffda RBX: 00007f48cdf5cc90 RCX: 0000000000459a59 [ 673.127963] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 673.135227] RBP: 000000000075bf20 R08: 0000000000010002 R09: 0000000000000000 [ 673.142492] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f48cdf5d6d4 [ 673.149757] R13: 00000000004c954e R14: 00000000004dffb0 R15: 0000000000000006 [ 673.188375] kasan: CONFIG_KASAN_INLINE enabled [ 673.193394] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 673.200826] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 673.205155] kobject: 'bridge4' (0000000020e7e7f9): kobject_add_internal: parent: 'net', set: 'devices' [ 673.207057] CPU: 0 PID: 27401 Comm: syz-executor.0 Not tainted 4.19.80 #0 [ 673.207065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 673.207082] RIP: 0010:gcmaes_crypt_by_sg.constprop.0+0xde2/0x1850 [ 673.207099] Code: 82 f3 f9 ff ff e8 4e 5a 35 00 4c 89 f7 e8 56 fa ea 01 48 8d 78 08 49 89 c6 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e a5 09 00 00 41 8b 46 08 89 84 [ 673.230677] kobject: 'bridge4' (0000000020e7e7f9): kobject_uevent_env [ 673.232780] RSP: 0000:ffff88804e1e7230 EFLAGS: 00010202 [ 673.232794] RAX: dffffc0000000000 RBX: 0000000000000035 RCX: ffffc90012acd000 [ 673.232802] RDX: 0000000000000001 RSI: ffffffff832067db RDI: 0000000000000008 [ 673.232814] RBP: ffff88804e1e7570 R08: ffff8880968ca040 R09: 000000000000000d [ 673.291606] R10: ffff888053e75020 R11: 0000000000000010 R12: 0000000000000000 [ 673.298862] R13: 0000000000000035 R14: 0000000000000000 R15: 0000000000000008 [ 673.306119] FS: 00007f48cdf5d700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 673.314338] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 673.320202] CR2: 00007f26d7e08000 CR3: 0000000084138000 CR4: 00000000001406f0 [ 673.327465] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 673.334729] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 673.341977] Call Trace: [ 673.344568] ? aesni_gcm_enc_avx2+0x170/0x170 [ 673.349060] ? is_bpf_text_address+0xac/0x170 [ 673.353553] ? find_held_lock+0x35/0x130 [ 673.357597] ? is_bpf_text_address+0xac/0x170 [ 673.362088] ? unwind_get_return_address+0x61/0xa0 [ 673.367005] ? __save_stack_trace+0x99/0x100 [ 673.371402] gcmaes_encrypt.constprop.0+0x62a/0xd90 [ 673.376409] ? save_stack+0x45/0xd0 [ 673.380020] ? kasan_kmalloc+0xce/0xf0 [ 673.383890] ? __kmalloc+0x15d/0x750 [ 673.387588] ? tls_push_record+0x107/0x13a0 [ 673.391892] ? tls_sw_sendpage+0x538/0xd50 [ 673.396111] ? inet_sendpage+0x168/0x630 [ 673.400166] ? kernel_sendpage+0x92/0xf0 [ 673.404212] ? gcmaes_crypt_by_sg.constprop.0+0x1850/0x1850 [ 673.409906] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 673.415252] ? mark_held_locks+0x100/0x100 [ 673.419479] ? schedule_timeout+0x52c/0xfc0 [ 673.423797] ? remove_wait_queue+0x10f/0x190 [ 673.428189] ? find_held_lock+0x35/0x130 [ 673.432233] ? fs_reclaim_acquire+0x20/0x20 [ 673.436539] ? __lock_is_held+0xb6/0x140 [ 673.440583] ? should_fail+0x14d/0x85c [ 673.444457] generic_gcmaes_encrypt+0x108/0x160 [ 673.449118] ? generic_gcmaes_encrypt+0x108/0x160 [ 673.453950] ? helper_rfc4106_encrypt+0x390/0x390 [ 673.458780] ? __kmalloc+0x5e1/0x750 [ 673.462477] ? sk_stream_wait_memory+0xadc/0xe50 [ 673.467217] gcmaes_wrapper_encrypt+0x15f/0x200 [ 673.471870] tls_push_record+0x9c0/0x13a0 [ 673.476007] tls_sw_sendpage+0x538/0xd50 [ 673.480062] ? tls_sw_sendmsg+0x1240/0x1240 [ 673.484367] ? pipe_lock+0x6e/0x80 [ 673.487891] ? tls_sw_sendmsg+0x1240/0x1240 [ 673.492197] inet_sendpage+0x168/0x630 [ 673.496077] kernel_sendpage+0x92/0xf0 [ 673.499947] ? inet_sendmsg+0x5d0/0x5d0 [ 673.503909] sock_sendpage+0x8b/0xc0 [ 673.507617] pipe_to_sendpage+0x296/0x360 [ 673.511760] ? kernel_sendpage+0xf0/0xf0 [ 673.515807] ? direct_splice_actor+0x190/0x190 [ 673.520382] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 673.525904] ? splice_from_pipe_next.part.0+0x255/0x2f0 [ 673.531253] __splice_from_pipe+0x391/0x7d0 [ 673.535560] ? direct_splice_actor+0x190/0x190 [ 673.540130] ? direct_splice_actor+0x190/0x190 [ 673.544697] splice_from_pipe+0x108/0x170 [ 673.548836] ? splice_shrink_spd+0xd0/0xd0 [ 673.553056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 673.558580] ? security_file_permission+0x89/0x230 [ 673.563498] generic_splice_sendpage+0x3c/0x50 [ 673.568062] ? splice_from_pipe+0x170/0x170 [ 673.572367] do_splice+0x642/0x12c0 [ 673.575985] ? opipe_prep.part.0+0x2d0/0x2d0 [ 673.580382] ? __fget_light+0x1a9/0x230 [ 673.584341] __x64_sys_splice+0x2c6/0x330 [ 673.588478] do_syscall_64+0xfd/0x620 [ 673.592268] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 673.597439] RIP: 0033:0x459a59 [ 673.600616] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 673.619497] RSP: 002b:00007f48cdf5cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 673.627187] RAX: ffffffffffffffda RBX: 00007f48cdf5cc90 RCX: 0000000000459a59 [ 673.634438] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000003 [ 673.641690] RBP: 000000000075bf20 R08: 0000000000010002 R09: 0000000000000000 [ 673.648942] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f48cdf5d6d4 [ 673.656195] R13: 00000000004c954e R14: 00000000004dffb0 R15: 0000000000000006 [ 673.663450] Modules linked in: [ 673.666681] ---[ end trace d8e38d52a5618a57 ]--- [ 673.671473] RIP: 0010:gcmaes_crypt_by_sg.constprop.0+0xde2/0x1850 [ 673.677709] Code: 82 f3 f9 ff ff e8 4e 5a 35 00 4c 89 f7 e8 56 fa ea 01 48 8d 78 08 49 89 c6 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e a5 09 00 00 41 8b 46 08 89 84 [ 673.696776] RSP: 0000:ffff88804e1e7230 EFLAGS: 00010202 [ 673.699483] kobject: 'bridge4' (0000000020e7e7f9): fill_kobj_path: path = '/devices/virtual/net/bridge4' [ 673.702170] RAX: dffffc0000000000 RBX: 0000000000000035 RCX: ffffc90012acd000 [ 673.719070] RDX: 0000000000000001 RSI: ffffffff832067db RDI: 0000000000000008 [ 673.726343] RBP: ffff88804e1e7570 R08: ffff8880968ca040 R09: 000000000000000d [ 673.733654] R10: ffff888053e75020 R11: 0000000000000010 R12: 0000000000000000 16:51:41 executing program 2 (fault-call:9 fault-nth:2): pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:41 executing program 4: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000080)=ANY=[@ANYPTR64], 0xffffffb8) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) 16:51:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x4, {0x3ff}}, 0x18) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000000)=@gcm_128={{0x303}, "62419e74e3a25237", "36cddb6229f832000000ba2cf89b09b8", "931ce236", "b6446d4e73f30b85"}, 0x28) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) [ 673.740981] R13: 0000000000000035 R14: 0000000000000000 R15: 0000000000000008 [ 673.744905] kobject: 'loop2' (000000002d1831f7): kobject_uevent_env [ 673.748299] FS: 00007f48cdf5d700(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 673.748308] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 673.748315] CR2: 00007f26d7e08000 CR3: 0000000084138000 CR4: 00000000001406f0 [ 673.748326] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 673.748337] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 673.756656] kobject: 'loop2' (000000002d1831f7): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 673.762973] Kernel panic - not syncing: Fatal exception [ 673.778180] kobject: 'queues' (00000000a9302973): kobject_add_internal: parent: 'bridge4', set: '' [ 673.784790] Kernel Offset: disabled [ 673.819983] Rebooting in 86400 seconds..