0x0, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r3, 0xc0502100, &(0x7f0000000240)={0x0, 0x0}) ptrace$setsig(0x4203, r4, 0x3, &(0x7f00000002c0)={0x9, 0x8, 0xfffffc01}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000140), 0x4) sendmmsg$alg(r3, &(0x7f0000001540)=[{0x0, 0x0, &(0x7f0000000ac0), 0x0, &(0x7f0000000b80)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x99e51c2}, @assoc={0x18, 0x117, 0x4, 0x94}, @assoc={0x18, 0x117, 0x4, 0x5}, @iv={0x28, 0x117, 0x2, 0x10, "834ecdb27a2548f82420c1c35940dbdc"}, @iv={0xf0, 0x117, 0x2, 0xd8, "3444a22a0a0a27bb02687373c6b8807adc3d063beccc644436aa852e7683c6f8ddcfde505036c849ee3ba258f2965aca9e30708d59c50114db39755ddad56b1965b420c1d32d05e5d144b7bf80d4549cc2620520f1fbabcf9e93d933b2e245e21e3a7879b886b1620ae190630a64617f6489bd218176f8da3f6db88686e76ed278ad02b18be4eaa1d68c87241bc7ea104ca7d68ac46be5d57bebeea4c762e79641b7c21f184e5d868f3799e581156648c51e178880a8e41edd30e6d8b67e86caf16cff695913aede9002acec690e9b302db4d10da201cdf4"}, @op={0x18}, @iv={0x100, 0x117, 0x2, 0xe7, "5625a47dd083d47ae9bc1270d688c68ed083c481d9f0a74ccbdd5c0a5054c52b11b17210137250074212d9ca79b4ae6f2ff0326839f7bf2cf4c2ee49fb3097170d8976cacaf5eb34e4267c851a051af32cc8452ea56469a976ad9fac7389584d7dbf94b322ecf7c2aa04a5d1d1c87fd2caf6b4d254fc2b6b399229af351c49944e8d23b9c60557dbb82f018f5cd37d400e57ee4fc0d7df9c402e4e3c826e0ceb2629e903946f4561da5bc53269ba0b4d90b5c026ac615ecc16209c7e9a9909e72a5e17f009b4a9a91e1c297c0587e1430baf92ea4b7986c821f02e6ddbca337d99c9cdb6e99f47"}], 0x290, 0x841}, {0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000e40)="e45b5f4cdd09287abc2ca6b0b612073cb479dae15f75dd77fcfb41a8212e89be099963c7aefa73e212fcc586", 0x1f}], 0x1, &(0x7f0000000ec0)=[@iv={0x48, 0x117, 0x2, 0x32, "ea2445ac24526f6a2e386d9d376621c09d8d6e2bcc45d580c4c917e7a265abe689173084e404f23e63ef3f46086065cd1459"}], 0x48, 0x4008}, {0x0, 0x0, &(0x7f0000001140)=[{&(0x7f0000000f40)="d273c6b8b8d4e4af500286e026bdaafcc374f501bffa10ff94dfad58e12fb0f8869b8a79ef1e0a3c0160e6a5845554b04c1f5ea7241809c61b3f9821", 0x3c}, {&(0x7f0000000f80)="0d3c5cb382ae05a94b7ed737369b9e8220c06d5188ed2c9133a384d5a070d3365b6bec4b4f139bd8533d8352ce0bc2e7a61bbc8568189cad83685884fa92cf5b2fbd3bbb4a44aec3dfb5c1c2d0", 0x4d}, {&(0x7f0000001000)="bb1c6b3dfa9a1b90e700383631b7903d310235d6a2740e4f381895547d74eed2f6319d0178c33bfd8c33db8da244ef07cfb87a502ea25801ef", 0x39}, {&(0x7f0000001040)="77d8a6427c9eea8d9fbfd330006dda25d6acd3974f746f9b112c9a3a476286b8b05bedab933cafbbae5568d96c282002af1c9026f49d971e53769765ab07f57a3d0e77c06c4e83e5d7cb2b24ebf162dc505ada6c1a2cb3a75d3ab7b93cf356", 0x5f}, {&(0x7f00000010c0)="11c7c7060f115443e4093f2028dd6bc08a7047dd15658c4d8981b33cc9df44946eef9a8bfcf067a49afc6bf5837c0808631d55ebb72223dcea58fd6d35ad84d68c1ccbaaf810051518f3b30b6d85e12adf3f28b5", 0x54}], 0x5, &(0x7f00000011c0)=[@op={0x18, 0x117, 0x3, 0x1}, @iv={0x28, 0x117, 0x2, 0x10, "87f53a174b874bd12b63a6fc7a5dfe20"}, @assoc={0x18, 0x117, 0x4, 0x2}, @iv={0x78, 0x117, 0x2, 0x61, "4dc7ab29b8f95634bed183fccf1501e130ebc43dc2c5ad230afb7e0f22846881480617429f0a2b772130de1b15ab070da0be8ed147e11283c9ca03912ef69c5278c48be8c6e0f71999bfec106786759c25992551641b144a4e8b6e262a8abc4b92"}, @iv={0xa0, 0x117, 0x2, 0x88, "942b32c8509ab499a9ab90932f0a293b9552245e0014b77c9a09a89bdf74a210387e060b3e705cfff851de3794f65935236c2e5f6ee5cc265884a1afb20c4aacc59ad16e87023fd5abc10d51b4a93b894a4c6e7b64a3c6b260e1cae0b8e21dede9ecdc1a8e8fb48685a3663472ff232054f514f21309377f8f8c47131aceed33b6978a5cb78d58ca"}, @op={0x18, 0x117, 0x3, 0x1}], 0x188, 0x20000}, {0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000001380)="0cf59d59198f382f1ee1d3c0458802ac0511a6b16063847df57da902ca936ba3ead1864a498872c02a1e311e9ccad93ee0bf23cc8db5db", 0x37}, {&(0x7f00000013c0)="ed487d7018d7321644083bda1fb8481a48b4815a41c2312b72f5edd2db21de754c970eadbe0698247615e8d422dd97f6a2ec937b75f5e2050c7935e93777c1d791402841f71548961e33efdd5a3b032d4a35ade74fcb0f7943ac0b0edc579b05bebb9a5d089235019ae5e95f32a14b8d300f8b76f21af51cbf0328a4b057cc904cab95790042f945f32880d45f753caf4accbf7d33cc8c95713ef399d729dd43aa11e2a17c4e8bb27889b5e32c5f751df15ed394a7c76da2ad9f68586fe6f26069a04cfb4864991494710d", 0xcb}], 0x2, &(0x7f0000001640)=[@iv={0x48, 0x117, 0x2, 0x2d, "a9d393585d7b5b733904bc84c0c6f29b9da62194c6e4e2ab41a900da6552e28295bba0220342a8ae38557cb669"}, @iv={0x28, 0x117, 0x2, 0x12, "22c317c13603e7359c548f5896d2a4cd56fe"}], 0x70, 0x3c21c356dec2fa70}], 0x4, 0x0) 11:23:24 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0), 0x0, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:24 executing program 2: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe2(&(0x7f0000000040), 0x141000) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_all\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x8, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x400}, [@map={0x18, 0x7, 0x1, 0x0, r3}, @map_val={0x18, 0x6, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x7db}, @exit]}, &(0x7f00000001c0)='GPL\x00', 0x2, 0xd0, &(0x7f00000000c0)=""/208, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) close(r4) 11:23:24 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x74204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, @perf_bp={&(0x7f0000000180), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x10000000016, &(0x7f0000000200)) ptrace(0x10, r2) ptrace$poke(0x4, r2, &(0x7f0000000000), 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x10000000016, &(0x7f0000000200)) ptrace(0x10, r3) ptrace$poke(0x4, r3, &(0x7f0000000000), 0x0) r4 = syz_open_procfs(r3, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r5 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$sock_linger(r8, 0x1, 0xd, &(0x7f0000000040)={0x1, 0xb495}, 0x8) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r6) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) sendfile(r4, r5, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 11:23:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x17, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:23:24 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x2, 0x4, 0x6}, 0x3c) socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x3c4, 0x400200007fe, &(0x7f00000000c0)={0x2, 0x10084e23, @local}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x3c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) recvmmsg(r0, &(0x7f000000ca80)=[{{0x0, 0x0, 0x0}}], 0xa, 0xacc45, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000100)={'tunl0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}) [ 775.560322][T29332] device hsr_slave_1 left promiscuous mode [ 775.693220][T29332] team0 (unregistering): Port device team_slave_1 removed [ 775.731200][T29332] team0 (unregistering): Port device team_slave_0 removed 11:23:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x3b, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) [ 775.765244][T29332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 775.848634][T29332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 11:23:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) [ 776.003554][T29332] bond0 (unregistering): Released all slaves 11:23:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000180)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='vcan0\x00', 0x10) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$VIDIOC_S_CROP(r1, 0x4014563c, &(0x7f0000000080)={0x7, {0x9, 0x4, 0x4de, 0x3}}) 11:23:25 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x74204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x8000, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r3 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$SIOCX25SSUBSCRIP(r3, 0x89e1, &(0x7f0000000180)={'bond_slave_1\x00', 0xa1, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendfile(r2, r3, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 11:23:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c", 0x50, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:25 executing program 2: dup(0xffffffffffffffff) accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) bind$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x3, 0x80000) dup(0xffffffffffffffff) bind$inet(r0, &(0x7f0000000240)={0x2, 0x4e26, @empty}, 0x2ea) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x4000010000000013, &(0x7f0000000040)=0x1, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e23}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @loopback}, 0x10) r1 = socket$inet(0x2, 0x80001, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x400000004e21, @multicast2}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e23, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @loopback}, 0x10) 11:23:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x2}, 0x10) 11:23:25 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000004fc0)=[{{0x0, 0x0, &(0x7f0000000200)=[{0x0}, {&(0x7f0000000180)=""/59, 0x3b}], 0x2}}], 0x1, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020dfff91000000000000000000002200800120080001100000000000000000700000000000000000000d10080000000e008000100000000000000000000000000000000000020000000000003000600005dac5a7e00210002000080ac14ffbff0000000b70000000300050000000f311705423b1d9d6b91c520050000000000"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x33b3857, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000100)=""/7) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x891b, &(0x7f0000000140)={'syzkaller0\x00', {0x2, 0x4e21, @multicast1}}) 11:23:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c", 0x50, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:25 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x3}, 0x10) 11:23:26 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x74204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x1, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f00000002c0), 0x8}, 0x8}, 0x0, 0xe, r0, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r3 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="31050000000000000000090000a6d5a21710ceab180079616d300000000000000000000000000800010000000080000000000000000008000500e000000200eec7e4de8cf29177"], 0x44}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$UI_SET_LEDBIT(r10, 0x40045569, 0x0) sendmsg$IPVS_CMD_ZERO(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x58, r8, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x144e}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x804}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1f}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8000}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xd3ec}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x20048091) sendfile(r2, r3, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) [ 777.033351][T29947] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.4'. [ 778.991073][T29958] IPVS: ftp: loaded support on port[0] = 21 [ 779.043314][T29958] chnl_net:caif_netlink_parms(): no params data found [ 779.069832][T29958] bridge0: port 1(bridge_slave_0) entered blocking state [ 779.077110][T29958] bridge0: port 1(bridge_slave_0) entered disabled state [ 779.084731][T29958] device bridge_slave_0 entered promiscuous mode [ 779.092364][T29958] bridge0: port 2(bridge_slave_1) entered blocking state [ 779.099464][T29958] bridge0: port 2(bridge_slave_1) entered disabled state [ 779.107349][T29958] device bridge_slave_1 entered promiscuous mode [ 779.124646][T29958] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 779.135365][T29958] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 779.154307][T29958] team0: Port device team_slave_0 added [ 779.161352][T29958] team0: Port device team_slave_1 added [ 779.232908][T29958] device hsr_slave_0 entered promiscuous mode [ 779.291013][T29958] device hsr_slave_1 entered promiscuous mode [ 779.330374][T29958] debugfs: Directory 'hsr0' with parent '/' already present! [ 779.344022][T29958] bridge0: port 2(bridge_slave_1) entered blocking state [ 779.351176][T29958] bridge0: port 2(bridge_slave_1) entered forwarding state [ 779.358465][T29958] bridge0: port 1(bridge_slave_0) entered blocking state [ 779.365530][T29958] bridge0: port 1(bridge_slave_0) entered forwarding state [ 779.397220][T29958] 8021q: adding VLAN 0 to HW filter on device bond0 [ 779.408566][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 779.417200][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 779.425653][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 779.434695][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 779.446533][T29958] 8021q: adding VLAN 0 to HW filter on device team0 [ 779.457813][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 779.466361][T14128] bridge0: port 1(bridge_slave_0) entered blocking state [ 779.473468][T14128] bridge0: port 1(bridge_slave_0) entered forwarding state [ 779.484274][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 779.492960][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 779.499977][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 779.517784][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 779.526919][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 779.541718][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 779.550960][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 779.562368][T29958] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 779.574032][T29958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 779.582011][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 779.599383][T29958] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 779.607503][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 779.615399][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 11:23:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x4}, 0x10) 11:23:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x2}, 0x10) 11:23:28 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c", 0x50, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:28 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0xffffffffffffff97, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x1}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80000001}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_procfs(r3, &(0x7f0000000180)='net/xfrm_stat\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r6 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x8) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setfsuid(r8) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}], [], 0xf60300000000002c}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r5) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r11, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) r12 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r12, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r12, 0x84, 0x19, &(0x7f0000000000)={0x0, 0x5}, 0x8) sendfile(r2, r4, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) 11:23:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0xfffffffffffffeb9, 0x63, 0x9, 0x2, 0x1f, 0x0, 0x8000000ff, 0x2000, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000000), 0x95d7bcce5657009d}, 0xf40ffc0f0ea60b83, 0x800000000928, 0xa2, 0x0, 0x4, 0x7, 0x1f}, 0xffffffffffffffff, 0x4, r3, 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x408, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x1}, 0x0, 0x6, 0x0, 0x8}, 0x0, 0x10, r4, 0x0) r5 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000200)={'\x86yz'}, 0x0, 0x0, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, r5) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x1001, r6) syz_open_procfs(0x0, &(0x7f0000000400)='net/tcp\x00\xcdWq\xe9*\a4g\a^\x90\xb6\xe4kH2\x80/\x88\xb6\xbb\xeb`\xb8@#\x83tH\xae\xa4y\x1d\\]\x93\x93\xb5e\xd9\xd4\xb8A# \xc8*s\xd0g>\x16\xabM\x7foK\xec\x17f\xb9x\x11\xbf\xab\x16\xc5\xcb\x94\xff\x1c\xa0\x01\xb3I\x1c\xb9\xcc\xbb\xbe\x9c\xd0!\x13\xe1\xbc.\xfaG3\x85\xe0,') ioctl$KVM_NMI(0xffffffffffffffff, 0xae9a) pipe(0x0) 11:23:28 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @host}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) r2 = dup(r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x8000, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x7fffffff, @loopback, 0x9}, 0xffffffffffffff16) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0xffffffffffffff7c) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x0) r3 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000140)) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r4, 0x80003) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x40000) sendfile(r1, r4, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) recvmmsg(r6, &(0x7f0000001980)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000000300)=""/175, 0xaf}, 0x2}], 0x2, 0x2000, 0x0) timerfd_gettime(r4, &(0x7f0000000100)) 11:23:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x5}, 0x10) 11:23:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x2}, 0x10) [ 779.937410][T29980] overlayfs: failed to create directory ./file1/work (errno: 13); mounting read-only 11:23:29 executing program 2: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, 0x0, 0x80000) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x100, 0x2) sendto$inet(0xffffffffffffffff, &(0x7f0000000380)="08958fa10b18a2421366cee1bf9b7a4055fa3fd18a411a7ea62a371525aa36535b1c447725d68f51a2d0d8381c8453bc54927135f4da15770c572051954e87db8d99fff6656f30a5bc64253e030d72894a7e7410329eb2e69ca3000f2e31a59254d5fa41ffc1b96bcf5b678d15f251b1e383b6699f000c", 0x77, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) sched_setattr(0x0, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x2) r5 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x1000000010, 0x400000400080803, 0x0) r6 = dup(0xffffffffffffffff) write$cgroup_int(r6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000001880)={{{@in=@remote, @in=@empty}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000001700)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000300)) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000002c0)={@remote}) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f00000014c0)=""/205, &(0x7f0000000100)=0xfffffffffffffc87) r7 = socket(0x1000000010, 0x400000400080803, 0x0) dup(0xffffffffffffffff) write(r7, &(0x7f0000000240)="240000001a0025f07e9451f68f2e9c920a0b49ffed000019806028000800100001000000", 0x24) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000000180)={@mcast2, @mcast1, @loopback, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffb8fa}) setsockopt$inet6_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000480)='\x01S\xb8\x00\x00', 0x152) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r10, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) getsockopt$inet6_IPV6_XFRM_POLICY(r10, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@remote, @in=@empty}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000004c0)=0x197) syslog(0x0, &(0x7f0000000300)=""/120, 0x78) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 11:23:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe22", 0x78, 0x7ff}], 0x2002000, &(0x7f00000003c0)) [ 780.026140][T29980] overlayfs: conflicting lowerdir path [ 780.231261][T29987] overlayfs: conflicting lowerdir path 11:23:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x6}, 0x10) 11:23:29 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe22", 0x78, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x2}, 0x10) 11:23:29 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x74204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r3 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r5 = dup2(r4, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendfile(r2, r3, 0x0, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$UFFDIO_WAKE(r7, 0x8010aa02, &(0x7f00000000c0)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80101, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r8, &(0x7f0000000040)={0x1, 0x6}, 0x2) 11:23:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x7}, 0x10) 11:23:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff, @host}, 0x10) r1 = socket$inet6(0xa, 0x400000000001, 0x0) dup(r1) r2 = dup(r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x8000, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x7fffffff, @loopback, 0x9}, 0xffffffffffffff16) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0xffffffffffffff7c) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x0) r3 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f0000000140)) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, 0x0, 0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fe, 0x4) ftruncate(r4, 0x80003) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x40000) sendfile(r1, r4, 0x0, 0x8000fffffffe) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) recvmmsg(r6, &(0x7f0000001980)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000001200)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f00000017c0), 0x0, &(0x7f0000000300)=""/175, 0xaf}, 0x2}], 0x2, 0x2000, 0x0) timerfd_gettime(r4, &(0x7f0000000100)) 11:23:29 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x2}, 0x10) 11:23:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe22", 0x78, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x8}, 0x10) 11:23:30 executing program 2: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, 0x0, 0x80000) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x100, 0x2) sendto$inet(0xffffffffffffffff, &(0x7f0000000380)="08958fa10b18a2421366cee1bf9b7a4055fa3fd18a411a7ea62a371525aa36535b1c447725d68f51a2d0d8381c8453bc54927135f4da15770c572051954e87db8d99fff6656f30a5bc64253e030d72894a7e7410329eb2e69ca3000f2e31a59254d5fa41ffc1b96bcf5b678d15f251b1e383b6699f000c", 0x77, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) sched_setattr(0x0, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x2) r5 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x1000000010, 0x400000400080803, 0x0) r6 = dup(0xffffffffffffffff) write$cgroup_int(r6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000001880)={{{@in=@remote, @in=@empty}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000001700)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000300)) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000002c0)={@remote}) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f00000014c0)=""/205, &(0x7f0000000100)=0xfffffffffffffc87) r7 = socket(0x1000000010, 0x400000400080803, 0x0) dup(0xffffffffffffffff) write(r7, &(0x7f0000000240)="240000001a0025f07e9451f68f2e9c920a0b49ffed000019806028000800100001000000", 0x24) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000000180)={@mcast2, @mcast1, @loopback, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffb8fa}) setsockopt$inet6_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000480)='\x01S\xb8\x00\x00', 0x152) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r10, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) getsockopt$inet6_IPV6_XFRM_POLICY(r10, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@remote, @in=@empty}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000004c0)=0x197) syslog(0x0, &(0x7f0000000300)=""/120, 0x78) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 11:23:30 executing program 5: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 11:23:30 executing program 3: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, 0x0, 0x80000) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x100, 0x2) sendto$inet(0xffffffffffffffff, &(0x7f0000000380)="08958fa10b18a2421366cee1bf9b7a4055fa3fd18a411a7ea62a371525aa36535b1c447725d68f51a2d0d8381c8453bc54927135f4da15770c572051954e87db8d99fff6656f30a5bc64253e030d72894a7e7410329eb2e69ca3000f2e31a59254d5fa41ffc1b96bcf5b678d15f251b1e383b6699f000c", 0x77, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) sched_setattr(0x0, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x2) r5 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x1000000010, 0x400000400080803, 0x0) r6 = dup(0xffffffffffffffff) write$cgroup_int(r6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000001880)={{{@in=@remote, @in=@empty}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000001700)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000300)) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000002c0)={@remote}) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f00000014c0)=""/205, &(0x7f0000000100)=0xfffffffffffffc87) r7 = socket(0x1000000010, 0x400000400080803, 0x0) dup(0xffffffffffffffff) write(r7, &(0x7f0000000240)="240000001a0025f07e9451f68f2e9c920a0b49ffed000019806028000800100001000000", 0x24) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000000180)={@mcast2, @mcast1, @loopback, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffb8fa}) setsockopt$inet6_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000480)='\x01S\xb8\x00\x00', 0x152) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r10, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) getsockopt$inet6_IPV6_XFRM_POLICY(r10, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@remote, @in=@empty}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000004c0)=0x197) syslog(0x0, &(0x7f0000000300)=""/120, 0x78) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 11:23:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0xc}, 0x10) 11:23:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a30", 0x8c, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:30 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x74204, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r3 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r4) write$FUSE_INIT(r3, &(0x7f0000000000)={0x50, 0x0, 0x6, {0x7, 0x1f, 0x5, 0x4, 0x4, 0x1, 0x7, 0x1}}, 0x50) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendfile(r2, r3, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 11:23:30 executing program 5: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 11:23:30 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x12}, 0x10) 11:23:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a30", 0x8c, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:30 executing program 5: bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) 11:23:31 executing program 4: syz_mount_image$gfs2(&(0x7f0000001d40)='gfs2\x00', &(0x7f0000001d80)='./file0\x00', 0x203, 0xffffffffffffff4c, 0x0, 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$KVM_GET_DEBUGREGS(r0, 0x8080aea1, &(0x7f0000000000)) 11:23:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0xf0}, 0x10) 11:23:31 executing program 2: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, 0x0, 0x80000) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x0, 0x0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x100, 0x2) sendto$inet(0xffffffffffffffff, &(0x7f0000000380)="08958fa10b18a2421366cee1bf9b7a4055fa3fd18a411a7ea62a371525aa36535b1c447725d68f51a2d0d8381c8453bc54927135f4da15770c572051954e87db8d99fff6656f30a5bc64253e030d72894a7e7410329eb2e69ca3000f2e31a59254d5fa41ffc1b96bcf5b678d15f251b1e383b6699f000c", 0x77, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8937, 0x0) sched_setattr(0x0, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x3, 0x2) r5 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x1000000010, 0x400000400080803, 0x0) r6 = dup(0xffffffffffffffff) write$cgroup_int(r6, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000001880)={{{@in=@remote, @in=@empty}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000001700)=0xe8) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000300)) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f00000002c0)={@remote}) getsockopt$IP_VS_SO_GET_SERVICES(r4, 0x0, 0x482, &(0x7f00000014c0)=""/205, &(0x7f0000000100)=0xfffffffffffffc87) r7 = socket(0x1000000010, 0x400000400080803, 0x0) dup(0xffffffffffffffff) write(r7, &(0x7f0000000240)="240000001a0025f07e9451f68f2e9c920a0b49ffed000019806028000800100001000000", 0x24) ioctl$sock_inet6_SIOCADDRT(r7, 0x890b, &(0x7f0000000180)={@mcast2, @mcast1, @loopback, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffb8fa}) setsockopt$inet6_tcp_TCP_CONGESTION(r7, 0x6, 0xd, &(0x7f0000000480)='\x01S\xb8\x00\x00', 0x152) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @remote, @remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x42}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r10, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) getsockopt$inet6_IPV6_XFRM_POLICY(r10, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@remote, @in=@empty}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000004c0)=0x197) syslog(0x0, &(0x7f0000000300)=""/120, 0x78) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 11:23:31 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x180}, 0x10) 11:23:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a30", 0x8c, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:31 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x101000, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e24, @broadcast}, {0x2, 0x4e21, @remote}, 0x200, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)='veth0\x00', 0x400000000000, 0x80, 0xd4d}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x179, 0x11, 0x8}]}, &(0x7f00000000c0)='GPL\x00', 0x2, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 11:23:31 executing program 5 (fault-call:0 fault-nth:0): bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:31 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x300}, 0x10) 11:23:31 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_dev$ndb(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000140)='asymmetric\x00', &(0x7f00000000c0)='^bdevwlan0procsecurity\x00') keyctl$unlink(0x9, 0x0, r3) keyctl$get_persistent(0x16, r2, r3) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r6, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) setsockopt$TIPC_MCAST_BROADCAST(r6, 0x10f, 0x85) r7 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) r9 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) r10 = dup3(r9, r8, 0x0) syz_kvm_setup_cpu$x86(r10, r7, &(0x7f000000f000/0x18000)=nil, 0x0, 0xfffffffffffffc92, 0x0, 0x0, 0xffffffffffffff78) syz_open_dev$mice(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 11:23:31 executing program 4: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f00000006c0)=@in={0x2, 0x0, @loopback=0xa1414aa}, 0x80, 0x0}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000040)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c", 0x3}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000440)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r3, 0x404c534a, &(0x7f0000000500)={0x6ec, 0x6, 0x40}) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) close(0xffffffffffffffff) socket$kcm(0x29, 0x7, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000001480)={&(0x7f0000000480)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e24, @loopback}, 0x2, 0x2, 0x2}}, 0x80, &(0x7f0000000000)=[{&(0x7f00000002c0)="2c113e7ca20d23ebb860146863497b38634abaee3b3238fb6944de48dd146e23d9a754977e2ed32aadec8539e0f211b702304d0cfca2aa83ee5b57c3acb73d259d7c38a80ae306804dc2c9e5f88b5d82e2477b03ea6cc837a70fbaff7b6fdd202ff5343c473cbf4845e836f84b4e48b0211eabdc9599e82d4c7c1aec92b332688003f3f525022d2c750507eb114e0ff405f53658d73a8e031114c73085e5703834c3a2cae090851863510dece1cc80e9aa163223f994278fa37691fe62ca9d592ad065", 0xc3}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 11:23:31 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc", 0x96, 0x7ff}], 0x2002000, &(0x7f00000003c0)) [ 782.969564][T30128] device nr0 entered promiscuous mode 11:23:32 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_dev$ndb(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000140)='asymmetric\x00', &(0x7f00000000c0)='^bdevwlan0procsecurity\x00') keyctl$unlink(0x9, 0x0, r3) keyctl$get_persistent(0x16, r2, r3) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r6, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) setsockopt$TIPC_MCAST_BROADCAST(r6, 0x10f, 0x85) r7 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) r9 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) r10 = dup3(r9, r8, 0x0) syz_kvm_setup_cpu$x86(r10, r7, &(0x7f000000f000/0x18000)=nil, 0x0, 0xfffffffffffffc92, 0x0, 0x0, 0xffffffffffffff78) syz_open_dev$mice(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 11:23:32 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) syz_open_dev$ndb(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80009, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000140)='asymmetric\x00', &(0x7f00000000c0)='^bdevwlan0procsecurity\x00') keyctl$unlink(0x9, 0x0, r3) keyctl$get_persistent(0x16, r2, r3) openat$nullb(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r6, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) setsockopt$TIPC_MCAST_BROADCAST(r6, 0x10f, 0x85) r7 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) r8 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) r9 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) r10 = dup3(r9, r8, 0x0) syz_kvm_setup_cpu$x86(r10, r7, &(0x7f000000f000/0x18000)=nil, 0x0, 0xfffffffffffffc92, 0x0, 0x0, 0xffffffffffffff78) syz_open_dev$mice(0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 11:23:32 executing program 5: bpf$OBJ_PIN_PROG(0x2, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x500}, 0x10) 11:23:32 executing program 3: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x6, 0x4) membarrier(0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x1, 0x4, &(0x7f00000000c0)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x3f000000, 0xffffffcc, 0x0, 0x0, 0xe94}, [@ldst={0x7, 0x0, 0x6}]}, &(0x7f0000000080)='GPL\x00', 0x3, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xffffffff}, 0xffffffffffffff16, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000}, 0x10}, 0x70) socket$inet_udplite(0x2, 0x2, 0x88) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r2 = dup(r1) bind$llc(r2, &(0x7f0000000100)={0x1a, 0x7, 0x7f, 0x5, 0x3, 0xe8, @local}, 0x10) [ 783.328731][T30128] device nr0 entered promiscuous mode 11:23:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x600}, 0x10) 11:23:32 executing program 5: bpf$OBJ_PIN_PROG(0x3, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:32 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc", 0x96, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0}, &(0x7f0000000100)=0x14, 0x80000) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xd, 0x0, &(0x7f0000000040), &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000001200)=""/4096, 0x0, 0x0, [], r2, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 11:23:32 executing program 5: bpf$OBJ_PIN_PROG(0x4, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:33 executing program 3: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(&(0x7f0000000180)=@nullb='/dev/nullb0\x00', &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000380)='ai\x92\x02\xa4\xe6\xd8\xbd\xff~n:y\x87\xb3\xcb\xbf\xe84D\x03^X\xd0\x8c\x90\xd7\x9c\x0e\x1e\x91f\xe1-\xd2\xa6G\xe0\xa4\xf1n\xa4J\xa7\xb2\x99m\x9d\xa4\xb5\x1e\xea\x8fb\xe2B\xde{\xd0\a\xd5\x8d\xc1\xef\xf0~\xbd\xdc|(\xc6;\xe0\xd6\xc6\xff\x8dX\x10^6\xa2\xf8y\xd8\xb1\x97P\xd2t\xfcg\xb0\xed\xa4\x1c\x815Qk.-\xc3v\xae\x87Q\xec-\x18%\xb5\xd7\xe6\x12Sc\xc0\xc1g\xf0\xe4\x84.\x820\xaa\xcc\xc2\xdc]\x01\xf7\x1d\x8a\xc0\xc6\xab\xe2\xa2+\xa43\xdb\xed(\x83\xed\xdd\a\x90\xcfE\xdb\xea\\z\xaf\x10\xea\x90\xb7\xd0\x9e\'\x9f\x94\xcfUD\x15\xa4jv\x88\xbaG\xd25\xd6\xf9\b&\xc0jd\xfbE\x8e\xbdw\xfc\b\xd6\xa1~\xef0\x998\xa4^\xae)\xdc\xff\xea\xfa\xd1ql)\x1dT\xf7+?\x03', 0x1004400, &(0x7f0000000100)='configfs\x00') mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='configfs\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./file0/file0\x00', 0x2000, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCRSGL2CALL(r1, 0x89e5, &(0x7f0000000140)=@bcast) 11:23:33 executing program 2: getpid() perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) connect(r1, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e21, @multicast2}, 0x3, 0x4, 0x2, 0x1}}, 0xffffffffffffffb9) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000d7, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f0000000040)=0x9, 0x4) prctl$PR_GET_DUMPABLE(0x3) 11:23:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x700}, 0x10) 11:23:33 executing program 4: modify_ldt$write(0x1, &(0x7f0000000000)={0x6, 0x20000000, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x10) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="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", 0x132}], 0x4, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x62602, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x76bef3330fd567a5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x400002) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x9, r0, 0x0, 0x0) 11:23:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc", 0x96, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:33 executing program 5: bpf$OBJ_PIN_PROG(0x5, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:33 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:23:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0xc00}, 0x10) 11:23:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f721", 0x9b, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:33 executing program 4: setxattr$trusted_overlay_origin(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0xfffffffffffffefc, 0x2) r0 = socket$inet(0x10, 0x3, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3fe, 0x230040) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000040)=0x480) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_AIE_OFF(r3, 0x7002) sendmsg(r0, &(0x7f00000002c0), 0x0) 11:23:33 executing program 2: creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = open(&(0x7f0000000780)='./bus\x00', 0x2000, 0x1) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x200004) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r0, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r3, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 784.387187][T30204] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 11:23:33 executing program 5: bpf$OBJ_PIN_PROG(0x7, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) [ 784.597195][ T26] audit: type=1804 audit(1572953013.735:87): pid=30220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir371107497/syzkaller.AffAZZ/666/bus" dev="sda1" ino=17457 res=1 [ 784.662222][ T26] audit: type=1804 audit(1572953013.735:88): pid=30220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir371107497/syzkaller.AffAZZ/666/bus" dev="sda1" ino=17457 res=1 11:23:33 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f721", 0x9b, 0x7ff}], 0x2002000, &(0x7f00000003c0)) [ 784.713022][T30208] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 784.771709][T30204] raw_sendmsg: syz-executor.3 forgot to set AF_INET. Fix it! 11:23:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0xf26}, 0x10) 11:23:34 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x800, 0x0) setsockopt$bt_hci_HCI_FILTER(r0, 0x0, 0x2, &(0x7f0000000040)={0x0, 0x9, 0x3f, 0x100}, 0x10) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000478000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x10000000002) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) ioctl$FICLONE(r1, 0x40049409, r2) clock_gettime(0x0, &(0x7f0000000140)) clock_gettime(0x0, &(0x7f0000000480)) [ 784.814973][ T26] audit: type=1804 audit(1572953013.735:89): pid=30220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir371107497/syzkaller.AffAZZ/666/bus" dev="sda1" ino=17457 res=1 11:23:34 executing program 5: bpf$OBJ_PIN_PROG(0x8, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:34 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:23:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000040)=0x0) sched_setscheduler(r3, 0x0, &(0x7f0000000080)=0x401) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) write$P9_RLCREATE(r2, &(0x7f00000001c0)={0x18, 0xf, 0x2, {{0x80, 0x3, 0x2}, 0xaa8c}}, 0x18) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x100, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$USBDEVFS_FREE_STREAMS(r2, 0x8008551d, &(0x7f0000000180)={0x511f, 0x3, [{0xd, 0x1}, {0xd}, {0x3, 0x1}]}) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r6, 0xc008ae88, &(0x7f0000000100)={0x7c, 0x0, [0x175]}) dup(0xffffffffffffffff) [ 785.021427][ T26] audit: type=1804 audit(1572953013.885:90): pid=30220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir371107497/syzkaller.AffAZZ/666/bus" dev="sda1" ino=17457 res=1 [ 785.056667][ T26] audit: type=1804 audit(1572953013.885:91): pid=30226 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir371107497/syzkaller.AffAZZ/666/bus" dev="sda1" ino=17457 res=1 11:23:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x1200}, 0x10) 11:23:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f721", 0x9b, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:34 executing program 5: bpf$OBJ_PIN_PROG(0x9, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:34 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:23:34 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x260f}, 0x10) 11:23:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) write(r2, &(0x7f0000000cc0)="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", 0x1000) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, &(0x7f00000003c0)=0x17642c4) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, 0x0) socket(0x10, 0x0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x200000, 0x0) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000440)={0x0, 0x80000}) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf, 0x1f, 0x1fe}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x2e, 0x8d}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:23:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283", 0x9d, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:34 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:23:34 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r4 = dup(r3) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r6, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) ioctl$VIDIOC_ENUM_FRAMESIZES(r5, 0xc02c564a, &(0x7f0000000180)={0x5, 0x32435750, 0x1, @stepwise={0x0, 0x66, 0x23, 0x800, 0xcfc8, 0x1}}) write$FUSE_BMAP(r4, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="236abda508895a45cd2db4e791ac647e2afea248fd234c4c381896cc2f77044ce0071b11eb0ae392a50dca3484c04ce82f2c06ff07a23ec58f46ac7b42fc0b73b1f8802de80065aa050c4795e4f256fad51c9ea7f2ab5fb2d4d82d302591fe7a4b3b56308e8692668daa3b3158810b5ac20b40376c71a14d892a9244a87afb"]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 11:23:34 executing program 5: bpf$OBJ_PIN_PROG(0xa, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x3f00}, 0x10) 11:23:35 executing program 5: bpf$OBJ_PIN_PROG(0xb, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283", 0x9d, 0x7ff}], 0x2002000, &(0x7f00000003c0)) [ 786.393981][T30282] 9pnet: Insufficient options for proto=fd 11:23:35 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0xf000}, 0x10) 11:23:35 executing program 5: bpf$OBJ_PIN_PROG(0xc, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) [ 786.593220][T30282] 9pnet: Insufficient options for proto=fd 11:23:35 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283", 0x9d, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:36 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0xff00}, 0x10) 11:23:36 executing program 5: bpf$OBJ_PIN_PROG(0xd, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:36 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r4 = dup(r3) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r6, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) ioctl$VIDIOC_ENUM_FRAMESIZES(r5, 0xc02c564a, &(0x7f0000000180)={0x5, 0x32435750, 0x1, @stepwise={0x0, 0x66, 0x23, 0x800, 0xcfc8, 0x1}}) write$FUSE_BMAP(r4, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="236abda508895a45cd2db4e791ac647e2afea248fd234c4c381896cc2f77044ce0071b11eb0ae392a50dca3484c04ce82f2c06ff07a23ec58f46ac7b42fc0b73b1f8802de80065aa050c4795e4f256fad51c9ea7f2ab5fb2d4d82d302591fe7a4b3b56308e8692668daa3b3158810b5ac20b40376c71a14d892a9244a87afb"]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) [ 787.516683][T30317] 9pnet: Insufficient options for proto=fd [ 787.691463][T29334] device bridge_slave_1 left promiscuous mode [ 787.697802][T29334] bridge0: port 2(bridge_slave_1) entered disabled state [ 787.741219][T29334] device bridge_slave_0 left promiscuous mode [ 787.747429][T29334] bridge0: port 1(bridge_slave_0) entered disabled state [ 788.580668][T29334] device hsr_slave_0 left promiscuous mode [ 788.630361][T29334] device hsr_slave_1 left promiscuous mode [ 788.697960][T29334] team0 (unregistering): Port device team_slave_1 removed [ 788.708066][T29334] team0 (unregistering): Port device team_slave_0 removed [ 788.718398][T29334] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 788.753921][T29334] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 788.812028][T29334] bond0 (unregistering): Released all slaves [ 788.948064][T30324] IPVS: ftp: loaded support on port[0] = 21 [ 789.004015][T30324] chnl_net:caif_netlink_parms(): no params data found [ 789.031939][T30324] bridge0: port 1(bridge_slave_0) entered blocking state [ 789.039041][T30324] bridge0: port 1(bridge_slave_0) entered disabled state [ 789.047032][T30324] device bridge_slave_0 entered promiscuous mode [ 789.054312][T30324] bridge0: port 2(bridge_slave_1) entered blocking state [ 789.061401][T30324] bridge0: port 2(bridge_slave_1) entered disabled state [ 789.069002][T30324] device bridge_slave_1 entered promiscuous mode [ 789.126390][T30324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 789.138631][T30324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 789.165091][T30324] team0: Port device team_slave_0 added [ 789.174025][T30324] team0: Port device team_slave_1 added [ 789.236914][T30324] device hsr_slave_0 entered promiscuous mode [ 789.290652][T30324] device hsr_slave_1 entered promiscuous mode [ 789.390315][T30324] debugfs: Directory 'hsr0' with parent '/' already present! [ 789.409502][T30324] bridge0: port 2(bridge_slave_1) entered blocking state [ 789.416591][T30324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 789.423942][T30324] bridge0: port 1(bridge_slave_0) entered blocking state [ 789.430992][T30324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 789.475976][T30324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 789.494577][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 789.507194][T17139] bridge0: port 1(bridge_slave_0) entered disabled state [ 789.515921][T17139] bridge0: port 2(bridge_slave_1) entered disabled state [ 789.535099][T30324] 8021q: adding VLAN 0 to HW filter on device team0 [ 789.551887][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 789.563757][T17139] bridge0: port 1(bridge_slave_0) entered blocking state [ 789.570819][T17139] bridge0: port 1(bridge_slave_0) entered forwarding state [ 789.592931][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 789.601935][ T8009] bridge0: port 2(bridge_slave_1) entered blocking state [ 789.609004][ T8009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 789.618230][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 789.627801][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 789.637293][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 789.651096][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 789.659925][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 789.672874][T30324] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 789.686957][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 789.694416][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 789.705426][T30324] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 789.834450][T30332] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 11:23:39 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) 11:23:39 executing program 5: bpf$OBJ_PIN_PROG(0xe, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:39 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x101000, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000000dc3e3f14715a317c6618cd70a299675ab7cfcd4aef8da9ecc2972229f878a98f846217e720d8ba786fe4b24ff57dc3b35dadaefbbecbdf44553e402d7fb51c9d551f5c80d29478829669abf7bc82bb50f306688cefbf52574db6474bd8ee527b4b55fccdd3feffd99c00"/122, @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000000000000002000000000000000"], 0x5c, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x10000000, &(0x7f0000000480)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f666b6c65302c776f726b6469723d2e2f66696c65315c0063a41f6ab4e41a227faa51f989223ebbd6"]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000140)='asymmetric\x00', &(0x7f00000000c0)='^bdevwlan0procsecurity\x00') keyctl$unlink(0x9, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$get_persistent(0x16, r2, r4) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, 0x4, 0x1f, 0x6, 0xfffffffffffffe45, "e07dd01ad9c4668644a314c8f7aef66cbbbb520812f338c1023e1178e162d20b7d21023e27d9034bedc75ae4a505964da0f5d66b1e0d136c7cd3"}, 0x46) 11:23:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x80040}, 0x10) 11:23:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3", 0x9e, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:39 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r4 = dup(r3) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r6, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) ioctl$VIDIOC_ENUM_FRAMESIZES(r5, 0xc02c564a, &(0x7f0000000180)={0x5, 0x32435750, 0x1, @stepwise={0x0, 0x66, 0x23, 0x800, 0xcfc8, 0x1}}) write$FUSE_BMAP(r4, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="236abda508895a45cd2db4e791ac647e2afea248fd234c4c381896cc2f77044ce0071b11eb0ae392a50dca3484c04ce82f2c06ff07a23ec58f46ac7b42fc0b73b1f8802de80065aa050c4795e4f256fad51c9ea7f2ab5fb2d4d82d302591fe7a4b3b56308e8692668daa3b3158810b5ac20b40376c71a14d892a9244a87afb"]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 11:23:39 executing program 5: bpf$OBJ_PIN_PROG(0xf, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0xf0ffff}, 0x10) 11:23:39 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3", 0x9e, 0x7ff}], 0x2002000, &(0x7f00000003c0)) [ 790.419821][T30344] overlayfs: failed to resolve './fkle0': -2 11:23:39 executing program 5: bpf$OBJ_PIN_PROG(0x10, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:39 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x101000, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="02000000010000000000000002000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000000008000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="08000000dc3e3f14715a317c6618cd70a299675ab7cfcd4aef8da9ecc2972229f878a98f846217e720d8ba786fe4b24ff57dc3b35dadaefbbecbdf44553e402d7fb51c9d551f5c80d29478829669abf7bc82bb50f306688cefbf52574db6474bd8ee527b4b55fccdd3feffd99c00"/122, @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000000000000002000000000000000"], 0x5c, 0x0) mount$overlay(0x40000f, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x10000000, &(0x7f0000000480)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f666b6c65302c776f726b6469723d2e2f66696c65315c0063a41f6ab4e41a227faa51f989223ebbd6"]) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r3, &(0x7f0000000140)='asymmetric\x00', &(0x7f00000000c0)='^bdevwlan0procsecurity\x00') keyctl$unlink(0x9, 0x0, r3) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000200)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$get_persistent(0x16, r2, r4) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000300)={0xe, 0x4, 0x1f, 0x6, 0xfffffffffffffe45, "e07dd01ad9c4668644a314c8f7aef66cbbbb520812f338c1023e1178e162d20b7d21023e27d9034bedc75ae4a505964da0f5d66b1e0d136c7cd3"}, 0x46) 11:23:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x1000000}, 0x10) [ 790.585596][T30348] 9pnet: Insufficient options for proto=fd 11:23:39 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) 11:23:39 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r4 = dup(r3) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r6, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) ioctl$VIDIOC_ENUM_FRAMESIZES(r5, 0xc02c564a, &(0x7f0000000180)={0x5, 0x32435750, 0x1, @stepwise={0x0, 0x66, 0x23, 0x800, 0xcfc8, 0x1}}) write$FUSE_BMAP(r4, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="236abda508895a45cd2db4e791ac647e2afea248fd234c4c381896cc2f77044ce0071b11eb0ae392a50dca3484c04ce82f2c06ff07a23ec58f46ac7b42fc0b73b1f8802de80065aa050c4795e4f256fad51c9ea7f2ab5fb2d4d82d302591fe7a4b3b56308e8692668daa3b3158810b5ac20b40376c71a14d892a9244a87afb"]) umount2(&(0x7f0000000000)='./file0\x00', 0x0) 11:23:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3", 0x9e, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:40 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) 11:23:40 executing program 5: bpf$OBJ_PIN_PROG(0x11, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x2000000}, 0x10) 11:23:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f}], 0x2002000, &(0x7f00000003c0)) 11:23:40 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x3000000}, 0x10) [ 791.366023][T30374] overlayfs: failed to resolve './fkle0': -2 11:23:40 executing program 5: bpf$OBJ_PIN_PROG(0x12, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) [ 791.414968][T30388] 9pnet: Insufficient options for proto=fd 11:23:40 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RGETLOCK(r2, &(0x7f0000000080)={0x1e}, 0x1e) io_setup(0x4, &(0x7f00000002c0)=0x0) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x0, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x3c) io_submit(r3, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r4 = syz_open_dev$vivid(&(0x7f00000000c0)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_CREATE_BUFS(r4, 0xc100565c, &(0x7f0000000300)={0xffffffc0, 0x4, 0x4, {0x9, @pix={0x4, 0x5, 0x41323151, 0x1, 0x9, 0x7f, 0x3, 0xd90, 0x1, 0x0, 0x0, 0x1}}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0xd0030, r6, 0x4) 11:23:40 executing program 5: bpf$OBJ_PIN_PROG(0x13, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f}], 0x2002000, &(0x7f00000003c0)) 11:23:41 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x4000000}, 0x10) 11:23:41 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r4 = dup(r3) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r6, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) ioctl$VIDIOC_ENUM_FRAMESIZES(r5, 0xc02c564a, &(0x7f0000000180)={0x5, 0x32435750, 0x1, @stepwise={0x0, 0x66, 0x23, 0x800, 0xcfc8, 0x1}}) write$FUSE_BMAP(r4, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r4, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="236abda508895a45cd2db4e791ac647e2afea248fd234c4c381896cc2f77044ce0071b11eb0ae392a50dca3484c04ce82f2c06ff07a23ec58f46ac7b42fc0b73b1f8802de80065aa050c4795e4f256fad51c9ea7f2ab5fb2d4d82d302591fe7a4b3b56308e8692668daa3b3158810b5ac20b40376c71a14d892a9244a87afb"]) 11:23:41 executing program 5: bpf$OBJ_PIN_PROG(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) [ 792.293007][T30426] 9pnet: Insufficient options for proto=fd [ 792.730993][T29334] device bridge_slave_1 left promiscuous mode [ 792.737207][T29334] bridge0: port 2(bridge_slave_1) entered disabled state [ 792.790966][T29334] device bridge_slave_0 left promiscuous mode [ 792.797120][T29334] bridge0: port 1(bridge_slave_0) entered disabled state [ 793.550659][T29334] device hsr_slave_0 left promiscuous mode [ 793.590422][T29334] device hsr_slave_1 left promiscuous mode [ 793.637835][T29334] team0 (unregistering): Port device team_slave_1 removed [ 793.647951][T29334] team0 (unregistering): Port device team_slave_0 removed [ 793.657905][T29334] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 793.705065][T29334] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 793.774469][T29334] bond0 (unregistering): Released all slaves [ 793.876694][T30433] IPVS: ftp: loaded support on port[0] = 21 [ 793.927805][T30433] chnl_net:caif_netlink_parms(): no params data found [ 793.954295][T30433] bridge0: port 1(bridge_slave_0) entered blocking state [ 793.961850][T30433] bridge0: port 1(bridge_slave_0) entered disabled state [ 793.969515][T30433] device bridge_slave_0 entered promiscuous mode [ 793.977155][T30433] bridge0: port 2(bridge_slave_1) entered blocking state [ 793.984229][T30433] bridge0: port 2(bridge_slave_1) entered disabled state [ 793.991959][T30433] device bridge_slave_1 entered promiscuous mode [ 794.042455][T30433] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 794.053129][T30433] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 794.074307][T30433] team0: Port device team_slave_0 added [ 794.081329][T30433] team0: Port device team_slave_1 added [ 794.132729][T30433] device hsr_slave_0 entered promiscuous mode [ 794.172274][T30433] device hsr_slave_1 entered promiscuous mode [ 794.273792][T30433] debugfs: Directory 'hsr0' with parent '/' already present! [ 794.288906][T30433] bridge0: port 2(bridge_slave_1) entered blocking state [ 794.295997][T30433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 794.303274][T30433] bridge0: port 1(bridge_slave_0) entered blocking state [ 794.310385][T30433] bridge0: port 1(bridge_slave_0) entered forwarding state [ 794.355141][T30433] 8021q: adding VLAN 0 to HW filter on device bond0 [ 794.374040][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 794.386924][T17139] bridge0: port 1(bridge_slave_0) entered disabled state [ 794.395522][T17139] bridge0: port 2(bridge_slave_1) entered disabled state [ 794.414138][T30433] 8021q: adding VLAN 0 to HW filter on device team0 [ 794.430864][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 794.439619][T17139] bridge0: port 1(bridge_slave_0) entered blocking state [ 794.446693][T17139] bridge0: port 1(bridge_slave_0) entered forwarding state [ 794.475384][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 794.484363][T17139] bridge0: port 2(bridge_slave_1) entered blocking state [ 794.491428][T17139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 794.500457][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 794.510064][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 794.521844][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 794.537216][T30433] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 794.548746][T30433] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 794.561946][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 794.570903][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 794.579167][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 794.594560][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 794.602490][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 794.613519][T30433] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 794.737618][T30441] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 11:23:44 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) writev(0xffffffffffffffff, 0x0, 0x0) 11:23:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x5000000}, 0x10) 11:23:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800001, 0x2f42f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f00000003c0)=0xe8) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x1, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[], [{@dont_measure='dont_measure'}, {@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'user_u'}}, {@dont_measure='dont_measure'}, {@fowner_lt={'fowner<', r5}}]}}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 11:23:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f}], 0x2002000, &(0x7f00000003c0)) 11:23:44 executing program 5: bpf$OBJ_PIN_PROG(0x15, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:44 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r3 = dup(r2) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) ioctl$VIDIOC_ENUM_FRAMESIZES(r4, 0xc02c564a, &(0x7f0000000180)={0x5, 0x32435750, 0x1, @stepwise={0x0, 0x66, 0x23, 0x800, 0xcfc8, 0x1}}) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r3, &(0x7f00000000c0)={0x14c}, 0x137) 11:23:44 executing program 5: bpf$OBJ_PIN_PROG(0x16, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x6000000}, 0x10) 11:23:44 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:44 executing program 5: bpf$OBJ_PIN_PROG(0x17, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:44 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) writev(0xffffffffffffffff, 0x0, 0x0) 11:23:44 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r3 = dup(r2) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) ioctl$VIDIOC_ENUM_FRAMESIZES(r4, 0xc02c564a, &(0x7f0000000180)={0x5, 0x32435750, 0x1, @stepwise={0x0, 0x66, 0x23, 0x800, 0xcfc8, 0x1}}) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) 11:23:44 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x7000000}, 0x10) 11:23:44 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x70) 11:23:45 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r3 = dup(r2) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) ioctl$VIDIOC_ENUM_FRAMESIZES(r4, 0xc02c564a, &(0x7f0000000180)={0x5, 0x32435750, 0x1, @stepwise={0x0, 0x66, 0x23, 0x800, 0xcfc8, 0x1}}) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) 11:23:45 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) writev(0xffffffffffffffff, 0x0, 0x0) 11:23:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x8000000}, 0x10) 11:23:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:45 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x20000050) 11:23:45 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) dup(r2) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, &(0x7f0000000180)={0x5, 0x32435750, 0x1, @stepwise={0x0, 0x66, 0x23, 0x800, 0xcfc8, 0x1}}) 11:23:45 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x4000, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000080)={0x0, 0xb, 0x30}, 0xc) 11:23:45 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0xc000000}, 0x10) 11:23:45 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000380)=[{&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:45 executing program 5: socket$inet_smc(0x2b, 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x2) 11:23:45 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) dup(r2) pipe2(&(0x7f0000000080), 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:46 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0xf260000}, 0x10) 11:23:46 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r3 = dup(r2) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) ioctl$VIDIOC_ENUM_FRAMESIZES(r4, 0xc02c564a, &(0x7f0000000180)={0x5, 0x32435750, 0x1, @stepwise={0x0, 0x66, 0x23, 0x800, 0xcfc8, 0x1}}) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) [ 797.704571][T29326] device bridge_slave_1 left promiscuous mode [ 797.711710][T29326] bridge0: port 2(bridge_slave_1) entered disabled state [ 797.751019][T29326] device bridge_slave_0 left promiscuous mode [ 797.757291][T29326] bridge0: port 1(bridge_slave_0) entered disabled state [ 798.510573][T29326] device hsr_slave_0 left promiscuous mode [ 798.600485][T29326] device hsr_slave_1 left promiscuous mode [ 798.667600][T29326] team0 (unregistering): Port device team_slave_1 removed [ 798.677577][T29326] team0 (unregistering): Port device team_slave_0 removed [ 798.688528][T29326] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 798.727927][T29326] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 798.795856][T29326] bond0 (unregistering): Released all slaves [ 798.906997][T30541] IPVS: ftp: loaded support on port[0] = 21 [ 798.961590][T30541] chnl_net:caif_netlink_parms(): no params data found [ 798.989926][T30541] bridge0: port 1(bridge_slave_0) entered blocking state [ 798.997252][T30541] bridge0: port 1(bridge_slave_0) entered disabled state [ 799.005415][T30541] device bridge_slave_0 entered promiscuous mode [ 799.013348][T30541] bridge0: port 2(bridge_slave_1) entered blocking state [ 799.020454][T30541] bridge0: port 2(bridge_slave_1) entered disabled state [ 799.028305][T30541] device bridge_slave_1 entered promiscuous mode [ 799.045903][T30541] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 799.056565][T30541] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 799.111381][T30541] team0: Port device team_slave_0 added [ 799.118181][T30541] team0: Port device team_slave_1 added [ 799.186565][T30541] device hsr_slave_0 entered promiscuous mode [ 799.244194][T30541] device hsr_slave_1 entered promiscuous mode [ 799.310300][T30541] debugfs: Directory 'hsr0' with parent '/' already present! [ 799.329249][T30541] bridge0: port 2(bridge_slave_1) entered blocking state [ 799.336335][T30541] bridge0: port 2(bridge_slave_1) entered forwarding state [ 799.343698][T30541] bridge0: port 1(bridge_slave_0) entered blocking state [ 799.350801][T30541] bridge0: port 1(bridge_slave_0) entered forwarding state [ 799.396514][T30541] 8021q: adding VLAN 0 to HW filter on device bond0 [ 799.413081][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 799.424729][T14128] bridge0: port 1(bridge_slave_0) entered disabled state [ 799.434597][T14128] bridge0: port 2(bridge_slave_1) entered disabled state [ 799.452300][T30541] 8021q: adding VLAN 0 to HW filter on device team0 [ 799.466984][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 799.477427][T14128] bridge0: port 1(bridge_slave_0) entered blocking state [ 799.484504][T14128] bridge0: port 1(bridge_slave_0) entered forwarding state [ 799.506980][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 799.519306][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 799.526407][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 799.555507][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 799.564278][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 799.575701][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 799.583980][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 799.592707][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 799.602135][T30541] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 799.617680][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 799.629237][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 799.644839][T30541] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 799.774892][T30549] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 11:23:49 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:23:49 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet6(0xa, 0x1, 0x0) fstat(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r6, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) acct(&(0x7f0000000180)='./file0\x00') ioctl$PPPIOCGFLAGS(r6, 0x8004745a, &(0x7f0000000140)) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000480)={0x78, 0x0, 0x5, {0x200, 0x6, 0x0, {0x5, 0x0, 0x200, 0x5, 0x100000001, 0x5, 0x0, 0x9, 0x2000, 0x8, 0x8, r4, r5, 0x81, 0x7}}}, 0x78) fchownat(r1, &(0x7f0000000000)='./file0\x00', r2, r5, 0x1000) 11:23:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{0x0, 0x0, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x12000000}, 0x10) 11:23:49 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) dup(r2) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:49 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r3 = dup(r2) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) ioctl$VIDIOC_ENUM_FRAMESIZES(r4, 0xc02c564a, &(0x7f0000000180)={0x5, 0x32435750, 0x1, @stepwise={0x0, 0x66, 0x23, 0x800, 0xcfc8, 0x1}}) write$FUSE_BMAP(r3, &(0x7f0000000100)={0x18}, 0x18) 11:23:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x3f000000}, 0x10) 11:23:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{0x0, 0x0, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:49 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) r0 = semget$private(0x0, 0x0, 0x200) semctl$GETPID(r0, 0x3, 0xb, &(0x7f0000000080)=""/213) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') r2 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r2, 0xc0345641, &(0x7f0000000040)={0x10000, "88515e9b670b950bc956faa2ac850361462533d0b5bfd0f99f9d69e862dde73f"}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, 0x0) r3 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r5 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000076}}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) waitid(0x2, r5, &(0x7f0000000040), 0x2, &(0x7f00000000c0)) sendmsg$key(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r4, @ANYRESDEC=r5]], 0xfffffffffffffe56}}, 0x20004850) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r4}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r4, 0x6d, "5d6dc0", "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"}}, 0x110) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r4, 0x401}}, 0x10) 11:23:49 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) dup(r2) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:49 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x40000800}, 0x10) 11:23:49 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:23:49 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) dup(r2) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) ioctl$VIDIOC_ENUM_FRAMESIZES(r3, 0xc02c564a, &(0x7f0000000180)={0x5, 0x32435750, 0x1, @stepwise={0x0, 0x66, 0x23, 0x800, 0xcfc8, 0x1}}) 11:23:49 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) pipe2$9p(&(0x7f0000000080), 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_GET_VCPU_EVENTS(r7, 0x8040ae9f, &(0x7f0000000140)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000000)={0x400, 0x1}) 11:23:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{0x0, 0x0, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:49 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:23:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x80010000}, 0x10) 11:23:50 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) dup(r2) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:50 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'rose0\x00', {0x2, 0x4e23, @broadcast}}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_CROPCAP(r2, 0xc02c563a, &(0x7f0000000080)={0x5, {0x101, 0x1, 0x0, 0xfffffffb}, {0x6, 0x3ff, 0x9, 0x7}, {0x399, 0x400}}) 11:23:50 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200), 0x0, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0x8cffffff}, 0x10) 11:23:50 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) dup(r2) pipe2(&(0x7f0000000080), 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:50 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r1 = dup3(r0, 0xffffffffffffffff, 0x80000) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000000)={0x67, &(0x7f0000000080)=""/103}) 11:23:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0xf6ffffff}, 0x10) 11:23:51 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200), 0x0, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:51 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) dup(r2) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:51 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) dup(r2) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) [ 802.660987][T29334] device bridge_slave_1 left promiscuous mode [ 802.667215][T29334] bridge0: port 2(bridge_slave_1) entered disabled state [ 802.711266][T29334] device bridge_slave_0 left promiscuous mode [ 802.717484][T29334] bridge0: port 1(bridge_slave_0) entered disabled state [ 803.440771][T29334] device hsr_slave_0 left promiscuous mode [ 803.480361][T29334] device hsr_slave_1 left promiscuous mode [ 803.557812][T29334] team0 (unregistering): Port device team_slave_1 removed [ 803.568184][T29334] team0 (unregistering): Port device team_slave_0 removed [ 803.579317][T29334] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 803.634529][T29334] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 803.711407][T29334] bond0 (unregistering): Released all slaves [ 803.807590][T30658] IPVS: ftp: loaded support on port[0] = 21 [ 803.858447][T30658] chnl_net:caif_netlink_parms(): no params data found [ 803.886924][T30658] bridge0: port 1(bridge_slave_0) entered blocking state [ 803.894090][T30658] bridge0: port 1(bridge_slave_0) entered disabled state [ 803.901879][T30658] device bridge_slave_0 entered promiscuous mode [ 803.909375][T30658] bridge0: port 2(bridge_slave_1) entered blocking state [ 803.916523][T30658] bridge0: port 2(bridge_slave_1) entered disabled state [ 803.924193][T30658] device bridge_slave_1 entered promiscuous mode [ 803.942244][T30658] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 803.952546][T30658] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 804.041040][T30658] team0: Port device team_slave_0 added [ 804.047818][T30658] team0: Port device team_slave_1 added [ 804.123079][T30658] device hsr_slave_0 entered promiscuous mode [ 804.221132][T30658] device hsr_slave_1 entered promiscuous mode [ 804.290348][T30658] debugfs: Directory 'hsr0' with parent '/' already present! [ 804.309008][T30658] bridge0: port 2(bridge_slave_1) entered blocking state [ 804.316138][T30658] bridge0: port 2(bridge_slave_1) entered forwarding state [ 804.323504][T30658] bridge0: port 1(bridge_slave_0) entered blocking state [ 804.330613][T30658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 804.376800][T30658] 8021q: adding VLAN 0 to HW filter on device bond0 [ 804.394434][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 804.405844][ T8009] bridge0: port 1(bridge_slave_0) entered disabled state [ 804.415881][ T8009] bridge0: port 2(bridge_slave_1) entered disabled state [ 804.432216][T30658] 8021q: adding VLAN 0 to HW filter on device team0 [ 804.443386][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 804.452033][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 804.459061][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 804.472766][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 804.481526][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 804.488594][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 804.517608][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 804.526723][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 804.538230][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 804.549767][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 804.561349][T30658] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 804.572296][T30658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 804.580772][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 804.596317][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 804.604175][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 804.615359][T30658] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 804.719077][T30665] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 11:23:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0xfeffffff}, 0x10) 11:23:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000080)={0x7, 0x3, 0x5, 0x0, 0x1}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:23:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200), 0x0, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:54 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) dup(r2) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:54 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:23:54 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0xff000000}, 0x10) 11:23:54 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='ull\x00', 0x1, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={0x0, r0, 0x2}, 0x8bdc1389a52d81ea) 11:23:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481c", 0x48, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:54 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240), 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:54 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) dup(r2) pipe2(&(0x7f0000000080), 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0xfffff000}, 0x10) 11:23:54 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000080)=""/135) 11:23:54 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:23:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481c", 0x48, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:54 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) dup(r2) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:54 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0xffffff8c}, 0x10) 11:23:54 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:23:54 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:54 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) getcwd(&(0x7f0000000580)=""/213, 0xd5) 11:23:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0xfffffff6}, 0x10) 11:23:55 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) sendmsg$sock(r0, &(0x7f0000000300)={&(0x7f0000000080)=@l2={0x1f, 0x401, {0x81, 0x1d, 0x1f, 0x0, 0xd0}, 0x7fff, 0x1}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="5bae05c158840a8ef9b8f3689b48d8e1d86bf2af3c6213be4a7b4673d7e3544944760d21bd85d09e89aebda0ff0f5c0ea06936472e3164868e96cd5d7055c75d989b0168653b917df19088e564331a7e8fc46af47cda5d36ebe491acda83ae854f2d5dcdb4fd1fcc7249cb980a6f95e8e593c552684928c9946f6be2119b7c5577ecefb1a305b0a6f62b1300ce06fc5c597bf2ce7d7e", 0x96}, {&(0x7f00000001c0)="6ec5448296080ffb27ba89c3973de6ec40c1e51ea04031a4e5fa2b329e742fa5514ca03c976b62fa4f2cfe150b2be7d99fbf194f91c4d1b9386d48673b7bd46f9903fda251c866d17fe9fff33aebace57ff1c1cf5966a5339134de68240484a7eb5d553bde60969b13e61a7ba356457a5ea41675b30e76392aaf407fb0db3938ecbc025a8b499ade432148481e835fa3a2cf46", 0x93}], 0x2, &(0x7f0000000280)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x80000000}}, @txtime={{0x18, 0x1, 0x3d, 0x10000}}], 0x60}, 0x4000) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000340)) 11:23:55 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481c", 0x48, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:55 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:55 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0xfffffffe}, 0x10) 11:23:55 executing program 5: syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7, 0x602) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UFFDIO_UNREGISTER(r2, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r3 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f0000000040)=0x80, 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={0x0, r0, 0x2}, 0x10) 11:23:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0, 0xffffffff}, 0x10) 11:23:55 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) [ 807.391009][T29332] device bridge_slave_1 left promiscuous mode [ 807.397272][T29332] bridge0: port 2(bridge_slave_1) entered disabled state [ 807.451084][T29332] device bridge_slave_0 left promiscuous mode [ 807.457356][T29332] bridge0: port 1(bridge_slave_0) entered disabled state [ 808.180584][T29332] device hsr_slave_0 left promiscuous mode [ 808.250422][T29332] device hsr_slave_1 left promiscuous mode [ 808.311737][T29332] team0 (unregistering): Port device team_slave_1 removed [ 808.325530][T29332] team0 (unregistering): Port device team_slave_0 removed [ 808.336746][T29332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 808.384000][T29332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 808.452596][T29332] bond0 (unregistering): Released all slaves [ 808.558142][T30865] IPVS: ftp: loaded support on port[0] = 21 [ 808.610844][T30865] chnl_net:caif_netlink_parms(): no params data found [ 808.638345][T30865] bridge0: port 1(bridge_slave_0) entered blocking state [ 808.645493][T30865] bridge0: port 1(bridge_slave_0) entered disabled state [ 808.653536][T30865] device bridge_slave_0 entered promiscuous mode [ 808.661206][T30865] bridge0: port 2(bridge_slave_1) entered blocking state [ 808.668283][T30865] bridge0: port 2(bridge_slave_1) entered disabled state [ 808.676266][T30865] device bridge_slave_1 entered promiscuous mode [ 808.695082][T30865] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 808.781830][T30865] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 808.806007][T30865] team0: Port device team_slave_0 added [ 808.813323][T30865] team0: Port device team_slave_1 added [ 808.902806][T30865] device hsr_slave_0 entered promiscuous mode [ 808.940671][T30865] device hsr_slave_1 entered promiscuous mode [ 808.980292][T30865] debugfs: Directory 'hsr0' with parent '/' already present! [ 808.999155][T30865] bridge0: port 2(bridge_slave_1) entered blocking state [ 809.006270][T30865] bridge0: port 2(bridge_slave_1) entered forwarding state [ 809.013645][T30865] bridge0: port 1(bridge_slave_0) entered blocking state [ 809.020700][T30865] bridge0: port 1(bridge_slave_0) entered forwarding state [ 809.066712][T30865] 8021q: adding VLAN 0 to HW filter on device bond0 [ 809.082937][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 809.096282][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 809.104724][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 809.123973][T30865] 8021q: adding VLAN 0 to HW filter on device team0 [ 809.142867][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 809.155752][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 809.162831][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 809.184902][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 809.197531][T14128] bridge0: port 2(bridge_slave_1) entered blocking state [ 809.204601][T14128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 809.228209][T30865] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 809.238668][T30865] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 809.251620][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 809.261328][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 809.269896][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 809.278585][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 809.287231][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 809.295189][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 809.316910][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 809.324627][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 809.336457][T30865] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 809.459694][T30873] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 11:23:58 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:23:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc", 0x6c, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:58 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, &(0x7f00000001c0)) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) getsockopt$inet6_mreq(r2, 0x29, 0x1d, &(0x7f0000000100)={@initdev}, &(0x7f0000000140)=0x14) getsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f0000000000), &(0x7f0000000080)=0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r1, 0xc040564b, &(0x7f0000000180)={0xffff8001, 0x0, 0x3031, 0x10000, 0x101, {0x6, 0x1}, 0x1}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000200)=""/205) 11:23:58 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x2f) 11:23:58 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240), 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:58 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r0, &(0x7f0000000640), 0x4, &(0x7f0000000740)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:58 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc", 0x6c, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:58 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x3b) 11:23:59 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) syz_mount_image$bfs(&(0x7f0000000000)='bfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x7, &(0x7f0000000580)=[{&(0x7f00000000c0)="e6343d123c29ce0798d513c5e659adc6010cb1da907989f9bac9e08ebfc2be10af3877caebf304b66ace5f1df83b1ba93bccaa2805bacf0a037a92256b651e4baa7b65c69becd8e800c2ae5e2b6cccff307a033ae5618fcc0dd47f165b7ef8081d46eba67b86e922e85b1c4589fb709d18ffb26e2c26633674af18f751b600644e4f6ff40a3f", 0x86, 0x2}, {&(0x7f0000000180)="234e76701dc5484eaf435962130121d70fbead23330762019ca318310dc5bb91b393f3b8815b6fd2589814cc78e2f0fa0afb3b59c58be68e29941b1c279d78ba386162daf245500cecf5a344c21b0cc817355c35fade90ce04c03dc9fe2ebdc8", 0x60, 0x7c}, {&(0x7f0000000200)="78d7873b79a329ee3f1577e4611dd2b99e0c740097c202ecdf8582c1dcd8ae7d75e3dd3ef373248fac722b1ee6e0a6a1061b1e2c5c21c92e95a4d94ea9b7165749e0006c2a2d2fbb33219c5ae8b7d8d1410d9578cfeec288f0409d24c6e90b4cf81cbe18990bc06cd9247c7173ae38a81d25e01feee8b59fd21d62b84958a27844b80e8bf8e0350dfa80761c170e62c5c91bcaeda2a51771c32e8fa9fcb0f47f9016ec8d21ed7dd95f125558a0b234fd96334331c81467b0e853a5981eb43016", 0xc0, 0x1}, {&(0x7f00000002c0)="ae96da07f78d871b0ea824a25eece70ba20c89a2fc6c13ba6952b95091a0b3a03e027ed7f8a20d317f93c40e4dcda2f6b26c63515dae44a59f3616aa1b86e931accbf8c81d6dcdc8a096aa321abb129086d7b164f71f796f54afe25bbdd99fe25d5f684f36984352511e8df01cdbcef346b0af1fda1cc8c36ca65f439637cb51189bde25cd1b05953e4a8cb3", 0x8c, 0xfffffffffffffff8}, {&(0x7f0000000380)="70c958586bbbf1183653f05dcc0fd675da360212d95491f1d1de80646d33db302e4b0428c1a1d8eec1adadaa74af8255d982344ca62eae866ea8f11b50b6354d20441cc832d0cc965c120d0a35bd6eaaf56f989dcd6791d99aeb4d5949d88f8c58928514c4caa308c348239260b9069a903f9a3a193844aed5fcf452fd4caed9b966b9ae7f451dd4ba563e9e0c075ad812f176534b5f2c68c71600d7efb4729c9d40f0bc74d8f5d7106ea5b2b460909759bf", 0xb2, 0xd8}, {&(0x7f0000000440)="9cc59f8379248c402561b46323140bb51d8cc23077f0ddad", 0x18, 0x4a}, {&(0x7f0000000480)="43c0395a9587a42f47f5624f0c29a3e528a2e6a9fd6bebcd84a96f5e72540009007f5ce6a0f349c60d15d2c82c580aeec1f00a66138d9c12f67830f2b0f856dc3c51919851b3e48087bd32cfe544020f11e05efa170ff2a52eddc0054ae276dc3f1889d0ff91988c96872f1bb19bd8ac4e72528f35d71ded0a3f6544664bd596fb765a9271de7be595e926aa72a5acb9336d55010007cb2d31e9aac3f7acfdc3657d1bbee3e9e1127ed147cfa7b531014c7dc2cbf0c8c87f779a0f0a775f6daf623a9603d4c3e5f5e4624cb98ab493d9370109cb3d4f75", 0xd7, 0x3}], 0x1000, 0x0) 11:23:59 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:23:59 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240), 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x70) 11:23:59 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) gettid() r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc", 0x6c, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:23:59 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000080)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e24, 0xfffffffb, @empty, 0x8}, 0x1c) rmdir(&(0x7f0000000000)='./file0\x00') 11:23:59 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:23:59 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:59 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x20000050) 11:23:59 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:23:59 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000080)='./file0\x00', 0x800, 0x3, &(0x7f0000001240)=[{&(0x7f00000000c0)="3fe990c5735402858dfdf0c2d9d3edcc4fdbb43ca4a1c8309505369e15ae4faab33849c0c0ff3916dfd25e4b8e21573c16348f771e3e57ec0526d6d6223ae5fcb11db33fd024c2598e3089a9fc579c9857a8a1a6d2eb35c873f0553926dbf788f20a1aed0f9e844d042f8dcf0ad76b70a5577273e7d3f540183588412d58b57898d182", 0x83, 0x7}, {&(0x7f0000000180)="fa4f44316b1d856aa36cd0e48b736d60b25d753be7a5d70edcb2c78e625dc26339b8f6b1e06fc4b6360fa1a39668504809ff804b471a83186013e17960e0c15a2794eb5a10174d9b225e84ed771e5956e47721258874ab84c5864d5f3472ed5f2dfdb9e4131ec261d4b7e3234d03082359436bbec461fdf84b4c57726d0693921d9ebfdb5cf8395c7552f5ea45e0332f01", 0x91, 0x8}, {&(0x7f0000000240)="1e7475ff374fd5c54d2b0064ba784e9960eba76afda402ac5708bbec94ab3d1f340ed404de4a36cb33eca9eb663d079fdea34a363850f6a12701daef0794ee34e5f3376a3de8adf478136bf6c03c8b021bfa4b09b5933faa5e6b8f0f224ee781968afcb8d386d8a4cb0f71490a5150451ff4091100bb2dfa9b39b58997b7f21b6519c762556aef52f69c831fae8c5191424a07c88f6929ef952263b9a88c6d871bb42a5f867f4963c7db4650f2fd4c8464ded5ad6a29a940d2c1a3f6d17085fdfd5df588c23b034f3b46c3daaf3c0884bbc78f189c84e8dbb2d51ae18537f518fcddbc0cd95bf4cf5ff6b58a4d89c5c42bebf3d27a19aee361a3f581eb590e90858ab722ce48784a24bf20ed8d79fa3100e10ca7fbda07f9895a2fb0826998a4eceddfebc340b58db0f25c45d1f030e9f42c574e574b062028ec34966fa526986451f84cbbc54de76400d5c8bb5770a3708995ff9ad3ede3938dc1baa07474d4c3dcfa852094669df6ed8ce64c388276f9b5c953a4d8acaf7bee495645bb6e0484ef19cc6b8eebb7a498915121ee6094c13705fd2bc95a448b1d787aa7a1976b7e51e88b169398b7bfa0face2a4de3e0fb0388209f9eb5d2a5f434fcc98acece3ce5a9b9bd77bba39016f30f1356da296acd4281fb2f9bb6acb082aa80874be5378256f2765ee82194a886fa5149ee2b279d8053752aa3fecfe041fca5d0a126d70c6454b33b73d5774cfd069939f431ef09772f40289f5cc245e4a86238fdc0b74d40401ae93935f7423e42cf44cb6c5bd0102ceecc630fd11bb020a7cee87b364c9fc454ebde24bfe8c8918ea8029cea5a3c3d2ceef54f47f3e3a1eb1b7d8f17e588cc4f6f983a0f94f27c33ef0ed4bf6a47f82a2241bda5b1d920928958b685cdb9a79edaa4e09b24d9af934d5a4ca8ce25521c613013b87e8799e610234587f9a242e5d8bed257f71338b632a4b266ca5a9e1f563ef7224faf1c1d11cf7a6bf7bb5ba7774380e1163d3e4d19d0eec345f7aa74eb7257dd459f8ac705724043313098ebeb8192532fcf3037d2188d2f3f4be55b9f4e7e44f7622f86bfd10ae052fc07d2bf8d6ada163133faf1540604adb9ce7e5c7b46971b43ce761f36f18ee591396a4478daa3852094e56abdb9874766dcc502c5ec0a1124c47ac45cc84a18ddea88e39cc20586a6feaa6c931367291e19dd02ce3fc7b46ab3ea9c388726a27c0b86a539190e68e1711be64c7e70238d84a6576921953e4574e6cb94fac19f550a38dfb0f1af02f6ab11c2734ce3dd1b10f2a5facdccd0ba4855bae5bf9ea01be1186a4894138d4642f056b393cf1cf93d16d3bc526019b2b4ad2b06688f614f7a3385f334e4af35fc55a087c82f344b5f345327be6e2a6c83fabb1e54dddd12623960a216ef6f97c17927993378482f5b62462f0dafcbaa77d2cf3e96df18ca6178f4570e1e3ec68c7c6a9fcc0d68729ca68891325f0e12fabec8bf91ecae66774639000c5c8a2a56245148a0bfd1678d6906fb248b2530a01b314ff43bde39dc3bae235994910b750d69f08366ca6b52142be16ba346834bce4c926a20cb7ed15451d8468cc4ba03ecdfce28919ed2bd342601fb5ef31144a918a604ccb064a76de08c6064d38114b8b238efcbd2cc44d69bef810d60229d7af93ea99883a170fcd1c9b9b5956148f05756d01adbde48cf0dba9087f72f325d6ee5cb7958e848acae0ecbe65295e5a3bbffc6d2d6597a9d744399e5bed0c786ae560d96e8dbea39d834c3e248da00d05408c623032f2ec369735b9476087ed19c6d212d1a8b143420198704c20461aa7682a5603ab6eab7b6eb7a5dce5be39d4be50ac4c9c31a14e90872499c4d60148eb683d6e359db62b890de51fc15f25c96918cd2ef695378eb994e545b55687334bf7f3487c3957c8a2c6850f7c09234de74d0d663d13e12a296bb81d57a7d3d23529717da9afc2ed0976f61cf92302323d05d0e23d83d01ac00a5817f88f6ae67d22e4b328d29aa32cc96718898fbd9157a8208a8bc5428725ef408b35ecd0a0d0da5d2b79c7e73cb10906d1f484be529df7d7397e765ed0927c9f869684a18aaed56ee06dc8f9f16d0a3092cc67cb037b6c16528e1925a4d65f29cdc6ae18af9fb3aeab2f9ce8f34a601939c902fbbb614a7673fe547990bfd87e8dab9f9d485303c3d2657a1e8f07379a0b777b18cb0de1106b0b5e96fabebcf2993cbb0832514143e0f28f86d3ba7779db620481c32e39460e945923b05ce7f4de9bd8e19f6ca09d5014bcb99a8f84819ffd22737b1ca9e97fee93c89d3984ba616843dfcd4ab813949ff78c6a4d5f5ca94cf3946fdb43e467e51e0352fdcf4f98b26b7816cc3902e75b04143fcd08ccab21fa427fe5c0e0c850fc9d8ce8c61287dfea565c998e14d73fbd18009de023b8cfe2d199c782e715189f1d04b119d552823352ab352701b45541b8bef0485bc09ad1263bfaeba0653ae4a702b7635778a407f2ee9278194326db72d49cf7352bf79e4dbc9a294bd8b22f69f59ed5b96f4e4818711862e834587b455539c857f180c1768ba50a994266f0450f6bc59cb369c1b6c8c77b1e8602b525eb245d08df95b515fda33abfd1af962d1a1ff8abf77b6f19d25f907988f1708fcaf6062f656678f2b8618f824601680ecb22ffd0b1e607c9eb9572bd84ee8a1f3744df51a01fa2289e1de704bfd631461cf171f9118f5e3c8fd808b219f59b499c50d2ef00e7d834e13f8968097c8292ddc4a25e7201a93d8e67d9095cf1a8b540436dc59e90f3384d99a6f441fb20e7416c560d7b60a3c506c348f080c4db8c167ba726de8594658fb106093f48255c78c94860445005c7936edfaed947d587d3cc2e8be0f861994a96b2f2a5086952a8c3dd826b18c84f2e86f754b5a0a95c1b0ea5b7bde40caaa668ff9c56aab75be7c1c94efe86325c156103faf71b60f1a209ac58692b34d52234edddac9f285a0c4a5e2acf7dae54b5a151d5df7e8899677a2922650a671a7b1cc60467dd7b014fa37493daf503c155bc3561e7c02fe715f2bd0b482cfed2d7ccb5ddc8d38584dde437689e6b27e479ef61d7f74f5d14f0946b4d5b2601216ab92e074673195b967455b17ae9d977a181ccd98cb6262d226256424b9485245a385158f7e0ca35eec50dcf3dd260c07305bd3b8449778b24a0b8ff4a6ef503904ab7a0d5aec82e79e5bb4fe939fdab31c8b3ed64436c65298185e3824e9285ad644fa7ffc5e5526099eeb65bcb5ece32d8bb8a32522069f088e796425dea6216b17e1c6d54cdbe1d24d3f839f146b7dfdd6ab3f1a853664c302d99e9cfac7e4701117935dbc263b91561150c612e1367aa4e20f478020ce7037f8a126dcb5afedeed3a980ed87e284d239870bd12e832ee04fa6ce322d04b080b7624ac7b9f76505587c8e8053f52db9f707519d3c79a52eb3bd07e0960b92aed170e43711587b49f33779d6c6734e93062b8ba3fd370fb32a708c702e451aca3bb17f3ec91e9310412eae4c4f14012330838436e60b9cce5e64781fff18ace26bdeedffb0eee6a0a6d01c58f847c9699da8ea8ab74eb990cc19670e8548f4cc4cc27c17edeeabb20cd69e6d63a39dbdff7e53b7c10fd866d9ca9a87b25a5ce6f7d475f039c57d9ccfd85533971d6468652f6e612f1255fa1fed138d0d429b44ba27dce66d678e5d6a9fc16f4dc2f849071e9ff974fdd26afeac10b63a63fe7a1420d7e0a68ba2aace3396ddabac0c485da92daacf9e1f633a2db416ae37cddf4e18c8d57c941228a6ba5143f0aa21456f9fc56f890f08a5b4ca339e9b748ff23f8aba9ef05fc782087caf8d805ab0745ac94ac9826c6d99a7ea1f036d3d16e1ba57d2fd4aaf0470f9a8483d84287c6308eb02bb5325e1e92fbd30adbdae40d2d8b352716463d6f9abec9cd06cdd5c236c51906b474ee404201ac6eda8028e7e3e4f08fca163e09a04344bfcc8ed8d4fe4fb601392060b784bd839013f89c801e1b9c6a6fd6495eef558d63de69faa39d9d4fb81f869215155146fcee6e228f45d0c1fbf9b33bdcf0879da9674ab9e4f434ec7b79989f3cd34aed587c1e5db57822c07c8534a41cdeafb0a65dc4301e9e0d1d5c3c4d3165b4df4559d7cb33a86ad8388d3cb3ab5002a0f7990f781850c63ed2c3353796abd67c03f87a7b3acfae40c998d54f9211f38128659d92dcaa143069c9bd46a04a99250fdcf5cf191a81681a50079705a404327d8a7e6f1104f68c5280081788f5416c7da754135a834c652b2bbb3b92a3966be3e84a3ea6738d929508eeb099189b7b3cc32dbff8c2d935089a2c4c297d83b9af18c60f79595a9caf20633b1160a0a90a47941e2b7c9016339293125164ca7f924881641adf98466f0adb19933f3526e78d55692821617c7d3ab6fde09c722716d6815af4bc69c4796d70d54c48ae96f885fde6978ea12bf66b4a6443cffa3d21c392b5fa3dbd5d6e4c9d82cb11b978482bdc0392af9be55c10f884170e633a328edbae11c9fb61ce5b7e62035d5ed3e9c87d293c63f3440d3999ae2d7d45d28308c4aa0fdb41883050d8a27641fcc48c8c0bdd7a7dec11ae642277614d3dc282da87c6839ef51432b759f98d4956ef83e87dfb3d15e67319ba59493a0360e670bcb1f627b18d38bc23bcbbb5ede04995cd9f832dda6c293c840eeb28c9a0666404d8d8c74e7f6de1a0c0e325b3fc35b9d5eca76d84fec7cc83db5382110b352ce28a2be46bfb5031f8d4e130e460ad8a7e236561486acd7d854108892dfdfee3fe4b3b2b5ee67a8331afa53e32ae2e85e156aa42d8a15a544383bedeec8be346c504d6cb95ce572d3f8bab1bd87d7ddd45bc3f36084949c7ce12d6d1aa7736ec2685d6a7304cdb9d6b979a993c6faa2710ecfe3d579acd5db80eba4f03e4ec7d4113370e2098efbf86c238daf0b8233b0f27126f77fe0204c5958ccf44e1ad7aea504bec187af97ddaa163dd262c732c5aa5cb6efe673da17f7af5599fea4e888360864c0344c9464ee1fff5107f74defb27fcc5d5f246c181635ecda97f18af33606c2d321ac5e2f9cabf25c1eea03369c3e1f348a689cde937c69739e669b028450dac54115157d49b6458c37d88dc80f5e4af20c1268bed246784d7405485c4acc9e8fedb0fc66c35da2124992ab211be43fe0493ef14bf8dd912c1ec4d474bf0c003ad75508ab78e951f8f95962aead330536babf1f9b051dd1fd6481fb65ea9d70ece5eb844a2e7a61606c15eb4418fbdf818bcca16545988371b537670a87be1ba972c142ade9d5af2ed9aed627b37aab5bf5c8f4b09eb1608c53de9e6cdb511501cd56c4e9248509e78cd29d946ede2fb77fdc71a766ec87240505ef20808b7856a5035891fe18e52a863d41705ac9cea4f5751f2effd0f6d4af3027da3a537c8076e32a7aa33d990ba7e0b94bb00daea1953b93a15713c0c5394718abb205770f86ce94117e2c50fee196a522e13721392c72b1ba12dd577b9b9ee359e772d962c598d4a4898da557510e6121547daa455281783d5476e93d19b0d2f9afa75926d62758fd592a38d0ef7961333f35e55026541d4561b00a62ab4c278b506c7ac4ebbedfacea182c18073d28dd9c41b2f799bdc3d85ab60d40405b54d0f7cab1cee833ffbc5f997bad549e967d752beca6be18057be8d7c478ed0d1a277520330740679bec6a4f6ee86430b2fa2fcfb29a956ad2a51792a0b05afa9406f1d951338538b32b20107f4d1ea776fef06361f1027bded97ca20823794e", 0x1000, 0x9}], 0x101002, &(0x7f00000012c0)='userselfeth0!\x00') 11:23:59 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c1", 0x7e, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:24:00 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@remote, @in=@loopback}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) 11:24:00 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:00 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c1", 0x7e, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:24:00 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f0000000080)=""/7, &(0x7f00000000c0)=0x7) 11:24:00 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:00 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) [ 812.231011][T29332] device bridge_slave_1 left promiscuous mode [ 812.237198][T29332] bridge0: port 2(bridge_slave_1) entered disabled state [ 812.291122][T29332] device bridge_slave_0 left promiscuous mode [ 812.297353][T29332] bridge0: port 1(bridge_slave_0) entered disabled state [ 813.050585][T29332] device hsr_slave_0 left promiscuous mode [ 813.120409][T29332] device hsr_slave_1 left promiscuous mode [ 813.180188][T29332] team0 (unregistering): Port device team_slave_1 removed [ 813.190476][T29332] team0 (unregistering): Port device team_slave_0 removed [ 813.200426][T29332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 813.243541][T29332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 813.323112][T29332] bond0 (unregistering): Released all slaves [ 813.457594][T31078] IPVS: ftp: loaded support on port[0] = 21 [ 813.511168][T31078] chnl_net:caif_netlink_parms(): no params data found [ 813.570488][T31078] bridge0: port 1(bridge_slave_0) entered blocking state [ 813.577589][T31078] bridge0: port 1(bridge_slave_0) entered disabled state [ 813.589413][T31078] device bridge_slave_0 entered promiscuous mode [ 813.597074][T31078] bridge0: port 2(bridge_slave_1) entered blocking state [ 813.607948][T31078] bridge0: port 2(bridge_slave_1) entered disabled state [ 813.615888][T31078] device bridge_slave_1 entered promiscuous mode [ 813.638761][T31078] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 813.654133][T31078] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 813.678832][T31078] team0: Port device team_slave_0 added [ 813.687687][T31078] team0: Port device team_slave_1 added [ 813.752810][T31078] device hsr_slave_0 entered promiscuous mode [ 813.792438][T31078] device hsr_slave_1 entered promiscuous mode [ 813.832167][T31078] debugfs: Directory 'hsr0' with parent '/' already present! [ 813.849489][T31078] bridge0: port 2(bridge_slave_1) entered blocking state [ 813.856563][T31078] bridge0: port 2(bridge_slave_1) entered forwarding state [ 813.863899][T31078] bridge0: port 1(bridge_slave_0) entered blocking state [ 813.870951][T31078] bridge0: port 1(bridge_slave_0) entered forwarding state [ 813.918466][T31078] 8021q: adding VLAN 0 to HW filter on device bond0 [ 813.935781][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 813.948874][T17139] bridge0: port 1(bridge_slave_0) entered disabled state [ 813.957452][T17139] bridge0: port 2(bridge_slave_1) entered disabled state [ 813.975594][T31078] 8021q: adding VLAN 0 to HW filter on device team0 [ 813.991886][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 814.004999][T17139] bridge0: port 1(bridge_slave_0) entered blocking state [ 814.012149][T17139] bridge0: port 1(bridge_slave_0) entered forwarding state [ 814.043945][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 814.053085][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 814.060120][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 814.069711][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 814.082647][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 814.091612][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 814.099942][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 814.110046][T31078] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 814.118205][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 814.134206][T31078] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 814.142323][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 814.149868][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 814.256059][T31086] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 11:24:03 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c1", 0x7e, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:24:03 executing program 2: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x4}, 0x38a}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r2 = fcntl$dupfd(r0, 0x0, r1) getsockopt$inet_mreqsrc(r2, 0x0, 0x28, &(0x7f0000000040)={@initdev, @dev, @remote}, &(0x7f0000000080)=0xc) 11:24:03 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000000)=0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f0000000100)={0x2, 0x401}) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x1) 11:24:03 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:03 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r0, &(0x7f0000000640), 0x4, &(0x7f0000000740)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:03 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f", 0x87, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:24:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x3, 0x64e}, 0x2de) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:04 executing program 5: times(&(0x7f0000000000)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0xffffffffffffffc9) 11:24:04 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:04 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:04 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) gettid() r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x0, 0x20000000}, 0xff10}, 0x48) r1 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f00000000c0)={'icmp\x00'}, &(0x7f0000000100)=0x1e) 11:24:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f", 0x87, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:24:04 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:04 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) pivot_root(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') 11:24:04 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='\x00', 0x1, 0x1) 11:24:04 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:04 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:04 executing program 5: r0 = syz_open_dev$midi(&(0x7f0000000000)='\x00T0\x8c\x0e\x00', 0x10000, 0x426a82) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, r0, 0x2}, 0xffffffffffffff0d) open(&(0x7f0000000080)='./file0\x00', 0x200, 0x80) 11:24:04 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f", 0x87, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:24:04 executing program 2: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:05 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) 11:24:05 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:05 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a", 0x8c, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) [ 816.870994][T29332] device bridge_slave_1 left promiscuous mode [ 816.877205][T29332] bridge0: port 2(bridge_slave_1) entered disabled state [ 816.931221][T29332] device bridge_slave_0 left promiscuous mode [ 816.937502][T29332] bridge0: port 1(bridge_slave_0) entered disabled state [ 817.650827][T29332] device hsr_slave_0 left promiscuous mode [ 817.730425][T29332] device hsr_slave_1 left promiscuous mode [ 817.806374][T29332] team0 (unregistering): Port device team_slave_1 removed [ 817.821032][T29332] team0 (unregistering): Port device team_slave_0 removed [ 817.836388][T29332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 817.868905][T29332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 817.952557][T29332] bond0 (unregistering): Released all slaves [ 818.067992][T31583] IPVS: ftp: loaded support on port[0] = 21 [ 818.121087][T31583] chnl_net:caif_netlink_parms(): no params data found [ 818.148976][T31583] bridge0: port 1(bridge_slave_0) entered blocking state [ 818.156145][T31583] bridge0: port 1(bridge_slave_0) entered disabled state [ 818.164074][T31583] device bridge_slave_0 entered promiscuous mode [ 818.171578][T31583] bridge0: port 2(bridge_slave_1) entered blocking state [ 818.178750][T31583] bridge0: port 2(bridge_slave_1) entered disabled state [ 818.186709][T31583] device bridge_slave_1 entered promiscuous mode [ 818.204200][T31583] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 818.215391][T31583] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 818.234732][T31583] team0: Port device team_slave_0 added [ 818.295066][T31583] team0: Port device team_slave_1 added [ 818.362884][T31583] device hsr_slave_0 entered promiscuous mode [ 818.420773][T31583] device hsr_slave_1 entered promiscuous mode [ 818.460335][T31583] debugfs: Directory 'hsr0' with parent '/' already present! [ 818.479490][T31583] bridge0: port 2(bridge_slave_1) entered blocking state [ 818.486665][T31583] bridge0: port 2(bridge_slave_1) entered forwarding state [ 818.494003][T31583] bridge0: port 1(bridge_slave_0) entered blocking state [ 818.501071][T31583] bridge0: port 1(bridge_slave_0) entered forwarding state [ 818.547754][T31583] 8021q: adding VLAN 0 to HW filter on device bond0 [ 818.565215][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 818.577676][ T8042] bridge0: port 1(bridge_slave_0) entered disabled state [ 818.587190][ T8042] bridge0: port 2(bridge_slave_1) entered disabled state [ 818.606220][T31583] 8021q: adding VLAN 0 to HW filter on device team0 [ 818.617944][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 818.626976][ T8042] bridge0: port 1(bridge_slave_0) entered blocking state [ 818.634096][ T8042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 818.655626][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 818.667315][T14128] bridge0: port 2(bridge_slave_1) entered blocking state [ 818.674385][T14128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 818.697973][T31583] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 818.712810][T31583] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 818.728554][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 818.742441][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 818.752485][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 818.761609][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 818.770204][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 818.778081][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 818.799555][T31583] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 818.807288][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 818.815363][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 11:24:08 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:08 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) 11:24:08 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x9}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2c, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000100)={0x3, [0x0, 0x0, 0x0]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x5, 0x24, &(0x7f0000000640)=ANY=[@ANYBLOB="406d39a2125f36421480117dcb915551ae76e92e350675560f08eba1e4b69b937fe26574104b02082f6d7bad2aae37db21770b215194a69744d4d4fcfb28825c251a3bd7a57ace34ae7eb59cec5e1a135df20ef3d74be3af8c2345f5ef6e243de8930b2c74b6347f5efe47518d68c46e65555546db19371c7488dcb2f52b0dfb010c5442d053588fa51eab4d140931df1768e21f17b8f5", @ANYBLOB="0ed89aee470e015e6dc02e702843835e23a7040a9f0c0cac0b137eabd9c54ffabcf8ac6f55f781588b29d47c2999d6cba31efb3c5f1d694a780934d9e3ed44674d770a3ac9725f341f4eba57a9d3d235c2cd8a2338e38c3a9805b9512e1d4c993d776a79697839fc86", @ANYRESOCT=r6, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES64=r2, @ANYRES64=r3], @ANYRES32=r5], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x9, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x1}, 0x10}, 0x70) r8 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0xa0083, 0x0) ioctl$RNDCLEARPOOL(r8, 0x5206, &(0x7f00000000c0)=0xffffff09) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r7}, 0x10) 11:24:08 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000000), &(0x7f0000000100)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x2, 0x0) 11:24:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a", 0x8c, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) [ 818.919497][T31591] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 11:24:08 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) r0 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400010}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r1, 0x8, 0x70bd2d, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x14, 0x18, {0x0, @bearer=@udp='udp:syz0\x00'}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x889}, 0x20002834) 11:24:08 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) 11:24:08 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a", 0x8c, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:24:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x10200, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f0000000100)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:08 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:08 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) 11:24:08 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a1341", 0x8e, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:24:08 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f00000002c0)={0x0, 0xf0ffff, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r3, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x3, 0x18, {0x0, @link='broadcast-link\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00'}}}}, 0x3b2}}, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1c0}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r3, 0x400, 0x70bd28, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20002081}, 0x4000) utimensat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x0, 0x2710}}, 0x100) 11:24:08 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:09 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:09 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='mounts\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, r0, 0x2}, 0x10) 11:24:09 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:09 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x400200, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f00000000c0)={r1, 0x0, 0x1, 0x7, 0x7}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) 11:24:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a1341", 0x8e, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:24:09 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) fcntl$setlease(r0, 0x400, 0x0) 11:24:09 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:09 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a1341", 0x8e, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:24:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$KVM_S390_VCPU_FAULT(0xffffffffffffffff, 0x4008ae52, &(0x7f0000000080)=0x200) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:10 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x100, 0x0) write$FUSE_LSEEK(r0, &(0x7f0000000080)={0x18, 0xffffffffffffffda, 0x1, {0x3}}, 0x18) [ 821.720739][T29332] device bridge_slave_1 left promiscuous mode [ 821.727189][T29332] bridge0: port 2(bridge_slave_1) entered disabled state [ 821.780989][T29332] device bridge_slave_0 left promiscuous mode [ 821.787299][T29332] bridge0: port 1(bridge_slave_0) entered disabled state [ 822.550697][T29332] device hsr_slave_0 left promiscuous mode [ 822.590686][T29332] device hsr_slave_1 left promiscuous mode [ 822.648287][T29332] team0 (unregistering): Port device team_slave_1 removed [ 822.659499][T29332] team0 (unregistering): Port device team_slave_0 removed [ 822.673745][T29332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 822.714504][T29332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 822.772918][T29332] bond0 (unregistering): Released all slaves [ 822.868093][T32092] IPVS: ftp: loaded support on port[0] = 21 [ 822.920307][T32092] chnl_net:caif_netlink_parms(): no params data found [ 822.948893][T32092] bridge0: port 1(bridge_slave_0) entered blocking state [ 822.956166][T32092] bridge0: port 1(bridge_slave_0) entered disabled state [ 822.963942][T32092] device bridge_slave_0 entered promiscuous mode [ 822.971996][T32092] bridge0: port 2(bridge_slave_1) entered blocking state [ 822.979223][T32092] bridge0: port 2(bridge_slave_1) entered disabled state [ 822.987650][T32092] device bridge_slave_1 entered promiscuous mode [ 823.005675][T32092] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 823.061962][T32092] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 823.086073][T32092] team0: Port device team_slave_0 added [ 823.092947][T32092] team0: Port device team_slave_1 added [ 823.163151][T32092] device hsr_slave_0 entered promiscuous mode [ 823.210710][T32092] device hsr_slave_1 entered promiscuous mode [ 823.250369][T32092] debugfs: Directory 'hsr0' with parent '/' already present! [ 823.269601][T32092] bridge0: port 2(bridge_slave_1) entered blocking state [ 823.276852][T32092] bridge0: port 2(bridge_slave_1) entered forwarding state [ 823.284216][T32092] bridge0: port 1(bridge_slave_0) entered blocking state [ 823.291368][T32092] bridge0: port 1(bridge_slave_0) entered forwarding state [ 823.336721][T32092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 823.354331][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 823.366074][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 823.376129][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 823.395761][T32092] 8021q: adding VLAN 0 to HW filter on device team0 [ 823.410194][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 823.423592][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 823.430681][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 823.458079][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 823.467405][T17139] bridge0: port 2(bridge_slave_1) entered blocking state [ 823.474485][T17139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 823.489150][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 823.498297][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 823.517362][T32092] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 823.529111][T32092] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 823.542134][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 823.550180][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 823.558815][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 823.567522][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 823.589952][T32092] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 823.598488][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 823.607128][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 823.738780][T32100] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 11:24:13 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:13 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:13 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$rfkill(r2, &(0x7f0000000080)={0xffff, 0x9, 0x3}, 0x8) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125", 0x8f, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:24:13 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFPFLAGS(r4, 0x8934, &(0x7f00000004c0)={'team_slave_0\x00', 0x80000000}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') preadv(r8, &(0x7f00000017c0), 0x1000000000000304, 0x400000000100) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r8, 0x4008642b, &(0x7f0000000300)={r9}) ioctl$DRM_IOCTL_DMA(r7, 0xc0406429, &(0x7f0000000200)={r9, 0x4, &(0x7f0000000100)=[0x1, 0x0, 0x0, 0x7f], &(0x7f0000000140)=[0x2, 0x1, 0x2, 0xca, 0x5, 0x7], 0x10, 0x8, 0x5, &(0x7f0000000180)=[0x4, 0x7fffffff, 0xff, 0xf501, 0x7fff, 0xfffff893, 0x100, 0x3], &(0x7f00000001c0)=[0x7ff, 0x401, 0x468c16b2, 0x7, 0x575]}) sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x62b638f5a109d92d}, 0xc, &(0x7f0000000400)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="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"], 0x328}, 0x1, 0x0, 0x0, 0x24004000}, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000480)=0x4, 0x4) 11:24:13 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125", 0x8f, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:24:13 executing program 4: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x8f645db783cb2d77, 0x0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f00000000c0)) 11:24:13 executing program 5: 11:24:13 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125", 0x8f, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:24:13 executing program 5: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x10000000016, &(0x7f0000000200)) ptrace(0x10, r0) ptrace$poke(0x4, r0, &(0x7f0000000000), 0x0) syz_open_procfs(r0, &(0x7f0000000000)='autogroup\x00') r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xfffffffffffffff8, 0x65ecf866e2d8fe2b) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, r1, 0x2}, 0x1b6) 11:24:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1ff}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000100)={r2, 0x8}, 0x8) 11:24:13 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:13 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:13 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) 11:24:14 executing program 5: syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x0, 0x4, 0x7fff}, 0x5a}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x2c2000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@remote, 0x101, 0x0, 0xff, 0x1, 0x20, 0x7}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={0x0, r1, 0x2}, 0xffffffffffffff88) 11:24:14 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000100)={0xa, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:24:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x3, 0x2) alarm(0x8) openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x202002, 0x0) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x5c001) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='io.stat\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={0x0, r1, 0x2}, 0xfffffffffffffe44) 11:24:14 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2c, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:14 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) 11:24:14 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:14 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:24:14 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:14 executing program 0: r0 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) r1 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@ipv4={[], [], @dev}, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f00000002c0)=0xe8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1, &(0x7f0000000380)=ANY=[@ANYPTR64=&(0x7f00000001c0)=ANY=[]], &(0x7f00000000c0)='sy\xee\xe4\x1fG\x8eQN\xe4\x9c$\xbdzkaller\x00\xdf\xcf2vK\xbd\xc9:\x9f\x166M8E\xcf\xadg\x95\x05\xa7H\xf2jW{\xd1\xca\x14\x1cx\xaa\x10\xf8\x8d\xc8L\xae\x81\xfa\xa1\'\xaer\xcf\x10\a\xea\xe5\xec\xdf?HO\fP\xb6R\x04A\xb6\x12$o\x01\x00\x00\x00\xab\x8f\xd5\xea\x9a\xc5[\x9eDb\xdb\x1a\xb3_\x97<\xd9[\x85\xd7e\x06\x11\xd7\xd8\xdc\xf1Y\x84\xecV6\x99!W\xf3\xed\xc4\x1a<\xa5\x18\xed\xb8_\xd7\x94\xbd\xd5u\xfe1\xa0\'\x82\xafH:\x02\x9b\xe3\xfcZF\x18\xefy\xd6\x19\xa7\xda\xb1\xc4\xd4\xd9>5\xc6\xdd\xd3\x97\xc1h\x18\x1c\xba\xb7\xd3W\x90\xb5\x1e\"0\x10f\b\xbd\xb1\xe2s\xdcO\xe5\x0f>\x8f?\x91\x1d9\x05\x00\x1b', 0x0, 0x0, 0x0, 0x21880, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r3}, 0x10) 11:24:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x8, &(0x7f0000000080)=@raw=[@alu={0x4, 0x1, 0x6, 0x2, 0x0, 0xffffffffffffffad, 0xfffffffffffffff3}, @ldst={0x2, 0x1, 0x3, 0x0, 0x2, 0xfffffffffffffecc, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x10001}, @call={0x85, 0x0, 0x0, 0x69}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xfffffffe}, @jmp={0x5, 0x0, 0x6, 0x0, 0x9, 0xfffffffffffffff8, 0x8}], &(0x7f00000000c0)='GPL\x00', 0x0, 0xb2, &(0x7f0000000100)=""/178, 0x41000, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x4, 0x20, 0x4}, 0x10}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={0x0, r1, 0x2}, 0xfffffe35) 11:24:14 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) 11:24:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2150065c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, &(0x7f0000000080)=r2) 11:24:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:15 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, &(0x7f00000003c0)) 11:24:15 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) setsockopt$ALG_SET_AEAD_AUTHSIZE(0xffffffffffffffff, 0x117, 0x5, 0x0, 0x1) 11:24:15 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x0, &(0x7f00000003c0)) 11:24:15 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000080)={0x6, 0x7}, 0xc) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000180)='./file0/file0\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) eventfd(0x13f5b197) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f00000000c0)=0x1) [ 826.731905][ T472] erofs: (device loop1): erofs_read_superblock: cannot find valid erofs superblock [ 827.281155][T11423] device bridge_slave_1 left promiscuous mode [ 827.287741][T11423] bridge0: port 2(bridge_slave_1) entered disabled state [ 827.341087][T11423] device bridge_slave_0 left promiscuous mode [ 827.347335][T11423] bridge0: port 1(bridge_slave_0) entered disabled state [ 828.060641][T11423] device hsr_slave_0 left promiscuous mode [ 828.110474][T11423] device hsr_slave_1 left promiscuous mode [ 828.167884][T11423] team0 (unregistering): Port device team_slave_1 removed [ 828.179339][T11423] team0 (unregistering): Port device team_slave_0 removed [ 828.190883][T11423] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 828.215225][T11423] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 828.297302][T11423] bond0 (unregistering): Released all slaves [ 828.446995][ T480] IPVS: ftp: loaded support on port[0] = 21 [ 828.498894][ T480] chnl_net:caif_netlink_parms(): no params data found [ 828.526447][ T480] bridge0: port 1(bridge_slave_0) entered blocking state [ 828.533610][ T480] bridge0: port 1(bridge_slave_0) entered disabled state [ 828.541446][ T480] device bridge_slave_0 entered promiscuous mode [ 828.548715][ T480] bridge0: port 2(bridge_slave_1) entered blocking state [ 828.555923][ T480] bridge0: port 2(bridge_slave_1) entered disabled state [ 828.564141][ T480] device bridge_slave_1 entered promiscuous mode [ 828.582587][ T480] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 828.665792][ T480] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 828.687194][ T480] team0: Port device team_slave_0 added [ 828.693963][ T480] team0: Port device team_slave_1 added [ 828.782948][ T480] device hsr_slave_0 entered promiscuous mode [ 828.854541][ T480] device hsr_slave_1 entered promiscuous mode [ 828.910282][ T480] debugfs: Directory 'hsr0' with parent '/' already present! [ 828.929315][ T480] bridge0: port 2(bridge_slave_1) entered blocking state [ 828.936399][ T480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 828.943688][ T480] bridge0: port 1(bridge_slave_0) entered blocking state [ 828.950729][ T480] bridge0: port 1(bridge_slave_0) entered forwarding state [ 828.998177][ T480] 8021q: adding VLAN 0 to HW filter on device bond0 [ 829.014236][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 829.027412][ T8009] bridge0: port 1(bridge_slave_0) entered disabled state [ 829.036004][ T8009] bridge0: port 2(bridge_slave_1) entered disabled state [ 829.054619][ T480] 8021q: adding VLAN 0 to HW filter on device team0 [ 829.070203][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 829.078804][ T8009] bridge0: port 1(bridge_slave_0) entered blocking state [ 829.085858][ T8009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 829.101781][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 829.114408][ T8009] bridge0: port 2(bridge_slave_1) entered blocking state [ 829.121485][ T8009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 829.142876][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 829.152454][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 829.161356][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 829.173351][ T480] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 829.185061][ T480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 829.194505][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 829.203352][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 829.221967][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 829.229435][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 829.239337][ T480] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 829.373747][ T488] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 11:24:18 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:18 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x0, &(0x7f00000003c0)) 11:24:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x80201) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, r1, 0x2}, 0x801f) 11:24:18 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f0000000540)=ANY=[@ANYRES16=0x0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0xffffffe5) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:18 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:18 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000600), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000280)={0x6c4c, 0x0, [], {0x49b2f9c1dc8a5e81, @reserved}}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0xc100, 0x0) recvmsg$kcm(r3, &(0x7f00000001c0)={&(0x7f00000000c0)=@nfc, 0x80, &(0x7f0000000140)=[{&(0x7f0000000500)=""/243, 0xf3}], 0x1, &(0x7f0000000180)=""/13, 0xd}, 0x22) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:18 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) [ 829.647261][ T498] erofs: (device loop1): erofs_read_superblock: cannot find valid erofs superblock 11:24:18 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6]}, 0x5c) 11:24:18 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x1) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x600, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x125000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={0x0, r1, 0x2}, 0x8) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/82, 0x52) 11:24:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x0, &(0x7f00000003c0)) 11:24:19 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:19 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6]}, 0x5c) 11:24:19 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) [ 830.065464][ T719] erofs: (device loop1): erofs_read_superblock: cannot find valid erofs superblock 11:24:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x16, 0x1e, &(0x7f0000000380)=ANY=[@ANYRESDEC=r0], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x10000000}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r2 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r4, 0x5502) pipe(&(0x7f0000000140)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r5, 0x29, 0x45, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) ioctl$EVIOCREVOKE(r2, 0x40044591, &(0x7f0000000100)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000000)={0x0, r2, 0x2}, 0x6d8d327aa50d231) 11:24:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x400) sendmsg$nfc_llcp(r3, &(0x7f00000008c0)={&(0x7f00000002c0)={0x27, 0x1, 0x2, 0x308324610176cec2, 0x1, 0x1f, "aa7f763d45836eca1e5576cb604913c1fb498d0ca83d901c00f0cc48821e933c24f2ff2534bc89716e0035a867c55a04784ffd8941cbc4c107c5443abc1d4e", 0x15}, 0x60, &(0x7f00000007c0)=[{&(0x7f0000000500)="f319d4caee92a3b9d1ebd9a1a07e61124a2ba064607f7bb0db1269794451ca76dde2a694dc6c98d702644c2b55ff3e93a3d7733e3ec3e9bb1fe3b6b23131a8fd8c6fa71b832be9e7b06dd53ee597366576548317ba859631f8e970c3b7d3c129dfcdce179505ef6a04cd2f03ed21303f3adcc092c17fabd7ee3fea0404de", 0x7e}, {&(0x7f0000000580)="986d73da24cf3e1d11b3b6b079e59d3adfe8cff23599d10912156731a81f771eea35135a7e9bc6b17d74494c8f788bef41b0ec95a3aab2529e7271bdfa6700f36317b14ffa683521c1b2a301b1e252301fcfca54f199a1640eb62f85", 0x5c}, {&(0x7f0000000600)="10d68bb5801093af9779365b01d5f21182826df50bb5ab255c722d17e3caf7fa9c1dbd0f512fe0c981d5022b790a40053ba90aefb7d50b02d8b3e62a63d134ed85645ec508ddee85b5ae894f2a03a884c40071171f0b87ee0e62419a93cfebccc6a803db7288d8f219521af365a795e2456ebcc8258f6f5062f4188160d109eca4d1c1cc59fedf43f5b6801c67b4462550d022f2fce2208faf9b1660014a0d1e3ee2a9dfd61778435833b1169877862be21c", 0xb2}, {&(0x7f00000006c0)="f33efeeda4a77af1760b11e80b2c9669f1a49a45991f80d4f991a8725c85e421d6bc67b826f4b3b5fdc36f8a980da172e11612e2e903c5462af105a0e0a1dcc967f7d5d290119a0dac1b085bf218470e042f279505ec5c8975e572e7c48ae59933d49e0107550dd45ff0ebb2183a2256ed011a74b3eba74d1be04d51f7dd4e2cfcae5607c75870f69860b6d09bf31eb0b21e990e80f1764763", 0x99}, {&(0x7f0000000780)="0782f2022dcfedaae96a13c09904de2c2cc6cc1c985a8477502d055b9b95300682c5520c448f2e255f0e191d3c2688fc1939ab5ac8", 0x35}], 0x5, &(0x7f0000000840)={0x58, 0x110, 0x4, "36214bd4aeba565f30c56e322b2308f764ff5f94b922f4fcc76c5f40deb1f6b220e7a3bfd397270ee6e3484074139b8937f73883daee6cc3e38d1128db82656b22e61c0023"}, 0x58, 0x4020}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRESOCT, @ANYRES16=0x0, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRESDEC=r1, @ANYRESHEX=r2, @ANYRESDEC, @ANYPTR64], @ANYRES32=r0, @ANYRES64, @ANYRES32=0x0, @ANYPTR64]], &(0x7f0000000340)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x408000}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000}, 0x10}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r4}, 0x10) 11:24:19 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:19 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, 0x0) 11:24:19 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$GIO_UNIMAP(r2, 0x4b66, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{}]}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:19 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, [0x0, 0x5, 0x1, 0x100, 0x1000]}, 0x5c) 11:24:19 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, 0x0) 11:24:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x200, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap$usbfs(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000002, 0x810, r4, 0x7c0000000) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={0x0, r1, 0x2}, 0xd91ca713c15c8258) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000140)=@v2={0x2, @aes128, 0x1, [], "ef958c319d64ac8bc37c988af83a6715"}) 11:24:20 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, [0x0, 0x5, 0x1, 0x100]}, 0x5c) 11:24:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2d9, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x1}, 0x8, 0x10, &(0x7f0000000140)={0x0, 0xa, 0x401}, 0x10}, 0x70) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r2, &(0x7f0000000100)={0x2, 0x4e21, @multicast1}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0x1, 0xfffffffa, 0x5, 0x24, 0xffffffffffffffff, 0x3c3, [], 0x0, 0xffffffffffffffff, 0x3, 0x3}, 0x3c) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000000c0)=r3, 0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:20 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$erofs(&(0x7f0000000140)='erofs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000380)=[{&(0x7f0000000200)="845d961a6403850c75760c081cf11f8deb8f7319e5e9ffeba8d53530148bc89afc5db03552513df96989eb7e47a21ae4272bd2aa5f3e402339c98a2ae85dc3a6f04e7e37b64e481ce10dda11864d1fce33736149879cb74beffa812f5862b8d7a2939b4ce5693ec83d5120dc3d949fde1df8bd51a0c8da3b8ef30e9001c16dd5303b7cb189763f12f0873b7a134125fc", 0x90, 0x3f}, {&(0x7f00000002c0)="a6181e48ccc4a2c9c5d25748886de4642f7a2a56cc2ea7d0e354f6ac358e2df0ed99d245ec3f0dbb15822e61c2ac56d598719ea1a2eec7631089c0253863747c3fb171a0756000fc7cd9209513e5a28c4a378d4af55c00960e0a15b2cf054a8a65d5dfcc203674f8bbdd4b0fe6b0bed8171018223623fe220fe190c13d63715817d52f95f7262f2e12142a300fa1c21f0a3d6dd70edc7c8b41f7210283d3de", 0x9f, 0x7ff}], 0x2002000, 0x0) 11:24:20 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREAD(r2, &(0x7f0000000080)={0x105, 0x75, 0x2, {0xfa, "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"}}, 0x105) [ 832.180973][T29326] device bridge_slave_1 left promiscuous mode [ 832.187283][T29326] bridge0: port 2(bridge_slave_1) entered disabled state [ 832.230962][T29326] device bridge_slave_0 left promiscuous mode [ 832.237230][T29326] bridge0: port 1(bridge_slave_0) entered disabled state [ 832.990618][T29326] device hsr_slave_0 left promiscuous mode [ 833.050476][T29326] device hsr_slave_1 left promiscuous mode [ 833.098582][T29326] team0 (unregistering): Port device team_slave_1 removed [ 833.109971][T29326] team0 (unregistering): Port device team_slave_0 removed [ 833.121424][T29326] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 833.177613][T29326] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 833.251421][T29326] bond0 (unregistering): Released all slaves [ 833.357537][ T1199] IPVS: ftp: loaded support on port[0] = 21 [ 833.410998][ T1199] chnl_net:caif_netlink_parms(): no params data found [ 833.437386][ T1199] bridge0: port 1(bridge_slave_0) entered blocking state [ 833.444596][ T1199] bridge0: port 1(bridge_slave_0) entered disabled state [ 833.452755][ T1199] device bridge_slave_0 entered promiscuous mode [ 833.510428][ T1199] bridge0: port 2(bridge_slave_1) entered blocking state [ 833.517527][ T1199] bridge0: port 2(bridge_slave_1) entered disabled state [ 833.529315][ T1199] device bridge_slave_1 entered promiscuous mode [ 833.552286][ T1199] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 833.567188][ T1199] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 833.591844][ T1199] team0: Port device team_slave_0 added [ 833.598675][ T1199] team0: Port device team_slave_1 added [ 833.666669][ T1199] device hsr_slave_0 entered promiscuous mode [ 833.711076][ T1199] device hsr_slave_1 entered promiscuous mode [ 833.780321][ T1199] debugfs: Directory 'hsr0' with parent '/' already present! [ 833.799397][ T1199] bridge0: port 2(bridge_slave_1) entered blocking state [ 833.806550][ T1199] bridge0: port 2(bridge_slave_1) entered forwarding state [ 833.813937][ T1199] bridge0: port 1(bridge_slave_0) entered blocking state [ 833.821039][ T1199] bridge0: port 1(bridge_slave_0) entered forwarding state [ 833.867551][ T1199] 8021q: adding VLAN 0 to HW filter on device bond0 [ 833.885235][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 833.897132][ T8009] bridge0: port 1(bridge_slave_0) entered disabled state [ 833.906917][ T8009] bridge0: port 2(bridge_slave_1) entered disabled state [ 833.925077][ T1199] 8021q: adding VLAN 0 to HW filter on device team0 [ 833.939538][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 833.950050][ T8009] bridge0: port 1(bridge_slave_0) entered blocking state [ 833.957148][ T8009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 833.977155][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 833.985950][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 833.993021][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 834.011037][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 834.019989][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 834.031532][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 834.039848][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 834.052055][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 834.066034][ T1199] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 834.087023][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 834.094853][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 834.111021][ T1199] 8021q: adding VLAN 0 to HW filter on device batadv0 11:24:23 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:23 executing program 5: ustat(0x4000000000000006, &(0x7f0000000100)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:24:23 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:23 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, [0x0, 0x5, 0x1]}, 0x5c) 11:24:23 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x20, 0x0, 0x10000001, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x6, 0x1, @u32}]}]}, 0x20}}, 0x0) 11:24:23 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x2, &(0x7f0000000380)=ANY=[@ANYRESHEX=r0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x800}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) 11:24:23 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, [0x0, 0x5]}, 0x5c) 11:24:23 executing program 1: 11:24:23 executing program 5: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, r0, 0x2}, 0x15c) 11:24:23 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:23 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x880, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20000000000000f7, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000000c0)={0xfffffffd}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mq_notify(r2, &(0x7f0000000180)={0x0, 0x7, 0x0, @thr={&(0x7f0000000100)="b1b62cd9776e4eaf8de3beb01ba568ec2b693cbd74d3a626de4a216ab58699d32a62365d0acc5c603ee4d504be7b39375d6d6867c7bbc46839f0e1a7f6800d87ccd3a9", &(0x7f0000000280)="b6e40442669d4857959001a1f464749eb2d36755bf8a76414ff0a0b36718d355475e5fae2e07d591880d40a8c74fbb65e15351aac0ab2ed7e4f45d4b9f6903aa0255f89edcb71da72b8fab71a6caac444e862ce54a57cae300bf65f02d8b208d30970679e67f21193743512e97f8bca4ec9c0463a333d7ecceed537cc9048830bde9db6f0812a7b18949f791a34b4986b914c4a7264e9d85f4bc082b2af38a13fa98"}}) 11:24:23 executing program 1: 11:24:23 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:24 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6]}, 0x5c) 11:24:24 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x5c) 11:24:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xa, 0x0, &(0x7f0000000500)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x2}, 0x10}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:24 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:24 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r2, &(0x7f0000ffc000/0x3000)=nil, 0xd48a5a656600d03e) shmctl$SHM_INFO(r2, 0xe, &(0x7f0000000100)=""/236) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) setsockopt$TIPC_MCAST_BROADCAST(r1, 0x10f, 0x85) r3 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) accept4$tipc(r3, &(0x7f0000000000), &(0x7f0000000080)=0x10, 0x0) 11:24:24 executing program 1: 11:24:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x10000000016, &(0x7f0000000200)) ptrace(0x10, r1) ptrace$poke(0x4, r1, &(0x7f0000000000), 0x0) ioprio_set$pid(0x1, r1, 0x7fff) 11:24:24 executing program 1: 11:24:24 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6]}, 0x5c) 11:24:24 executing program 2: 11:24:24 executing program 1: 11:24:24 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x48, &(0x7f0000000600)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe602cf81dd49c76cb0df87fe596a3aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b626247358199a87659325051fcf1645be270a2f9e1ee7eebdd85d76aa6a84854c7422114f18177ac2e31cee2290f90db07267f3357481b9a3ac9174144c40ebcf8175b6d34c7fe9c68012964a5bf7610c4eb0731726707ef0c91571a04a45e25f93fdb8fe84b62837a0fdd6b34c963d5fff5783ec5bf3bea3f0fb37986b8a2cd94301915d8781d12563745cf6c76173d889577f5c79225a74e5c7a9c652205effb78bac616a6f6f41a19fde3317951cb9c178798c8b8ae30d4dff5ce396cf25472911c0e5ec005b402d22b326f2cf6427f7f8719"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x1ff, 0x4}, 0x10}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:25 executing program 2: 11:24:25 executing program 1: 11:24:25 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, [0x0, 0x5, 0x1, 0x100, 0x1000]}, 0x5c) [ 836.711052][T29332] device bridge_slave_1 left promiscuous mode [ 836.717294][T29332] bridge0: port 2(bridge_slave_1) entered disabled state [ 836.771122][T29332] device bridge_slave_0 left promiscuous mode [ 836.777301][T29332] bridge0: port 1(bridge_slave_0) entered disabled state [ 837.520669][T29332] device hsr_slave_0 left promiscuous mode [ 837.560424][T29332] device hsr_slave_1 left promiscuous mode [ 837.607908][T29332] team0 (unregistering): Port device team_slave_1 removed [ 837.623505][T29332] team0 (unregistering): Port device team_slave_0 removed [ 837.638405][T29332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 837.694677][T29332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 837.753113][T29332] bond0 (unregistering): Released all slaves [ 837.858427][ T1595] IPVS: ftp: loaded support on port[0] = 21 [ 837.911043][ T1595] chnl_net:caif_netlink_parms(): no params data found [ 837.990432][ T1595] bridge0: port 1(bridge_slave_0) entered blocking state [ 837.997543][ T1595] bridge0: port 1(bridge_slave_0) entered disabled state [ 838.005654][ T1595] device bridge_slave_0 entered promiscuous mode [ 838.013354][ T1595] bridge0: port 2(bridge_slave_1) entered blocking state [ 838.020625][ T1595] bridge0: port 2(bridge_slave_1) entered disabled state [ 838.028395][ T1595] device bridge_slave_1 entered promiscuous mode [ 838.047110][ T1595] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 838.058275][ T1595] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 838.078738][ T1595] team0: Port device team_slave_0 added [ 838.089521][ T1595] team0: Port device team_slave_1 added [ 838.173548][ T1595] device hsr_slave_0 entered promiscuous mode [ 838.290606][ T1595] device hsr_slave_1 entered promiscuous mode [ 838.370325][ T1595] debugfs: Directory 'hsr0' with parent '/' already present! [ 838.389551][ T1595] bridge0: port 2(bridge_slave_1) entered blocking state [ 838.396636][ T1595] bridge0: port 2(bridge_slave_1) entered forwarding state [ 838.403939][ T1595] bridge0: port 1(bridge_slave_0) entered blocking state [ 838.411030][ T1595] bridge0: port 1(bridge_slave_0) entered forwarding state [ 838.447169][ T1595] 8021q: adding VLAN 0 to HW filter on device bond0 [ 838.459994][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 838.468609][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 838.476937][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 838.489265][ T1595] 8021q: adding VLAN 0 to HW filter on device team0 [ 838.499667][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 838.508112][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 838.515188][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 838.532209][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 838.540980][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 838.548006][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 838.568847][ T1595] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 838.579546][ T1595] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 838.593727][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 838.603242][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 838.612391][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 838.622358][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 838.631144][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 838.638850][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 838.655677][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 838.663179][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 838.674467][ T1595] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 838.789970][ T1603] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 11:24:28 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r3 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$rds(r3, &(0x7f0000001f00)={&(0x7f00000003c0)={0x2, 0x0, @broadcast}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/73, 0xfffffee2}, {&(0x7f0000000580)=""/11, 0xb}, {&(0x7f00000005c0)=""/30, 0x1e}, {&(0x7f00000000c0)=""/127, 0x7f}, {&(0x7f0000000080)=""/23, 0x17}], 0x5, &(0x7f0000001bc0), 0x106}, 0x0) 11:24:28 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x8}, 0x10}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) 11:24:28 executing program 1: pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rfkill\x00', 0x0, 0x0) write(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) 11:24:28 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, [0x0, 0x5, 0x1, 0x100]}, 0x5c) 11:24:28 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:28 executing program 5: syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x10, 0x24, &(0x7f0000001280)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000001440)=""/4096, 0x0, 0x1, [], 0x0, 0x9d7409e2d5dbd2b, 0xffffffffffffffff, 0x8, &(0x7f0000001180)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000011c0)={0x3, 0xc, 0x47b1, 0x7fff}, 0x10}, 0x70) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000140)='asymmetric\x00', &(0x7f00000000c0)='^bdevwlan0procsecurity\x00') keyctl$unlink(0x9, 0x0, r2) keyctl$instantiate(0xc, r2, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000140)='asymmetric\x00', &(0x7f00000000c0)='^bdevwlan0procsecurity\x00') keyctl$unlink(0x9, 0x0, r1) add_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000013c0)="931fe7fa12126a8fd06fa33fc1a572d916750486ec044f5f6d569be59b3b5a4d10c3fb83f19ed808bb0bb28737fae1295ff71271b63e00953a0ae2c6b8dacb25a33e7abc11412642fe6e9788935d07ee96794177e4", 0x55, r1) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={0x0, r0, 0x2}, 0x10) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfffffffffffffffe, 0x84900) 11:24:28 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, [0x0, 0x5, 0x1]}, 0x5c) 11:24:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, r0, 0x2}, 0xffffffffffffff80) 11:24:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f00000000c0)) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000100)={0x8}, &(0x7f0000000140), &(0x7f0000000280)={r2, r3+30000000}, 0x8) 11:24:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000100)=0x1, 0x4) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r2 = socket$packet(0x11, 0x0, 0x300) sendmmsg$inet(r1, &(0x7f0000003b40)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000001940)="a5", 0xc01}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f0000000600)="da", 0x2501}], 0x1}}], 0x4000000000001cc, 0x4000000) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpeername$packet(r2, &(0x7f0000001780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000017c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000001800)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5c, r4}) 11:24:28 executing program 1: pipe(&(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rfkill\x00', 0x0, 0x0) write(r1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) 11:24:28 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:28 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, [0x0, 0x5]}, 0x5c) 11:24:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x1, 0xe9d4}) 11:24:28 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:28 executing program 5: syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7f, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x8000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, r0, 0x2}, 0x59) 11:24:28 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, 0x5c) 11:24:29 executing program 5: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x1400) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:24:29 executing program 4: sched_getscheduler(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280), &(0x7f0000000040)=0x68) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='sessionid\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) read(r1, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r2, 0x0, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x80003) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000000)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) sendfile(r5, r3, 0x0, 0x8000fffffffe) 11:24:29 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) open$dir(&(0x7f0000000000)='./file0\x00', 0xd34f59c29c2316a9, 0x10) 11:24:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x20000, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x40) 11:24:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x10, 0x2, 0x0) sendto(r2, &(0x7f0000000200)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x5f) recvmmsg(r2, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x4e4}, {&(0x7f00000024c0)=""/4096, 0x1058}, {&(0x7f0000000400)=""/120, 0x78}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x8}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0xf}], 0x8, &(0x7f0000002400)=""/191, 0x1f9}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 11:24:29 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x1) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x600, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', 0x0, 0x8}, 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x125000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={0x0, r1, 0x2}, 0x8) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/82, 0x52) 11:24:29 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x434080, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000080)="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") 11:24:29 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:29 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) [ 841.031785][ T2000] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 841.344893][T29326] device bridge_slave_1 left promiscuous mode [ 841.364081][T29326] bridge0: port 2(bridge_slave_1) entered disabled state [ 841.411035][T29326] device bridge_slave_0 left promiscuous mode [ 841.417233][T29326] bridge0: port 1(bridge_slave_0) entered disabled state [ 842.170629][T29326] device hsr_slave_0 left promiscuous mode [ 842.210387][T29326] device hsr_slave_1 left promiscuous mode [ 842.266901][T29326] team0 (unregistering): Port device team_slave_1 removed [ 842.277092][T29326] team0 (unregistering): Port device team_slave_0 removed [ 842.288146][T29326] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 842.354799][T29326] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 842.431208][T29326] bond0 (unregistering): Released all slaves [ 842.599954][ T2010] IPVS: ftp: loaded support on port[0] = 21 [ 842.656051][ T2010] chnl_net:caif_netlink_parms(): no params data found [ 842.687028][ T2010] bridge0: port 1(bridge_slave_0) entered blocking state [ 842.694330][ T2010] bridge0: port 1(bridge_slave_0) entered disabled state [ 842.702365][ T2010] device bridge_slave_0 entered promiscuous mode [ 842.709892][ T2010] bridge0: port 2(bridge_slave_1) entered blocking state [ 842.716995][ T2010] bridge0: port 2(bridge_slave_1) entered disabled state [ 842.724817][ T2010] device bridge_slave_1 entered promiscuous mode [ 842.778697][ T2010] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 842.793285][ T2010] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 842.817867][ T2010] team0: Port device team_slave_0 added [ 842.827337][ T2010] team0: Port device team_slave_1 added [ 842.906652][ T2010] device hsr_slave_0 entered promiscuous mode [ 842.960732][ T2010] device hsr_slave_1 entered promiscuous mode [ 843.030360][ T2010] debugfs: Directory 'hsr0' with parent '/' already present! [ 843.049582][ T2010] bridge0: port 2(bridge_slave_1) entered blocking state [ 843.056674][ T2010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 843.064024][ T2010] bridge0: port 1(bridge_slave_0) entered blocking state [ 843.071115][ T2010] bridge0: port 1(bridge_slave_0) entered forwarding state [ 843.116815][ T2010] 8021q: adding VLAN 0 to HW filter on device bond0 [ 843.134331][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 843.146622][T17139] bridge0: port 1(bridge_slave_0) entered disabled state [ 843.156502][T17139] bridge0: port 2(bridge_slave_1) entered disabled state [ 843.175443][ T2010] 8021q: adding VLAN 0 to HW filter on device team0 [ 843.191639][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 843.204089][T17139] bridge0: port 1(bridge_slave_0) entered blocking state [ 843.211145][T17139] bridge0: port 1(bridge_slave_0) entered forwarding state [ 843.231361][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 843.240109][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 843.247165][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 843.266908][ T2010] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 843.277490][ T2010] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 843.290043][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 843.299157][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 843.307987][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 843.317235][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 843.325611][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 843.333298][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 843.349975][ T2010] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 843.370010][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 843.377642][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 843.493659][ T2018] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 11:24:32 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:32 executing program 4: sched_getscheduler(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280), &(0x7f0000000040)=0x68) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='sessionid\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) read(r1, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r2, 0x0, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x80003) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000000)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) sendfile(r5, r3, 0x0, 0x8000fffffffe) 11:24:32 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = socket$bt_rfcomm(0x1f, 0x7, 0x3) getsockopt$sock_int(r1, 0x1, 0x5, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 11:24:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000000)={0x0, r0, 0x2}, 0x295f) r1 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) setsockopt$inet_dccp_buf(r1, 0x21, 0xd, &(0x7f0000000100)="297f13d97eff018be52006573ff3a93653bc2b3bcca22109efa23337ff0552bdc114c60594a91f52dab3201793eaefe2d43557535ce93f5b446b8981832b4b5aeafc9513ca3534c0ad1fcc10d9374b9649a2fa02c7d4be4a2cdf3cebd088d4288d8ab3d6634f72bc8d35c3fdbea830f6db3345c06dab999ff236e1728a0f5dda14bba164ac423a4f92395aece979b30d6737a3355dcb1d383cc3f25c8294b974518f5638e998cb0085d2e8b062fb4415636db1de30416a14", 0xb8) 11:24:32 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:32 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:33 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x1, &(0x7f0000000380)=ANY=[@ANYRES64=r2], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x6}, 0x10}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SG_GET_PACK_ID(r5, 0x227c, &(0x7f0000000100)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r8, 0xc0345641, &(0x7f0000000040)={0x10000, "88515e9b670b950bc956faa2ac850361462533d0b5bfd0f99f9d69e862dde73f"}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000100)=@assoc_value, 0x0) r9 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r11 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000076}}, r11, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) waitid(0x2, r11, &(0x7f0000000040), 0x2, &(0x7f00000000c0)) sendmsg$key(r9, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r10, @ANYRESDEC=r11]], 0xfffffffffffffe56}}, 0x20004850) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r10}}, 0x18) write$RDMA_USER_CM_CMD_REJECT(r8, &(0x7f0000000500)={0x9, 0x108, 0xfa00, {r10, 0x6d, "5d6dc0", "943f4bdebd6e37886f29bd1f3b7de326e6e2fcaa3bba8ae5baa3861d4ed0353d5b051c5ee4c9ec60d20a3238d8de171ceda96e64e96dec9b6e046da65a6e3aec8b2803c229b7aa976d1ee20e32c807af0518b75a5d25fb7ac27cb5e000e8ac2ab7227860b3ac477d7617b28989e43fc7ae29de083f1c31d0eb25a743c2d6137ffbaad4a21a562caaf0808394e79588a7c53c9badeeebab80288eba804cc92436751f0aba65369f9dc7a62ecc228fe615ff933e6e8291977ffdd63f0b3dfc755af534f23596a79b31299f3aa151f3919406af97ea529ef15de1f8d5495584937a0819045e100d8b11880152700cb34620e3d2c166b90005118e0b504067b77a34"}}, 0x110) write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0), 0x4, r10, 0x1c, 0x1, @in6={0xa, 0x4e23, 0x0, @mcast2, 0xff}}}, 0xa0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = dup(r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) ioctl$PPPIOCGIDLE(r15, 0x8010743f, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) getsockopt$bt_sco_SCO_OPTIONS(r13, 0x11, 0x1, &(0x7f0000000140), &(0x7f0000000180)) 11:24:33 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x4a0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, r1, 0x2}, 0xfffffffffffffdcf) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) getpeername$ax25(r2, &(0x7f00000000c0)={{0x3, @default}, [@remote, @default, @netrom, @default, @rose, @default]}, &(0x7f0000000140)=0x48) io_setup(0x5, &(0x7f0000000180)=0x0) io_getevents(r3, 0x51, 0x6, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000280)={0x0, 0x989680}) 11:24:33 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:33 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:33 executing program 4: sched_getscheduler(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280), &(0x7f0000000040)=0x68) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='sessionid\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) read(r1, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r2, 0x0, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x80003) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000000)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) sendfile(r5, r3, 0x0, 0x8000fffffffe) 11:24:33 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xfffffffd}, 0x10}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:33 executing program 4: sched_getscheduler(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280), &(0x7f0000000040)=0x68) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='sessionid\x00') syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, 0x0, 0x0) read(r1, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_GET(r2, 0x0, 0x0) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x80003) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000000)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) sendfile(r5, r3, 0x0, 0x8000fffffffe) 11:24:33 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000480)={0x78, 0x0, 0x5, {0x200, 0x6, 0x0, {0x5, 0x0, 0x200, 0x5, 0x100000001, 0x5, 0x0, 0x9, 0x2000, 0x8, 0x8, r1, r2, 0x81, 0x7}}}, 0x78) setfsgid(r2) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:24:33 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) personality(0x410000e) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:34 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f0000000000), &(0x7f0000000080)=0x4) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) [ 846.051192][T29326] device bridge_slave_1 left promiscuous mode [ 846.057460][T29326] bridge0: port 2(bridge_slave_1) entered disabled state [ 846.111108][T29326] device bridge_slave_0 left promiscuous mode [ 846.117414][T29326] bridge0: port 1(bridge_slave_0) entered disabled state [ 846.880587][T29326] device hsr_slave_0 left promiscuous mode [ 846.924173][T29326] device hsr_slave_1 left promiscuous mode [ 846.969049][T29326] team0 (unregistering): Port device team_slave_1 removed [ 846.984322][T29326] team0 (unregistering): Port device team_slave_0 removed [ 846.994806][T29326] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 847.043637][T29326] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 847.112972][T29326] bond0 (unregistering): Released all slaves [ 847.241200][ T2370] IPVS: ftp: loaded support on port[0] = 21 [ 847.244593][ T2368] IPVS: ftp: loaded support on port[0] = 21 [ 847.325406][ T2370] chnl_net:caif_netlink_parms(): no params data found [ 847.378923][ T2370] bridge0: port 1(bridge_slave_0) entered blocking state [ 847.386074][ T2370] bridge0: port 1(bridge_slave_0) entered disabled state [ 847.394245][ T2370] device bridge_slave_0 entered promiscuous mode [ 847.494375][ T2370] bridge0: port 2(bridge_slave_1) entered blocking state [ 847.501488][ T2370] bridge0: port 2(bridge_slave_1) entered disabled state [ 847.509329][ T2370] device bridge_slave_1 entered promiscuous mode [ 847.523122][ T2368] chnl_net:caif_netlink_parms(): no params data found [ 847.564332][ T2370] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 847.589521][ T2370] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 847.603633][ T2368] bridge0: port 1(bridge_slave_0) entered blocking state [ 847.610764][ T2368] bridge0: port 1(bridge_slave_0) entered disabled state [ 847.618675][ T2368] device bridge_slave_0 entered promiscuous mode [ 847.636355][ T2368] bridge0: port 2(bridge_slave_1) entered blocking state [ 847.650349][ T2368] bridge0: port 2(bridge_slave_1) entered disabled state [ 847.658348][ T2368] device bridge_slave_1 entered promiscuous mode [ 847.676274][ T2370] team0: Port device team_slave_0 added [ 847.688655][ T2370] team0: Port device team_slave_1 added [ 847.701397][ T2368] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 847.712552][ T2368] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 847.744542][ T2368] team0: Port device team_slave_0 added [ 847.752243][ T2368] team0: Port device team_slave_1 added [ 847.812631][ T2370] device hsr_slave_0 entered promiscuous mode [ 847.870738][ T2370] device hsr_slave_1 entered promiscuous mode [ 847.910339][ T2370] debugfs: Directory 'hsr0' with parent '/' already present! [ 847.982840][ T2368] device hsr_slave_0 entered promiscuous mode [ 848.020654][ T2368] device hsr_slave_1 entered promiscuous mode [ 848.091049][ T2368] debugfs: Directory 'hsr0' with parent '/' already present! [ 848.105449][ T2370] bridge0: port 2(bridge_slave_1) entered blocking state [ 848.112537][ T2370] bridge0: port 2(bridge_slave_1) entered forwarding state [ 848.119823][ T2370] bridge0: port 1(bridge_slave_0) entered blocking state [ 848.127054][ T2370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 848.149296][ T2368] bridge0: port 2(bridge_slave_1) entered blocking state [ 848.156392][ T2368] bridge0: port 2(bridge_slave_1) entered forwarding state [ 848.163772][ T2368] bridge0: port 1(bridge_slave_0) entered blocking state [ 848.170826][ T2368] bridge0: port 1(bridge_slave_0) entered forwarding state [ 848.217127][ T2370] 8021q: adding VLAN 0 to HW filter on device bond0 [ 848.243679][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 848.258019][ T8009] bridge0: port 1(bridge_slave_0) entered disabled state [ 848.267398][ T8009] bridge0: port 2(bridge_slave_1) entered disabled state [ 848.282277][ T8009] bridge0: port 1(bridge_slave_0) entered disabled state [ 848.300427][ T8009] bridge0: port 2(bridge_slave_1) entered disabled state [ 848.320381][ T2370] 8021q: adding VLAN 0 to HW filter on device team0 [ 848.336927][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 848.346045][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 848.358976][ T8009] bridge0: port 1(bridge_slave_0) entered blocking state [ 848.366047][ T8009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 848.389369][ T2368] 8021q: adding VLAN 0 to HW filter on device bond0 [ 848.396577][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 848.406045][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 848.414675][ T8009] bridge0: port 2(bridge_slave_1) entered blocking state [ 848.421805][ T8009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 848.429643][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 848.449867][ T2370] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 848.460494][ T2370] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 848.475197][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 848.484707][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 848.493591][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 848.503260][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 848.512395][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 848.521603][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 848.530098][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 848.538876][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 848.547457][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 848.556074][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 848.564651][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 848.579162][ T2368] 8021q: adding VLAN 0 to HW filter on device team0 [ 848.595489][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 848.603689][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 848.621695][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 848.630902][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 848.639463][T30326] bridge0: port 1(bridge_slave_0) entered blocking state [ 848.646514][T30326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 848.654801][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 848.662552][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 848.670176][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 848.678952][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 848.687334][T30326] bridge0: port 2(bridge_slave_1) entered blocking state [ 848.694416][T30326] bridge0: port 2(bridge_slave_1) entered forwarding state [ 848.702178][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 848.712701][ T2370] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 848.730744][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 848.739866][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 848.749119][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 848.771239][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 848.780565][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 848.789378][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 848.797940][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 848.805988][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 848.814428][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 848.824613][ T2368] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 848.832903][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 848.852332][ T2368] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 848.859635][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 848.867679][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 848.950111][ T2383] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 849.072324][ T2386] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 11:24:38 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2c, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d009fa52bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e43d41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x3, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x7, 0x20000) write$P9_RWRITE(r1, &(0x7f00000000c0)={0xb, 0x77, 0x2, 0x101}, 0xb) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:38 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:38 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:38 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:24:38 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:38 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:38 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xcfc4, 0x80200) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x80010, r0, 0x8000000) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:24:38 executing program 0: rmdir(&(0x7f0000000040)='./file0\x00') r0 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) sendto$rose(r0, &(0x7f0000000100)="c9fcc3fd694262c776ee56d5c6bfdc11a92a555f95fb0e9954bbb9dbf1500d102788e472c8967b106a09010ca5b2ba2098575029bd4683d2e2c699198262681d610c9c174029b4c51914aae641354c6132fe9e62fe79e0fab11aabc8219ffa6ea8d39ac91f75d83a194ef53695b95782ee09ca", 0x73, 0x20000000, &(0x7f00000000c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) r1 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000080), &(0x7f0000000180)=0x6) r2 = socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r3, &(0x7f0000000640)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @link_local}, 0x14) r5 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r5, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) setsockopt$TIPC_GROUP_LEAVE(r5, 0x10f, 0x88) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x142) sendmsg$sock(r2, &(0x7f0000000480)={&(0x7f00000001c0)=@hci={0x1f, r6}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)='s', 0xe}], 0x1, &(0x7f0000000400)=[@mark={{0x14}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2c, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r6, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x2, 0x0, 0xfffeffff, 0x7ff}, 0x10}, 0x1c6) 11:24:38 executing program 5: r0 = dup(0xffffffffffffffff) write$P9_RMKNOD(r0, &(0x7f0000000000)={0x14, 0x13, 0x2, {0x0, 0x3, 0x4}}, 0x14) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:24:38 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:39 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = dup(0xffffffffffffffff) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000080)) 11:24:39 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0xf2) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x400, 0x10000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r3 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000100)=0x929, 0x4) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) fcntl$lock(r0, 0x6, &(0x7f00000000c0)={0x1, 0x3, 0xcfdb, 0x5054, r4}) 11:24:39 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) [ 850.894767][T29326] bridge0: port 3(gretap0) entered disabled state [ 850.923765][T29326] bridge0: port 3(gretap0) entered disabled state [ 850.932562][T29326] device gretap0 left promiscuous mode [ 850.938053][T29326] bridge0: port 3(gretap0) entered disabled state [ 850.973610][T29326] device gretap0 left promiscuous mode [ 850.979115][T29326] bridge0: port 3(gretap0) entered disabled state [ 851.241657][T29326] device bridge_slave_1 left promiscuous mode [ 851.247827][T29326] bridge0: port 2(bridge_slave_1) entered disabled state [ 851.310800][T29326] device bridge_slave_0 left promiscuous mode [ 851.317055][T29326] bridge0: port 1(bridge_slave_0) entered disabled state [ 851.381787][T29326] device bridge_slave_1 left promiscuous mode [ 851.387985][T29326] bridge0: port 2(bridge_slave_1) entered disabled state [ 851.441096][T29326] device bridge_slave_0 left promiscuous mode [ 851.447290][T29326] bridge0: port 1(bridge_slave_0) entered disabled state [ 852.862231][T29326] bond1 (unregistering): Released all slaves [ 852.910491][T29326] device hsr_slave_0 left promiscuous mode [ 852.960489][T29326] device hsr_slave_1 left promiscuous mode [ 853.036911][T29326] team0 (unregistering): Port device team_slave_1 removed [ 853.048318][T29326] team0 (unregistering): Port device team_slave_0 removed [ 853.058253][T29326] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 853.114970][T29326] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 853.174160][T29326] bond0 (unregistering): Released all slaves [ 853.330605][T29326] device hsr_slave_0 left promiscuous mode [ 853.371702][T29326] device hsr_slave_1 left promiscuous mode [ 853.417971][T29326] team0 (unregistering): Port device team_slave_1 removed [ 853.428198][T29326] team0 (unregistering): Port device team_slave_0 removed [ 853.438375][T29326] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 853.503574][T29326] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 853.582945][T29326] bond0 (unregistering): Released all slaves [ 853.698399][ T2741] IPVS: ftp: loaded support on port[0] = 21 [ 853.752315][ T2741] chnl_net:caif_netlink_parms(): no params data found [ 853.780869][ T2741] bridge0: port 1(bridge_slave_0) entered blocking state [ 853.787978][ T2741] bridge0: port 1(bridge_slave_0) entered disabled state [ 853.795723][ T2741] device bridge_slave_0 entered promiscuous mode [ 853.803037][ T2741] bridge0: port 2(bridge_slave_1) entered blocking state [ 853.810148][ T2741] bridge0: port 2(bridge_slave_1) entered disabled state [ 853.817886][ T2741] device bridge_slave_1 entered promiscuous mode [ 853.835143][ T2741] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 853.845953][ T2741] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 853.864906][ T2741] team0: Port device team_slave_0 added [ 853.871703][ T2741] team0: Port device team_slave_1 added [ 853.912923][ T2741] device hsr_slave_0 entered promiscuous mode [ 853.950682][ T2741] device hsr_slave_1 entered promiscuous mode [ 853.990378][ T2741] debugfs: Directory 'hsr0' with parent '/' already present! [ 854.077242][ T2741] bridge0: port 2(bridge_slave_1) entered blocking state [ 854.084405][ T2741] bridge0: port 2(bridge_slave_1) entered forwarding state [ 854.091713][ T2741] bridge0: port 1(bridge_slave_0) entered blocking state [ 854.098877][ T2741] bridge0: port 1(bridge_slave_0) entered forwarding state [ 854.139850][ T2741] 8021q: adding VLAN 0 to HW filter on device bond0 [ 854.156301][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 854.168920][ T8042] bridge0: port 1(bridge_slave_0) entered disabled state [ 854.178028][ T8042] bridge0: port 2(bridge_slave_1) entered disabled state [ 854.196464][ T2741] 8021q: adding VLAN 0 to HW filter on device team0 [ 854.212526][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 854.225586][ T8042] bridge0: port 1(bridge_slave_0) entered blocking state [ 854.232652][ T8042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 854.265707][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 854.274443][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 854.281493][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 854.295700][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 854.305299][ T8042] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 854.324780][ T2741] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 854.335880][ T2741] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 854.348965][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 854.359119][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 854.372339][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 854.383748][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 854.409589][ T2741] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 854.423545][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 854.434430][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 11:24:43 executing program 1: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:43 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:43 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/441], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffefb}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = socket$can_bcm(0x1d, 0x2, 0x2) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000240)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) sendmsg$sock(r1, &(0x7f00000009c0)={&(0x7f0000000580)=@hci={0x1f, r3, 0x3}, 0x80, &(0x7f0000000840)=[{&(0x7f0000000600)="54fadbbfe0c9c97faf62ae87aad0904bb8da383c4fc656419b61253ab217e8b7526bb233119e771c04f6c557bc81c7731b3e12527e39", 0x36}, {&(0x7f0000000640)="f594eeb7072b68068bf883967fb0a3107b593c144fcfe6cae7093d0d95698aec81855fe606297e32f139868b9129644b29d31a9c4ff26459ac0c741238dded44b60933a4747285518d11d6b1f84d84a2d00f96c9e32e245851b243b7d0c6c2938f22c98bde86cd0e334a6a26f8fd54ece16cd7045b39a6e73089d84f8411cf50ad35c0988297f40b4646fefe6c606e6ad0158e6e63ca9f674bfc90d94937f31fddd8f44d34e0765a217246c68e655d88ceec82a28c6820dc56dc68e2182373f29d2e3efb7f9def9f75868967db55397af5a3577e73", 0xd5}, {&(0x7f0000000740)="baffedf677b2ef54850ada1b75888497630583ff3fbca6210b50842d381ab67b5937761e489112e0defa86006a31ef0f36ffdea6cae5905194f23a328b3c82517121d42bd96f321805346b338726dceea54da609ed4af7eb64c35a4a06621104a6e45616", 0x64}, {&(0x7f00000007c0)="cda5072b990e971c3832594c0ff59027560d6bf0bfcea3b66c05f472259f131194df5f5918aee0dbd9f2", 0x2a}, {&(0x7f0000000800)="8a79eda8be4c674da4bbd70017272a095371070bb38b5236f6369153b63ef6358453f1bd8b", 0x25}], 0x5, &(0x7f00000008c0)=[@mark={{0x14, 0x1, 0x24, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @mark={{0x14, 0x1, 0x24, 0xa19}}, @txtime={{0x18, 0x1, 0x3d, 0x401}}, @timestamping={{0x14, 0x1, 0x25, 0x7af2d9df}}, @mark={{0x14, 0x1, 0x24, 0x101}}, @timestamping={{0x14, 0x1, 0x25, 0x10000}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x81}}], 0xf0}, 0x20000000) 11:24:43 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:43 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={0x0, r1, 0x2}, 0xfffffffffffffed5) 11:24:44 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, &(0x7f0000000000)=0x6) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:24:44 executing program 1: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) gettid() r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:44 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240), 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:44 executing program 1: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240), 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000000)={0x0, r1, 0x2}, 0xf8b9bc89e3a9d2f3) 11:24:44 executing program 1: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) [ 857.201266][T29326] device bridge_slave_1 left promiscuous mode [ 857.207542][T29326] bridge0: port 2(bridge_slave_1) entered disabled state [ 857.270964][T29326] device bridge_slave_0 left promiscuous mode [ 857.277287][T29326] bridge0: port 1(bridge_slave_0) entered disabled state [ 857.321518][T29326] device bridge_slave_1 left promiscuous mode [ 857.327697][T29326] bridge0: port 2(bridge_slave_1) entered disabled state [ 857.381123][T29326] device bridge_slave_0 left promiscuous mode [ 857.387291][T29326] bridge0: port 1(bridge_slave_0) entered disabled state [ 858.780602][T29326] device hsr_slave_0 left promiscuous mode [ 858.830442][T29326] device hsr_slave_1 left promiscuous mode [ 858.887096][T29326] team0 (unregistering): Port device team_slave_1 removed [ 858.897600][T29326] team0 (unregistering): Port device team_slave_0 removed [ 858.907456][T29326] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 858.974125][T29326] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 859.043519][T29326] bond0 (unregistering): Released all slaves [ 859.220635][T29326] device hsr_slave_0 left promiscuous mode [ 859.260757][T29326] device hsr_slave_1 left promiscuous mode [ 859.307513][T29326] team0 (unregistering): Port device team_slave_1 removed [ 859.317962][T29326] team0 (unregistering): Port device team_slave_0 removed [ 859.328123][T29326] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 859.384677][T29326] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 859.484074][T29326] bond0 (unregistering): Released all slaves [ 860.710276][ T2893] IPVS: ftp: loaded support on port[0] = 21 [ 860.714260][ T2895] IPVS: ftp: loaded support on port[0] = 21 [ 860.796170][ T2893] chnl_net:caif_netlink_parms(): no params data found [ 860.838130][ T2893] bridge0: port 1(bridge_slave_0) entered blocking state [ 860.845241][ T2893] bridge0: port 1(bridge_slave_0) entered disabled state [ 860.853452][ T2893] device bridge_slave_0 entered promiscuous mode [ 860.860915][ T2893] bridge0: port 2(bridge_slave_1) entered blocking state [ 860.867950][ T2893] bridge0: port 2(bridge_slave_1) entered disabled state [ 860.875843][ T2893] device bridge_slave_1 entered promiscuous mode [ 860.897518][ T2893] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 860.907969][ T2893] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 860.929651][ T2893] team0: Port device team_slave_0 added [ 860.938345][ T2893] team0: Port device team_slave_1 added [ 861.012540][ T2893] device hsr_slave_0 entered promiscuous mode [ 861.060879][ T2893] device hsr_slave_1 entered promiscuous mode [ 861.110441][ T2893] debugfs: Directory 'hsr0' with parent '/' already present! [ 861.122970][ T2895] chnl_net:caif_netlink_parms(): no params data found [ 861.154853][ T2895] bridge0: port 1(bridge_slave_0) entered blocking state [ 861.162125][ T2895] bridge0: port 1(bridge_slave_0) entered disabled state [ 861.169749][ T2895] device bridge_slave_0 entered promiscuous mode [ 861.177485][ T2895] bridge0: port 2(bridge_slave_1) entered blocking state [ 861.185900][ T2895] bridge0: port 2(bridge_slave_1) entered disabled state [ 861.193659][ T2895] device bridge_slave_1 entered promiscuous mode [ 861.210642][ T2893] bridge0: port 2(bridge_slave_1) entered blocking state [ 861.217721][ T2893] bridge0: port 2(bridge_slave_1) entered forwarding state [ 861.224991][ T2893] bridge0: port 1(bridge_slave_0) entered blocking state [ 861.232201][ T2893] bridge0: port 1(bridge_slave_0) entered forwarding state [ 861.245541][ T2895] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 861.256491][ T2895] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 861.279859][ T2895] team0: Port device team_slave_0 added [ 861.286686][ T2895] team0: Port device team_slave_1 added [ 861.342312][ T2895] device hsr_slave_0 entered promiscuous mode [ 861.380701][ T2895] device hsr_slave_1 entered promiscuous mode [ 861.420320][ T2895] debugfs: Directory 'hsr0' with parent '/' already present! [ 861.441830][ T2895] bridge0: port 2(bridge_slave_1) entered blocking state [ 861.448910][ T2895] bridge0: port 2(bridge_slave_1) entered forwarding state [ 861.456215][ T2895] bridge0: port 1(bridge_slave_0) entered blocking state [ 861.463289][ T2895] bridge0: port 1(bridge_slave_0) entered forwarding state [ 861.486622][ T2893] 8021q: adding VLAN 0 to HW filter on device bond0 [ 861.501377][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 861.509652][T14128] bridge0: port 1(bridge_slave_0) entered disabled state [ 861.517752][T14128] bridge0: port 2(bridge_slave_1) entered disabled state [ 861.527151][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 861.538450][T14128] bridge0: port 1(bridge_slave_0) entered disabled state [ 861.546311][T14128] bridge0: port 2(bridge_slave_1) entered disabled state [ 861.557764][ T2893] 8021q: adding VLAN 0 to HW filter on device team0 [ 861.574498][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 861.583102][T30326] bridge0: port 1(bridge_slave_0) entered blocking state [ 861.590300][T30326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 861.612991][ T2893] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 861.623529][ T2893] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 861.639072][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 861.647854][T14128] bridge0: port 2(bridge_slave_1) entered blocking state [ 861.654952][T14128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 861.664352][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 861.673389][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 861.681916][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 861.690272][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 861.698720][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 861.706648][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 861.725487][ T2895] 8021q: adding VLAN 0 to HW filter on device bond0 [ 861.734994][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 861.742623][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 861.756988][ T2893] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 861.769239][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 861.780456][ T2895] 8021q: adding VLAN 0 to HW filter on device team0 [ 861.793460][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 861.807751][ T8066] bridge0: port 1(bridge_slave_0) entered blocking state [ 861.814826][ T8066] bridge0: port 1(bridge_slave_0) entered forwarding state [ 861.826540][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 861.835704][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 861.844639][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 861.851724][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 861.865349][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 861.883606][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 861.893440][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 861.911465][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 861.923362][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 861.932299][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 861.942980][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 861.951707][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 861.960032][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 861.968666][ T2905] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 861.987274][ T2895] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 861.999215][ T2895] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 862.023878][ T2895] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 862.052868][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 862.067966][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 862.078089][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 862.089687][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 11:24:51 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:51 executing program 1: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:51 executing program 5: socket$bt_hidp(0x1f, 0x3, 0x6) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:24:51 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) socketpair(0x1a, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000340)={0x0, 0x1, 0x0, 0x100000000, 0x7688}, &(0x7f0000000380)=0x18) r4 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r4, 0xc0345641, &(0x7f0000000040)={0x10000, "88515e9b670b950bc956faa2ac850361462533d0b5bfd0f99f9d69e862dde73f"}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)=ANY=[@ANYRES32=r5, @ANYBLOB="5c00400081a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc20809000000002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c83286ee01f6c04"], 0x0) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000400)={r3, 0x0, 0x9, 0xff01, 0x39, 0x1000, 0x7, 0xca9c, {r5, @in={{0x2, 0x4e22, @remote}}, 0xffffffff, 0x7, 0x0, 0x3, 0xcaf5}}, &(0x7f00000004c0)=0xb0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000080)={r5, 0xa9, "f8a8ec597f72bab59b1f7e1ca0b3c715d197017b913f133f1e36be8525a0ff12bf97665a9241a9668cbdbaa2c95d976fd2bf94aae1f3d57c62359a12a3c5c6e9ad0b03ee2dfdaeb5febae98b8b63095f43bb7b52eeb390c502df2ccac9b3b64452f6152d0b094f6b7bbc50d71f0bfecbf3673fd1c9d0d4676cf213688283759457c80bb1b433f1447c7ae1f07f8068cdb08d9348044321609a710bcb3dbe659910cab8939076e9bb4e"}, &(0x7f0000000140)=0xb1) 11:24:51 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:51 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) [ 862.318783][ T2914] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 11:24:51 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000000)={0x0, r1, 0x2}, 0xf8b9bc89e3a9d2f3) 11:24:51 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r3, 0xc0305710, &(0x7f0000000100)={0x0, 0x4, 0x4, 0x80000001}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_TIOCOUTQ(r2, 0x5411, &(0x7f0000000140)) getsockopt$inet_dccp_int(r1, 0x21, 0x10, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 862.452770][ T2922] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 11:24:51 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x53eb5f21, 0x20) write$FUSE_GETXATTR(r1, &(0x7f00000000c0)={0x18, 0x0, 0x5, {0x4}}, 0x18) r2 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000100)={@mcast1, 0x4, 0x3, 0xbbbbcd774162c372, 0x8, 0x5, 0x1}, &(0x7f0000000140)=0x20) 11:24:51 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r2, 0xc0305302, &(0x7f0000000080)={0x80, 0x8000, 0x3f, 0x3, 0xaba, 0x4}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x202200, 0x0) write$char_usb(r3, &(0x7f0000000500)="5a894838664afa87392e562346f48cc4cb0405d221fdc76cf9dd5cacba37cec1fa85c268ea7fd73be1c3fc8c98c2fd630569ef0cec93cd9f256bca3a5c866e1610153a24f513a91642b57b9999adbc76ecef11c97764769eb3e561da1df94564f267682ced51782296a4f7d5c209038898fec474b9e3eadefc9c5f54bcaaa76beaf8b258da8773d2bf72efc0ca9c6ab542b24e261fecc0cfb913184024f734d2e0ef60d5722dc803340b4eca34e8ed3b43f8154e63c6256efb04db82f1c486dd077b52420cab845ba3d54a3fbe0c1808acc8ad24076825", 0xd7) 11:24:52 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000000)={0x0, r1, 0x2}, 0xf8b9bc89e3a9d2f3) 11:24:52 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:52 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:52 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:52 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2b, 'rdma'}, {0x2d, 'io'}, {0x6, 'pids'}, {0x2d, 'rdma'}, {0x2d, 'io'}, {0x5c, 'memory'}]}, 0x22) 11:24:52 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:52 executing program 0: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x9) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:24:52 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) 11:24:52 executing program 1: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) dup(r2) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) [ 864.580849][T29332] device bridge_slave_1 left promiscuous mode [ 864.587165][T29332] bridge0: port 2(bridge_slave_1) entered disabled state [ 864.666424][T29332] device bridge_slave_0 left promiscuous mode [ 864.672804][T29332] bridge0: port 1(bridge_slave_0) entered disabled state [ 865.450539][T29332] device hsr_slave_0 left promiscuous mode [ 865.510465][T29332] device hsr_slave_1 left promiscuous mode [ 865.576761][T29332] team0 (unregistering): Port device team_slave_1 removed [ 865.586955][T29332] team0 (unregistering): Port device team_slave_0 removed [ 865.597015][T29332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 865.654805][T29332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 865.742993][T29332] bond0 (unregistering): Released all slaves [ 865.830210][ T3429] IPVS: ftp: loaded support on port[0] = 21 [ 865.830827][ T3431] IPVS: ftp: loaded support on port[0] = 21 [ 865.934092][ T3431] chnl_net:caif_netlink_parms(): no params data found [ 866.055814][ T3431] bridge0: port 1(bridge_slave_0) entered blocking state [ 866.066750][ T3431] bridge0: port 1(bridge_slave_0) entered disabled state [ 866.075292][ T3431] device bridge_slave_0 entered promiscuous mode [ 866.090315][ T3429] chnl_net:caif_netlink_parms(): no params data found [ 866.107967][ T3431] bridge0: port 2(bridge_slave_1) entered blocking state [ 866.115206][ T3431] bridge0: port 2(bridge_slave_1) entered disabled state [ 866.127538][ T3431] device bridge_slave_1 entered promiscuous mode [ 866.158868][ T3431] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 866.170010][ T3431] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 866.199206][ T3429] bridge0: port 1(bridge_slave_0) entered blocking state [ 866.211159][ T3429] bridge0: port 1(bridge_slave_0) entered disabled state [ 866.219236][ T3429] device bridge_slave_0 entered promiscuous mode [ 866.237076][ T3431] team0: Port device team_slave_0 added [ 866.250319][ T3429] bridge0: port 2(bridge_slave_1) entered blocking state [ 866.257404][ T3429] bridge0: port 2(bridge_slave_1) entered disabled state [ 866.265490][ T3429] device bridge_slave_1 entered promiscuous mode [ 866.278028][ T3431] team0: Port device team_slave_1 added [ 866.296463][ T3429] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 866.316661][ T3429] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 866.402820][ T3431] device hsr_slave_0 entered promiscuous mode [ 866.473994][ T3431] device hsr_slave_1 entered promiscuous mode [ 866.513498][ T3431] debugfs: Directory 'hsr0' with parent '/' already present! [ 866.522855][ T3429] team0: Port device team_slave_0 added [ 866.529664][ T3429] team0: Port device team_slave_1 added [ 866.556456][ T3431] bridge0: port 2(bridge_slave_1) entered blocking state [ 866.563581][ T3431] bridge0: port 2(bridge_slave_1) entered forwarding state [ 866.570876][ T3431] bridge0: port 1(bridge_slave_0) entered blocking state [ 866.577912][ T3431] bridge0: port 1(bridge_slave_0) entered forwarding state [ 866.622865][ T3429] device hsr_slave_0 entered promiscuous mode [ 866.680758][ T3429] device hsr_slave_1 entered promiscuous mode [ 866.720369][ T3429] debugfs: Directory 'hsr0' with parent '/' already present! [ 866.739891][ T3429] bridge0: port 2(bridge_slave_1) entered blocking state [ 866.747042][ T3429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 866.754328][ T3429] bridge0: port 1(bridge_slave_0) entered blocking state [ 866.761376][ T3429] bridge0: port 1(bridge_slave_0) entered forwarding state [ 866.828944][ T3431] 8021q: adding VLAN 0 to HW filter on device bond0 [ 866.840139][ T3429] 8021q: adding VLAN 0 to HW filter on device bond0 [ 866.857710][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 866.866324][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 866.876226][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 866.884751][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 866.893063][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 866.910180][ T3429] 8021q: adding VLAN 0 to HW filter on device team0 [ 866.919248][ T3431] 8021q: adding VLAN 0 to HW filter on device team0 [ 866.926463][T17137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 866.934489][T17137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 866.946039][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 866.955235][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 866.963715][T30326] bridge0: port 1(bridge_slave_0) entered blocking state [ 866.970876][T30326] bridge0: port 1(bridge_slave_0) entered forwarding state [ 866.981255][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 866.990019][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 866.998652][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 867.005775][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 867.020567][T17137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 867.029218][T17137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 867.038003][T17137] bridge0: port 2(bridge_slave_1) entered blocking state [ 867.045061][T17137] bridge0: port 2(bridge_slave_1) entered forwarding state [ 867.053290][T17137] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 867.062004][T17137] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 867.070517][T17137] bridge0: port 2(bridge_slave_1) entered blocking state [ 867.077542][T17137] bridge0: port 2(bridge_slave_1) entered forwarding state [ 867.085395][T17137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 867.094266][T17137] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 867.117297][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 867.142124][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 867.150845][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 867.159559][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 867.168176][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 867.177123][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 867.185541][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 867.194111][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 867.207831][ T3429] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 867.219537][ T3429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 867.231451][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 867.239765][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 867.248320][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 867.257353][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 867.266578][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 867.275486][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 867.284348][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 867.293831][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 867.310872][T17137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 867.318533][T17137] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 867.329502][ T3429] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 867.343508][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 867.352315][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 867.361295][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 867.369977][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 867.384130][ T3431] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 867.509551][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 867.517125][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 867.528302][ T3431] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 867.645858][ T3443] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 11:24:57 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = semget$private(0x0, 0x1, 0x90) semctl$SEM_STAT(r1, 0x3, 0x12, &(0x7f0000000140)=""/227) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) semtimedop(r1, &(0x7f0000000080)=[{0x1, 0x2, 0x1000}, {0x2, 0x6, 0x1000}], 0x2, &(0x7f0000000100)={r2, r3+10000000}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r4 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r4, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r6, &(0x7f0000000640)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x142) sendmsg$sock(r5, &(0x7f0000000480)={&(0x7f00000001c0)=@hci={0x1f, r8}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)='s', 0xe}], 0x1, &(0x7f0000000400)=[@mark={{0x14}}], 0x18}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000280)={@dev={0xfe, 0x80, [], 0xd}, 0x2b, r8}) 11:24:57 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, r0, 0x2}, 0xfffffffffffffda7) 11:24:57 executing program 4: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) 11:24:57 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:24:57 executing program 1: ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) gettid() waitid(0x0, r1, &(0x7f0000000640), 0x4, &(0x7f0000000740)) sched_setscheduler(r0, 0x5, &(0x7f0000000380)) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="1500000065ffff0180000008003950323030302e4cc74502f987c2cec6504df6ead74ed8a60ab563e98b4b2a3d27a7082dbb78abd55fba3da80b856445ab100621d6234555c08dc540473753cd89e9b08e3f5972fe9ca162b123e192e8c89c9dd81c796f27f537cc5a3fb54aff8eaff4f6b59c41705b96a6711d4679079d00"/137], 0x15) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e24, 0xffffffff, @dev={0xfe, 0x80, [], 0x10}, 0x6}, {0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}, 0x4, [0x0, 0x5, 0x1, 0x100, 0x1000, 0x6, 0x6, 0xfffffbff]}, 0x5c) [ 867.804973][ T3448] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 11:24:57 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x2}, 0xffffffffffffffe6) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x599800, 0x0) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000000080)=""/223) 11:24:57 executing program 0: prctl$PR_MCE_KILL(0x21, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2, &(0x7f0000000380)=ANY=[@ANYRESHEX], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0xc, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x301400, 0x0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f00000000c0)={0x0, 0x5ed9, 0xb}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000100)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 11:24:57 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) 11:24:57 executing program 5: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000000700)=0xe8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) syz_mount_image$msdos(&(0x7f0000000080)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x7, &(0x7f0000000540)=[{&(0x7f0000000100)="32e570c086909b99b03c71786e16b7c59121d2672452cb01ca740ee6b2f32d47a09d387ab80a4153d50fe8c20642ae89a6229c3be18abb77dd21ee4f4c1b76e4afc333", 0x43, 0x7}, {&(0x7f0000000180)="1a8f46553f4a2ceb9fc5e2682e53fbf860208bfb367db37559bb6bd0a0fc0c00fae400a4e6c671db1f5db4508533c15c61cea14b5cdfbf01125b046a139097d017cc0d7e85b8ae675999db81fb25d80c78cf35eb665705317be9c0f29fc95de77e2a88bda0f69da9f8e66544bedb57710383f8b43718cfa8a6594df2cae3bdc0cb256f1d5abc59527c2597b95608caef144a4650427d6301328f5544be2dbc9728f9296d57edc131801b86daf3a60c2a332d397f4855e6a0579276e8e323a3d44908b721936ec605342505e34b6286", 0xcf, 0x3753}, {&(0x7f0000000280)="fc3ef9548ecf33ab6020e82a88119b7e62ca7b4c514539349476ec087e6a6f651cbfae0ce087aebac7b282a53be05334bb081f58907f4a37d2115bff7844b5c250bf14054c5a", 0x46, 0x4}, {&(0x7f0000000300)="3fe5fa9b352a196666f6ed7250f6265191330e418968ac5921af5bac15aa9f10ec447b26aa62b1a512c39d021da6ba06edd2c222ae435f0b04fa0476aa4cb3423286ccc3d700ffc887f282706f004a60c77195c14f2ceab776189f3e06b212644f5a876f3afa4add39044efc00bb93b86d065e51d36de027d1a542e1c41374c863abbce17abd868ab42333710a6565cd354bf873a26638ba036c33471adb26229109e7180195956aa90eb13749b0ae4143b964536fe964424afc62b2d5af92f78e20ff891ffbf7", 0xc7, 0x9}, {&(0x7f0000000400)="f4240f87b43c91fb0b0175c4d636db3b397c", 0x12, 0x3}, {&(0x7f0000000440)="ca5a21cf2efbf5b48aaca0d9c456a2d09501", 0x12, 0x1000}, {&(0x7f0000000480)="d9151cc0df7a5b40bef4f5065e86ffba9d05dd88ff284e28fd3020da9d49edcd1499fc0045cd4771fc7723f9596344a2743ceafa0580bfa209f24267d3a6a6b3b42a50023f586c258600ad27ff289ceef29c64d40c00c26cf226563571267f2426e64783ee471945baeb9be5711476ab5ff282cb921bf50511cd82b96afb1206e2e04df846eca0a0db2e471c18a6434c6caf81431b6e09deabf11100020ec61bb13c317ebdaabd8765e77f", 0xab, 0x9}], 0x4, &(0x7f0000000740)={[{@nodots='nodots'}, {@fat=@discard='discard'}], [{@euid_gt={'euid>', r0}}, {@euid_lt={'euid<', r2}}, {@obj_user={'obj_user', 0x3d, '!trusted[@mime_type'}}, {@obj_user={'obj_user', 0x3d, '/proc/y\xa9pi/capi\xff\xff\x00'}}, {@fsname={'fsname', 0x3d, 'proc'}}]}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/y\xa9pi/capi\xff\xff\x00', 0x10f06, 0x0) 11:24:57 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) [ 868.495571][ T3666] FAT-fs (loop5): Unrecognized mount option "euid>00000000000000000000" or missing value 11:24:57 executing program 5: iopl(0x6) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)={0x138, r1, 0x2, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_SERVICE={0x68, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x0, 0x4}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2b, 0x21}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @multicast2}}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x200}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x138}, 0x1, 0x0, 0x0, 0x4000}, 0x87) 11:24:58 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev&hwrn\x06\x00', 0x200, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, r0, 0x2}, 0x10) 11:24:58 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) [ 869.131750][ T3677] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. 11:24:58 executing program 5: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x20000, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={0x0, r0, 0x2}, 0xffffffffffffff8a) [ 869.357721][T29332] bridge0: port 3(gretap0) entered disabled state [ 869.522248][T29332] device gretap0 left promiscuous mode [ 869.527790][T29332] bridge0: port 3(gretap0) entered disabled state [ 870.041304][T29332] device bridge_slave_1 left promiscuous mode [ 870.047530][T29332] bridge0: port 2(bridge_slave_1) entered disabled state [ 870.121025][T29332] device bridge_slave_0 left promiscuous mode [ 870.127208][T29332] bridge0: port 1(bridge_slave_0) entered disabled state [ 870.192051][T29332] device bridge_slave_1 left promiscuous mode [ 870.198306][T29332] bridge0: port 2(bridge_slave_1) entered disabled state [ 870.231186][T29332] device bridge_slave_0 left promiscuous mode [ 870.237346][T29332] bridge0: port 1(bridge_slave_0) entered disabled state [ 871.680611][T29332] device hsr_slave_0 left promiscuous mode [ 871.750473][T29332] device hsr_slave_1 left promiscuous mode [ 871.817894][T29332] team0 (unregistering): Port device team_slave_1 removed [ 871.828586][T29332] team0 (unregistering): Port device team_slave_0 removed [ 871.838805][T29332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 871.884128][T29332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 871.972432][T29332] bond0 (unregistering): Released all slaves [ 872.110624][T29332] device hsr_slave_0 left promiscuous mode [ 872.180423][T29332] device hsr_slave_1 left promiscuous mode [ 872.238286][T29332] team0 (unregistering): Port device team_slave_1 removed [ 872.248384][T29332] team0 (unregistering): Port device team_slave_0 removed [ 872.258793][T29332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 872.294504][T29332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 872.394633][T29332] bond0 (unregistering): Released all slaves [ 872.518903][ T3695] IPVS: ftp: loaded support on port[0] = 21 [ 872.575325][ T3695] chnl_net:caif_netlink_parms(): no params data found [ 872.603557][ T3695] bridge0: port 1(bridge_slave_0) entered blocking state [ 872.610760][ T3695] bridge0: port 1(bridge_slave_0) entered disabled state [ 872.618590][ T3695] device bridge_slave_0 entered promiscuous mode [ 872.626179][ T3695] bridge0: port 2(bridge_slave_1) entered blocking state [ 872.633343][ T3695] bridge0: port 2(bridge_slave_1) entered disabled state [ 872.641305][ T3695] device bridge_slave_1 entered promiscuous mode [ 872.659829][ T3695] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 872.670913][ T3695] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 872.689409][ T3695] team0: Port device team_slave_0 added [ 872.696056][ T3695] team0: Port device team_slave_1 added [ 872.742975][ T3695] device hsr_slave_0 entered promiscuous mode [ 872.810819][ T3695] device hsr_slave_1 entered promiscuous mode [ 872.860319][ T3695] debugfs: Directory 'hsr0' with parent '/' already present! [ 872.937935][ T3695] bridge0: port 2(bridge_slave_1) entered blocking state [ 872.945069][ T3695] bridge0: port 2(bridge_slave_1) entered forwarding state [ 872.952430][ T3695] bridge0: port 1(bridge_slave_0) entered blocking state [ 872.959528][ T3695] bridge0: port 1(bridge_slave_0) entered forwarding state [ 873.007478][ T3695] 8021q: adding VLAN 0 to HW filter on device bond0 [ 873.026120][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 873.038884][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 873.047576][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 873.074553][ T3695] 8021q: adding VLAN 0 to HW filter on device team0 [ 873.086522][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 873.099370][T14128] bridge0: port 1(bridge_slave_0) entered blocking state [ 873.106443][T14128] bridge0: port 1(bridge_slave_0) entered forwarding state [ 873.132190][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 873.140907][T14128] bridge0: port 2(bridge_slave_1) entered blocking state [ 873.148029][T14128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 873.158180][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 873.179540][ T3695] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 873.191128][ T3695] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 873.208298][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 873.218551][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 873.232974][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 873.244590][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 873.265034][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 873.273341][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 873.284240][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 873.296641][ T3695] 8021q: adding VLAN 0 to HW filter on device batadv0 11:25:02 executing program 4: perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003c80), 0x38e, 0x62, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) 11:25:02 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) 11:25:02 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:25:02 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:25:02 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RSTAT(r1, &(0x7f0000000080)={0x42, 0x7d, 0x1, {0x0, 0x3b, 0x8000, 0x5, {0x19, 0x3, 0x2}, 0x4040000, 0x200, 0xd4, 0x10000, 0x8, 'vboxnet1'}}, 0x42) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:25:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259b78f98d699512f7ece5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9d5e547c6f1457667d0ecb154c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581fdf96d67186c65f56f8bec3ff312c491b3c4c9d45e9a62000a9a957fab2b1a79a94190c6b8cba6fcd7e60bc6fd6837b9af6cac95d679d036accff83f983d5cfce4d26a37de13bb92adcc00"/436], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) r2 = inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) inotify_rm_watch(r1, r2) inotify_rm_watch(0xffffffffffffffff, r2) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r3 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x2, 0x20000) ioctl$SIOCRSGL2CALL(r3, 0x89e5, &(0x7f00000000c0)=@bcast) [ 873.641819][ T3719] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 11:25:02 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x2, 0x8000) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000080)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x0) 11:25:02 executing program 0: creat(&(0x7f0000000000)='./bus\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) rmdir(&(0x7f0000000100)='./bus\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0xfffffffffffffe5c) 11:25:02 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x5, &(0x7f0000000280)=0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0xf3f5, 0x2000010001}) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) 11:25:03 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) gettid() 11:25:03 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000040)={0x7, &(0x7f00000001c0)=[{}, {}, {}, {}, {}, {}, {}]}) ioctl$NBD_SET_SIZE(0xffffffffffffffff, 0xab02, 0x1) 11:25:03 executing program 5: ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x0, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x10, r1, 0x8000000) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U-', 0x20}, 0x28, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0100000000000000000001000000040004000800050001000000080006000000000008000300970d0000"], 0x9a}, 0x1, 0x6c}, 0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x44, r3, 0x400, 0x70bd25, 0x25dfdbfd, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x200, 0x7]}, @SEG6_ATTR_DST={0x14, 0x1, @rand_addr="868e0291486826d39c51e3ebd43adc7f"}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x56}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x1000) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0xfffffffffffffe3a) syz_open_dev$sndpcmp(&(0x7f0000000300)='/dev/snd/pcmC#D#p\x00', 0x8, 0x600000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r5 = dup2(r4, 0xffffffffffffffff) getsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000340), &(0x7f0000000380)=0x4) 11:25:03 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) [ 876.186114][ T4052] IPVS: ftp: loaded support on port[0] = 21 [ 876.311711][ T4052] chnl_net:caif_netlink_parms(): no params data found [ 876.327076][T29332] device bridge_slave_1 left promiscuous mode [ 876.336049][T29332] bridge0: port 2(bridge_slave_1) entered disabled state [ 876.411150][T29332] device bridge_slave_0 left promiscuous mode [ 876.417328][T29332] bridge0: port 1(bridge_slave_0) entered disabled state [ 876.481828][T29332] device bridge_slave_1 left promiscuous mode [ 876.487992][T29332] bridge0: port 2(bridge_slave_1) entered disabled state [ 876.531175][T29332] device bridge_slave_0 left promiscuous mode [ 876.537470][T29332] bridge0: port 1(bridge_slave_0) entered disabled state [ 876.591755][T29332] device bridge_slave_1 left promiscuous mode [ 876.597982][T29332] bridge0: port 2(bridge_slave_1) entered disabled state [ 876.651279][T29332] device bridge_slave_0 left promiscuous mode [ 876.657575][T29332] bridge0: port 1(bridge_slave_0) entered disabled state [ 878.770446][T29332] device hsr_slave_0 left promiscuous mode [ 878.860519][T29332] device hsr_slave_1 left promiscuous mode [ 878.907496][T29332] team0 (unregistering): Port device team_slave_1 removed [ 878.917751][T29332] team0 (unregistering): Port device team_slave_0 removed [ 878.927867][T29332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 878.974430][T29332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 879.032154][T29332] bond0 (unregistering): Released all slaves [ 879.160748][T29332] device hsr_slave_0 left promiscuous mode [ 879.210593][T29332] device hsr_slave_1 left promiscuous mode [ 879.257124][T29332] team0 (unregistering): Port device team_slave_1 removed [ 879.267551][T29332] team0 (unregistering): Port device team_slave_0 removed [ 879.277779][T29332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 879.303529][T29332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 879.401860][T29332] bond0 (unregistering): Released all slaves [ 879.550626][T29332] device hsr_slave_0 left promiscuous mode [ 879.590391][T29332] device hsr_slave_1 left promiscuous mode [ 879.637567][T29332] team0 (unregistering): Port device team_slave_1 removed [ 879.647807][T29332] team0 (unregistering): Port device team_slave_0 removed [ 879.658089][T29332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 879.723554][T29332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 879.783255][T29332] bond0 (unregistering): Released all slaves [ 879.898370][ T4056] IPVS: ftp: loaded support on port[0] = 21 [ 879.898454][ T4057] IPVS: ftp: loaded support on port[0] = 21 [ 879.916843][ T4052] bridge0: port 1(bridge_slave_0) entered blocking state [ 879.924049][ T4052] bridge0: port 1(bridge_slave_0) entered disabled state [ 879.932296][ T4052] device bridge_slave_0 entered promiscuous mode [ 879.952103][ T4052] bridge0: port 2(bridge_slave_1) entered blocking state [ 879.959239][ T4052] bridge0: port 2(bridge_slave_1) entered disabled state [ 879.967727][ T4052] device bridge_slave_1 entered promiscuous mode [ 879.988344][ T4052] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 880.000352][ T4052] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 880.029319][ T4052] team0: Port device team_slave_0 added [ 880.036171][ T4052] team0: Port device team_slave_1 added [ 880.092724][ T4052] device hsr_slave_0 entered promiscuous mode [ 880.130758][ T4052] device hsr_slave_1 entered promiscuous mode [ 880.180411][ T4052] debugfs: Directory 'hsr0' with parent '/' already present! [ 880.208492][ T4052] bridge0: port 2(bridge_slave_1) entered blocking state [ 880.215687][ T4052] bridge0: port 2(bridge_slave_1) entered forwarding state [ 880.285704][ T4056] chnl_net:caif_netlink_parms(): no params data found [ 880.313730][ T4057] chnl_net:caif_netlink_parms(): no params data found [ 880.353208][ T4057] bridge0: port 1(bridge_slave_0) entered blocking state [ 880.360383][ T4057] bridge0: port 1(bridge_slave_0) entered disabled state [ 880.368256][ T4057] device bridge_slave_0 entered promiscuous mode [ 880.388301][ T4056] bridge0: port 1(bridge_slave_0) entered blocking state [ 880.395763][ T4056] bridge0: port 1(bridge_slave_0) entered disabled state [ 880.403507][ T4056] device bridge_slave_0 entered promiscuous mode [ 880.410794][ T4057] bridge0: port 2(bridge_slave_1) entered blocking state [ 880.417829][ T4057] bridge0: port 2(bridge_slave_1) entered disabled state [ 880.426128][ T4057] device bridge_slave_1 entered promiscuous mode [ 880.444466][ T4056] bridge0: port 2(bridge_slave_1) entered blocking state [ 880.451622][ T4056] bridge0: port 2(bridge_slave_1) entered disabled state [ 880.459215][ T4056] device bridge_slave_1 entered promiscuous mode [ 880.497132][ T4057] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 880.606721][ T4052] 8021q: adding VLAN 0 to HW filter on device bond0 [ 880.615823][ T4057] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 880.634633][ T4056] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 880.649239][ T4052] 8021q: adding VLAN 0 to HW filter on device team0 [ 880.666620][T14128] bridge0: port 2(bridge_slave_1) entered disabled state [ 880.676124][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 880.690118][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 880.698461][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 880.708085][ T4056] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 880.746512][ T4057] team0: Port device team_slave_0 added [ 880.754560][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 880.763424][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 880.776765][T14128] bridge0: port 1(bridge_slave_0) entered blocking state [ 880.784024][T14128] bridge0: port 1(bridge_slave_0) entered forwarding state [ 880.796200][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 880.804787][T14128] bridge0: port 2(bridge_slave_1) entered blocking state [ 880.811858][T14128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 880.824934][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 880.834598][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 880.846952][T14128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 880.858901][ T4052] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 880.874390][ T4052] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 880.889028][ T4057] team0: Port device team_slave_1 added [ 880.897645][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 880.921450][T30326] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 880.939019][ T4052] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 880.947494][ T4056] team0: Port device team_slave_0 added [ 880.955648][ T4056] team0: Port device team_slave_1 added [ 880.974341][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 880.989712][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 881.083384][ T4057] device hsr_slave_0 entered promiscuous mode [ 881.140945][ T4057] device hsr_slave_1 entered promiscuous mode [ 881.190792][ T4057] debugfs: Directory 'hsr0' with parent '/' already present! [ 881.233321][ T4056] device hsr_slave_0 entered promiscuous mode [ 881.280796][ T4056] device hsr_slave_1 entered promiscuous mode [ 881.320563][ T4056] debugfs: Directory 'hsr0' with parent '/' already present! [ 881.390012][ T4057] 8021q: adding VLAN 0 to HW filter on device bond0 [ 881.416521][ T4056] 8021q: adding VLAN 0 to HW filter on device bond0 [ 881.444574][ T8041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 881.458164][ T8041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 881.466793][ T8041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 881.477594][ T8041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 881.487740][ T4057] 8021q: adding VLAN 0 to HW filter on device team0 [ 881.495745][ T4068] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.1'. [ 881.511783][ T4056] 8021q: adding VLAN 0 to HW filter on device team0 [ 881.532640][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 881.541775][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 881.554911][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 881.561998][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 881.575243][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 881.584234][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 881.596899][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 881.603975][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 881.617010][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 881.625960][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 881.638830][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 881.645919][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 881.674817][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 881.684339][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 881.722202][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 881.734998][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 881.743567][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 881.757022][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 881.765956][ T8009] bridge0: port 2(bridge_slave_1) entered blocking state [ 881.773066][ T8009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 881.786048][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 881.794944][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 881.808332][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 881.817472][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 881.831046][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 881.839569][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 881.850711][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 881.859725][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 881.868929][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 881.877528][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 881.887512][ T4057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 881.973283][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 881.981496][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 881.989629][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 881.998672][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 882.009604][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 882.022746][ T4056] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 882.034406][ T4056] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 882.042411][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 882.051267][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 882.065709][ T4057] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 882.091314][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 882.098793][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 882.114064][ T4056] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 882.130455][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 882.138003][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 882.266759][ T4079] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 882.308906][ T4081] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 11:25:11 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x5}, {0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0xa808) 11:25:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000380)=ANY=[@ANYRES32=r0], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) 11:25:11 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGETNODEID(0xffffffffffffffff, 0x89e1, &(0x7f0000000000)={0x2}) r1 = dup(r0) syz_read_part_table(0x3f, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000100)="f5d530f1a121f62a5cd44d7837f443406938da13c1c61bb0ac9b32de274acd88939b0c88505ae5f64439c11e275690d66e3836adfa3082b02ec31882128a8182b86f7d707523ee7b7f1f24134c2a767d064abe5ccf2610c3bd544d767192eebb04763f0ec8b0ddc8a431322de088becc54d03426d7ff4fa3a072e40785782213fb677361817723408c8275477d5a", 0x8e, 0x1}]) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000080)=""/92) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$CAN_RAW_FILTER(r3, 0x65, 0x1, &(0x7f0000000200)=[{{0x1}, {0x0, 0x0, 0x1}}, {{0x2, 0x0, 0x0, 0x1}, {0x2}}, {{0x2, 0x0, 0x1, 0x1}, {0x2, 0x0, 0x1}}, {{0x1, 0x0, 0x1}, {0x4, 0x1, 0x0, 0x1}}, {{0x1, 0x0, 0x1, 0x1}, {0x3}}], 0x28) 11:25:11 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0xa) clock_gettime(0x0, &(0x7f0000000140)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ppoll(&(0x7f0000000000)=[{r0}, {}, {r0, 0x124}], 0x3, 0x0, 0x0, 0x0) 11:25:11 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) 11:25:11 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:25:11 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) 11:25:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) socketpair(0x1a, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000340)={0x0, 0x1, 0x0, 0x100000000, 0x7688}, &(0x7f0000000380)=0x18) r4 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_ENUMAUDIO(r4, 0xc0345641, &(0x7f0000000040)={0x10000, "88515e9b670b950bc956faa2ac850361462533d0b5bfd0f99f9d69e862dde73f"}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000100)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000003c0)=ANY=[@ANYRES32=r5, @ANYBLOB="5c00400081a3a51b1c30e8f0ae2ede5285251f147fb8d227c9ef569fb3c792426fda754ac767ba8235836bc20809000000002967a3a6af25b0110dd1220ccae8abc46920ecabca1e1ba165993cba605bd1b57afc02d1528c5c83286ee01f6c04"], 0x0) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000400)={r3, 0x0, 0x9, 0xff01, 0x39, 0x1000, 0x7, 0xca9c, {r5, @in={{0x2, 0x4e22, @remote}}, 0xffffffff, 0x7, 0x0, 0x3, 0xcaf5}}, &(0x7f00000004c0)=0xb0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)={r5, 0x8}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r6, 0x200, 0x8, 0x8, 0x3, 0xffffffff}, 0x14) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:25:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) exit(0x7) 11:25:12 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:25:12 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x3, 0x100000001) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000380)={{{@in=@remote, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in6=@empty, 0x0, 0x0, 0x0, 0x6}}, 0xe8) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x400000000000058, 0x0) 11:25:12 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) 11:25:12 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:25:12 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) 11:25:12 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) r1 = socket$inet6(0xa, 0x1, 0x0) fstat(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(0xffffffffffffffff, &(0x7f0000000480)={0x78, 0x0, 0x5, {0x200, 0x6, 0x0, {0x5, 0x0, 0x200, 0x5, 0x100000001, 0x5, 0x0, 0x9, 0x2000, 0x8, 0x8, r2, r3, 0x81, 0x7}}}, 0x78) mount$9p_xen(&(0x7f0000000100)='/dev/qat_adf_ctl\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000240)={'trans=xen,', {[{@fscache='fscache'}, {@dfltuid={'dfltuid', 0x3d, r0}}, {@version_9p2000='version=9p2000'}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@cachetag={'cachetag', 0x3d, '/dev/qat_adf_ctl\x00'}}], [{@context={'context', 0x3d, 'sysadm_u'}}]}}) socketpair(0x11, 0xa, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r4, 0x800442d3, &(0x7f0000000440)={0x4, 0x7f, 0x4, @random="6dfc681e28d6", 'bridge_slave_0\x00'}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$VIDIOC_QUERYCTRL(r5, 0xc0445624, &(0x7f0000000080)={0x4, 0x102, "80cc9809d716316cd784c930554813603c4b744dd8a51aec01093e3a6bf2746a", 0x9, 0x40, 0x7ff, 0x1ff, 0x204}) [ 883.688704][ T4321] QAT: Invalid ioctl [ 883.707617][ T4323] QAT: Invalid ioctl [ 884.170948][T29332] device bridge_slave_1 left promiscuous mode [ 884.177249][T29332] bridge0: port 2(bridge_slave_1) entered disabled state [ 884.251168][T29332] device bridge_slave_0 left promiscuous mode [ 884.257418][T29332] bridge0: port 1(bridge_slave_0) entered disabled state [ 885.140474][T29332] device hsr_slave_0 left promiscuous mode [ 885.190479][T29332] device hsr_slave_1 left promiscuous mode [ 885.237689][T29332] team0 (unregistering): Port device team_slave_1 removed [ 885.248295][T29332] team0 (unregistering): Port device team_slave_0 removed [ 885.258784][T29332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 885.294639][T29332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 885.392636][T29332] bond0 (unregistering): Released all slaves [ 885.491791][ T4429] IPVS: ftp: loaded support on port[0] = 21 [ 885.621639][ T4429] chnl_net:caif_netlink_parms(): no params data found [ 885.650528][ T4433] IPVS: ftp: loaded support on port[0] = 21 [ 885.716096][ T4434] IPVS: ftp: loaded support on port[0] = 21 [ 885.734355][ T4429] bridge0: port 1(bridge_slave_0) entered blocking state [ 885.744167][ T4429] bridge0: port 1(bridge_slave_0) entered disabled state [ 885.756547][ T4429] device bridge_slave_0 entered promiscuous mode [ 885.786345][ T4429] bridge0: port 2(bridge_slave_1) entered blocking state [ 885.796994][ T4429] bridge0: port 2(bridge_slave_1) entered disabled state [ 885.805312][ T4429] device bridge_slave_1 entered promiscuous mode [ 885.867128][ T4429] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 885.896863][ T4429] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 885.906734][ T4433] chnl_net:caif_netlink_parms(): no params data found [ 885.998838][ T4429] team0: Port device team_slave_0 added [ 886.017196][ T4434] chnl_net:caif_netlink_parms(): no params data found [ 886.032745][ T4429] team0: Port device team_slave_1 added [ 886.046127][ T4433] bridge0: port 1(bridge_slave_0) entered blocking state [ 886.053363][ T4433] bridge0: port 1(bridge_slave_0) entered disabled state [ 886.061670][ T4433] device bridge_slave_0 entered promiscuous mode [ 886.133649][ T4429] device hsr_slave_0 entered promiscuous mode [ 886.176468][ T4429] device hsr_slave_1 entered promiscuous mode [ 886.240384][ T4429] debugfs: Directory 'hsr0' with parent '/' already present! [ 886.251128][ T4433] bridge0: port 2(bridge_slave_1) entered blocking state [ 886.258191][ T4433] bridge0: port 2(bridge_slave_1) entered disabled state [ 886.266199][ T4433] device bridge_slave_1 entered promiscuous mode [ 886.317641][ T4429] bridge0: port 2(bridge_slave_1) entered blocking state [ 886.324740][ T4429] bridge0: port 2(bridge_slave_1) entered forwarding state [ 886.332035][ T4429] bridge0: port 1(bridge_slave_0) entered blocking state [ 886.339054][ T4429] bridge0: port 1(bridge_slave_0) entered forwarding state [ 886.350429][ T4433] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 886.360015][ T4434] bridge0: port 1(bridge_slave_0) entered blocking state [ 886.367167][ T4434] bridge0: port 1(bridge_slave_0) entered disabled state [ 886.375029][ T4434] device bridge_slave_0 entered promiscuous mode [ 886.383938][ T4433] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 886.404166][ T4434] bridge0: port 2(bridge_slave_1) entered blocking state [ 886.411377][ T4434] bridge0: port 2(bridge_slave_1) entered disabled state [ 886.419220][ T4434] device bridge_slave_1 entered promiscuous mode [ 886.429921][ T4433] team0: Port device team_slave_0 added [ 886.448886][ T4433] team0: Port device team_slave_1 added [ 886.458458][ T4434] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 886.480032][ T4434] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 886.506121][T17139] bridge0: port 1(bridge_slave_0) entered disabled state [ 886.519177][T17139] bridge0: port 2(bridge_slave_1) entered disabled state [ 886.593354][ T4433] device hsr_slave_0 entered promiscuous mode [ 886.620839][ T4433] device hsr_slave_1 entered promiscuous mode [ 886.690338][ T4433] debugfs: Directory 'hsr0' with parent '/' already present! [ 886.706080][ T4434] team0: Port device team_slave_0 added [ 886.713444][ T4434] team0: Port device team_slave_1 added [ 886.792735][ T4434] device hsr_slave_0 entered promiscuous mode [ 886.850647][ T4434] device hsr_slave_1 entered promiscuous mode [ 886.890380][ T4434] debugfs: Directory 'hsr0' with parent '/' already present! [ 886.907192][ T4429] 8021q: adding VLAN 0 to HW filter on device bond0 [ 886.935705][ T4065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 886.944457][ T4065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 886.954872][ T4429] 8021q: adding VLAN 0 to HW filter on device team0 [ 886.975916][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 886.985102][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 886.993714][ T2008] bridge0: port 1(bridge_slave_0) entered blocking state [ 887.000893][ T2008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 887.008758][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 887.017705][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 887.026234][ T2008] bridge0: port 2(bridge_slave_1) entered blocking state [ 887.033298][ T2008] bridge0: port 2(bridge_slave_1) entered forwarding state [ 887.041321][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 887.066672][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 887.091437][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 887.100811][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 887.109815][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 887.119364][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 887.128706][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 887.137587][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 887.151553][ T4429] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 887.163773][ T4429] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 887.175036][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 887.183717][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 887.192846][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 887.212887][ T4434] 8021q: adding VLAN 0 to HW filter on device bond0 [ 887.328475][ T4429] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 887.347663][ T4434] 8021q: adding VLAN 0 to HW filter on device team0 [ 887.356432][ T4065] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 887.364812][ T4065] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 887.373708][ T4065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 887.382203][ T4065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 887.461702][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 887.470553][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 887.479008][ T8009] bridge0: port 1(bridge_slave_0) entered blocking state [ 887.486055][ T8009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 887.494993][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 887.503912][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 887.517549][ T8009] bridge0: port 2(bridge_slave_1) entered blocking state [ 887.524586][ T8009] bridge0: port 2(bridge_slave_1) entered forwarding state [ 887.533360][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 887.543074][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 887.607520][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 887.619333][ T4433] 8021q: adding VLAN 0 to HW filter on device bond0 [ 887.635371][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 887.644578][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 887.653823][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 887.665287][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 887.674970][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 887.771076][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 887.779576][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 887.788618][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 887.797171][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 887.810132][ T4433] 8021q: adding VLAN 0 to HW filter on device team0 11:25:17 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000140)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0xbb8) 11:25:17 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xffeffffefffffffb) syz_emit_ethernet(0x6a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "c600", 0x34, 0x6, 0x0, @remote, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0xd, 0x2, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4}, @exp_smc={0xfe, 0x6}, @sack={0x5, 0x2}, @sack_perm={0x4, 0x2}, @window={0x3, 0xfec4079c6e26b72}, @exp_smc={0xfe, 0x6}, @window={0x3, 0x3}, @sack={0x5, 0x6, [0x0]}]}}}}}}}}, 0x0) 11:25:17 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$uinput_user_dev(r1, &(0x7f0000000140)={'syz0\x00', {0x5, 0x0, 0x81, 0x8}, 0x8, [0x5, 0x5, 0x5, 0x10000, 0xdddc, 0x96, 0x9, 0x1f, 0xff, 0x1, 0x2, 0xfffffffc, 0x0, 0x7f, 0x5, 0x5, 0x101, 0x7f, 0x7, 0x2, 0x1, 0x5, 0x2, 0xc0000000, 0x0, 0xffff0e69, 0x5, 0x3, 0x64ac, 0x0, 0xa47b, 0xd3, 0x6a2, 0x5, 0x7f, 0x80000001, 0x8, 0x0, 0x8, 0x1, 0x0, 0x9, 0x401, 0xe6, 0x3, 0x8, 0xfff, 0x3, 0x2, 0x3f, 0x3, 0x10000, 0x8, 0x1ff, 0xff, 0x7, 0x7ff, 0x6, 0x401, 0x2, 0x0, 0x1, 0x7, 0x1ff], [0x8001, 0x2, 0x2c4c5555, 0x8, 0x7, 0x3, 0x101, 0x80000001, 0x8, 0x1, 0x3, 0x6, 0x0, 0xffff8000, 0x7, 0x10001, 0x1, 0x1, 0x2, 0x3, 0x0, 0x8, 0x6b, 0x4, 0x578, 0x7, 0x4, 0x551a, 0x2, 0x8, 0xf1, 0x5, 0xd28f, 0xfffffbff, 0x3, 0x7fff, 0x3, 0x6, 0x3, 0x0, 0xfffffff9, 0x0, 0xc8e1, 0x2, 0x8, 0x0, 0x852, 0xc1, 0x7fff, 0x3c, 0x80000001, 0x800, 0x80000000, 0x80000001, 0x0, 0x10000, 0x8, 0x10000, 0x4, 0x7a6, 0x9, 0xd83b415, 0xc6af, 0x3f], [0x2, 0x80000000, 0x0, 0x6, 0x8b8, 0x1, 0x8f34, 0x2, 0x7, 0x8, 0x4, 0x3, 0x9, 0x20, 0x9, 0x1, 0x80, 0x8e, 0x80, 0x9, 0x7f, 0xff, 0x1, 0x3, 0x1f, 0x2, 0xffffffff, 0xb1, 0xffff, 0x3, 0x9, 0x3, 0x5, 0x3, 0x7, 0x4, 0x2, 0xef, 0xfffffbff, 0x0, 0xb5, 0x4, 0x5, 0xe4, 0x7fff, 0x400, 0x8, 0x615, 0x3f, 0x7f, 0x8, 0x0, 0x43, 0xd07, 0xffffff6f, 0x8, 0xffffff1e, 0x3f, 0x0, 0x6, 0xff, 0x7, 0x1000, 0x4], [0x1, 0x401, 0x3, 0x1, 0x3, 0x2, 0x1000, 0x5, 0x6, 0x8, 0x0, 0xe0000000, 0x5, 0xa4, 0xa31d, 0x4, 0x109a, 0x80000000, 0x1f, 0x4, 0x1ff, 0xb8e, 0x7, 0x2, 0x71, 0xd3, 0x7fff, 0x2, 0x0, 0xfff, 0xffffff7f, 0xfffffff8, 0xfffffffd, 0x2e782497, 0x5, 0x8, 0x5, 0x5, 0x4, 0x3cd7, 0x1ff, 0x2, 0x7, 0x80000001, 0x3, 0x6, 0x9, 0x1, 0x1, 0x401, 0x7, 0x6, 0x3, 0x4, 0x401, 0x81, 0x6, 0x8, 0xffffffe0, 0x10001, 0xffffffff, 0x7ff, 0x8001, 0x1]}, 0x45c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0/file0\x00', 0xce5e48aa26fd88f7, 0x4) ioctl$UI_DEV_SETUP(r2, 0x405c5503, &(0x7f0000000080)={{0xedad, 0xfff, 0x8001, 0x2}, 'syz1\x00', 0x52}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000005c0)='nbd\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x68, r3, 0x800, 0x70bd2b, 0x25dfdbff, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x121}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r2}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x4}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r5}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x86}, @NBD_ATTR_SOCKETS={0x4}]}, 0x68}}, 0x22040885) 11:25:17 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000500)={'filter\x00', 0x7, 0x4, 0x480, 0x0, 0x140, 0x0, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000080), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@local, @empty, @loopback, 0x8}}}, {{@arp={@initdev={0xac, 0x1e, 0x1, 0x0}, @local, 0x0, 0xffffff00, @empty, {[0x0, 0xff, 0xff, 0x7f, 0x1fe]}, @mac=@dev={[], 0xc}, {[0xff, 0x0, 0x9c842c0fc52a2676, 0xff]}, 0x3, 0x6b4a, 0xff, 0x9, 0x6, 0x7ff, 'rose0\x00', 'ip6tnl0\x00', {}, {0xc15bcc116d851443}, 0x0, 0x354}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @remote, @empty, 0xf, 0xffffffff}}}, {{@arp={@loopback, @multicast2, 0xff000000, 0xff, @mac=@random="ce1b176c0161", {[0xff, 0x0, 0x0, 0xff, 0xff]}, @mac=@remote, {[0xff, 0x0, 0x80, 0xff, 0x0, 0xff]}, 0x400, 0x200, 0x20, 0x3, 0x1f, 0x8001, 'bridge_slave_0\x00', 'gretap0\x00', {0xff}, {}, 0x0, 0x158}, 0xf0, 0x118}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x8}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x6) r10 = openat$cgroup_ro(r5, &(0x7f00000002c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r10, 0x84, 0x1c, &(0x7f0000000300), &(0x7f0000000b00)=0x4) syz_mount_image$ceph(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)='./file0\x00', 0x3, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000a00)="91958461cd96ffa54439f4a3a2325b9f4229f1962f8a2cb97ab3d7e1bf341f0b9944c7f6c1c5039941265110e4fa90247ad440fe01c2ac9e26b971f87c36d0910bd57b580516ecf9964cb1ea4831af54cc119e63ffb562591f89acf3f074354eda81d6b58a4c3765b8534899441f3756e1cf848c51ffc1ddfbb3856b8d82b8725aab93d9bbe4782b6e19324b557946a2f263e2155bdfb6c202c7837178eb87217397500bff6c043b85606a865cc75588bda22a59548ac596dc8554c53af3c9b1fb3f81a257e52d454b0e1f57ac39bdf83db663c13e4e3ad4", 0xd8, 0x3}, {&(0x7f0000000180)="d09f3d3c6da70e23433311", 0xb, 0x8}], 0x25808f, &(0x7f0000000280)='mangle\x00') [ 887.818625][ T4434] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 887.827315][ T4065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 887.835211][ T4065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 11:25:17 executing program 4: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000010000001809"], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$TIOCLINUX4(r1, 0x4b4b, &(0x7f0000000000)) [ 888.069827][ T4434] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 888.076779][ T26] audit: type=1804 audit(1572953117.205:92): pid=4560 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/" dev="sda1" ino=2328 res=1 [ 888.116792][ T26] audit: type=1804 audit(1572953117.225:93): pid=4561 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.4" name="/" dev="sda1" ino=2328 res=1 11:25:17 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000140)=""/22, 0x16) socket$packet(0x11, 0x0, 0x300) [ 888.160371][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 888.167843][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 888.228681][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 11:25:17 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000005180)=[{{&(0x7f0000000100)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000280)=""/189, 0xbd}, {&(0x7f0000000180)=""/122, 0x7a}, {&(0x7f0000000500)=""/175, 0xaf}, {&(0x7f00000005c0)=""/149, 0x95}, {&(0x7f0000000680)=""/181, 0xb5}], 0x5}, 0x5}, {{&(0x7f00000007c0)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000840)=""/130, 0x82}, {&(0x7f0000000900)=""/217, 0xd9}], 0x2, &(0x7f0000000a40)=""/21, 0x15}, 0x2}, {{&(0x7f0000000a80)=@vsock, 0x80, &(0x7f0000001c00)=[{&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/207, 0xcf}], 0x2, &(0x7f0000001c40)=""/234, 0xea}, 0xaa3}, {{&(0x7f0000001d40)=@ethernet, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001dc0)}], 0x1, &(0x7f0000001e40)=""/195, 0xc3}, 0x20}, {{0x0, 0x0, &(0x7f00000022c0)=[{&(0x7f0000001f40)=""/247, 0xf7}, {&(0x7f0000002040)=""/71, 0x47}, {&(0x7f00000020c0)=""/203, 0xcb}, {&(0x7f00000021c0)=""/178, 0xb2}, {&(0x7f0000002280)}], 0x5, &(0x7f0000002340)=""/4096, 0x1000}, 0x42}, {{&(0x7f0000003340)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @empty}}, 0x80, &(0x7f00000034c0)=[{&(0x7f00000033c0)=""/240, 0xf0}], 0x1, &(0x7f0000003500)=""/122, 0x7a}, 0x5}, {{&(0x7f0000003580)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f00000036c0)=[{&(0x7f0000003600)=""/160, 0xa0}], 0x1, &(0x7f0000003700)=""/116, 0x74}, 0xa1}, {{0x0, 0x0, &(0x7f0000004c80)=[{&(0x7f0000003780)=""/191, 0xbf}, {&(0x7f0000003840)=""/232, 0xe8}, {&(0x7f0000003940)=""/56, 0x38}, {&(0x7f0000003980)=""/33, 0x21}, {&(0x7f00000039c0)=""/165, 0xa5}, {&(0x7f0000003a80)=""/163, 0xa3}, {&(0x7f0000003b40)=""/117, 0x75}, {&(0x7f0000003bc0)=""/145, 0x91}, {&(0x7f0000003c80)=""/4096, 0x1000}], 0x9, &(0x7f0000004d40)=""/84, 0x54}, 0x8001}, {{&(0x7f0000004dc0)=@vsock, 0x80, &(0x7f0000005040)=[{&(0x7f0000004e40)=""/31, 0x1f}, {&(0x7f0000004e80)=""/134, 0x86}, {&(0x7f0000004f40)=""/29, 0x1d}, {&(0x7f0000004f80)=""/58, 0x3a}, {&(0x7f0000004fc0)=""/122, 0x7a}], 0x5, &(0x7f00000050c0)=""/184, 0xb8}, 0x7}], 0x9, 0x23000, &(0x7f00000053c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x5, 0x2c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff9b, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r2}, 0x10) [ 888.272475][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 888.299296][ T8066] bridge0: port 1(bridge_slave_0) entered blocking state [ 888.306418][ T8066] bridge0: port 1(bridge_slave_0) entered forwarding state 11:25:17 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000200)={0x2, 0x1004e20, @loopback}, 0x10) sendto$inet(r1, &(0x7f0000000140)="6812334f6743a747f8bf094356", 0xd, 0x8800, &(0x7f00000000c0)={0x2, 0x4e21, @remote}, 0x10) connect$inet(r1, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r1, &(0x7f0000000100)='\x00', 0x38, 0x4088, 0x0, 0x0) recvmmsg(r1, &(0x7f00000008c0)=[{{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000180)=""/111, 0x45}], 0x1}}], 0x1, 0x0, 0x0) [ 888.364165][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 888.394760][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 888.419109][ T8066] bridge0: port 2(bridge_slave_1) entered blocking state [ 888.426329][ T8066] bridge0: port 2(bridge_slave_1) entered forwarding state [ 888.461235][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 888.477719][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 888.516034][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 888.526908][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 888.541401][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 888.550345][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 11:25:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) [ 888.696876][ T4433] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 888.720286][ T4433] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 888.885179][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 888.902714][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 888.911573][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 888.920746][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 888.929422][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 888.937858][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 888.946892][ T8009] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 889.065676][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 889.074533][ T8066] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 889.087425][ T4433] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 889.193474][ T4692] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 889.223582][T29332] device bridge_slave_1 left promiscuous mode [ 889.229867][T29332] bridge0: port 2(bridge_slave_1) entered disabled state [ 889.291910][T29332] device bridge_slave_0 left promiscuous mode [ 889.298250][T29332] bridge0: port 1(bridge_slave_0) entered disabled state [ 889.372072][T29332] device bridge_slave_1 left promiscuous mode [ 889.378341][T29332] bridge0: port 2(bridge_slave_1) entered disabled state [ 889.421041][T29332] device bridge_slave_0 left promiscuous mode [ 889.427381][T29332] bridge0: port 1(bridge_slave_0) entered disabled state [ 890.860773][T29332] device hsr_slave_0 left promiscuous mode [ 890.910304][T29332] device hsr_slave_1 left promiscuous mode [ 890.978463][T29332] team0 (unregistering): Port device team_slave_1 removed [ 890.989255][T29332] team0 (unregistering): Port device team_slave_0 removed [ 890.999794][T29332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 891.044043][T29332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 891.105669][T29332] bond0 (unregistering): Released all slaves [ 891.230694][T29332] device hsr_slave_0 left promiscuous mode [ 891.300346][T29332] device hsr_slave_1 left promiscuous mode [ 891.358166][T29332] team0 (unregistering): Port device team_slave_1 removed [ 891.368564][T29332] team0 (unregistering): Port device team_slave_0 removed [ 891.378910][T29332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 891.415458][T29332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 891.475029][T29332] bond0 (unregistering): Released all slaves [ 891.687215][ T4698] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 11:25:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:25:21 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001f00)=@newlink={0x3c, 0x10, 0x42b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0xc, 0x2, [@IFLA_BR_MAX_AGE={0x8}]}}}]}, 0x3c}}, 0x0) 11:25:21 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) connect(r0, &(0x7f0000000080)=@in6={0xa, 0x4e23, 0x4, @loopback, 0xffffff00}, 0x80) 11:25:21 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x20000000080003, 0xc) write(r0, &(0x7f0000000080)="1f0000000202fffffd6f9d47e29a840aec51193b54e8cad211c007110000f3", 0x1f) 11:25:21 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:25:21 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) syz_open_dev$rtc(0x0, 0x0, 0x0) 11:25:21 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) syz_open_dev$rtc(0x0, 0x0, 0x0) [ 892.008159][ T4708] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. 11:25:21 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) syz_open_dev$rtc(0x0, 0x0, 0x0) 11:25:21 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x27f) [ 892.121769][ T4710] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.4'. 11:25:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x39, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000080), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x4000, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) r4 = socket(0x18, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r4, 0x1, 0x3, &(0x7f0000000000), 0x20a154cc) r5 = socket$packet(0x11, 0x3, 0x300) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bind$packet(r6, &(0x7f0000000640)={0x11, 0x0, r7, 0x1, 0x0, 0x6, @link_local}, 0x14) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x142) sendmsg$sock(r5, &(0x7f0000000480)={&(0x7f00000001c0)=@hci={0x1f, r8}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)='s', 0xe}], 0x1, &(0x7f0000000400)=[@mark={{0x14}}], 0x18}, 0x0) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f0000000280)={@remote, @local, @empty, 0x1f, 0x1, 0x20, 0x100, 0x80000001, 0xc00455b5a0fcf13c, r8}) utimensat(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x0, 0x2710}, {r2, r3/1000+10000}}, 0x100) 11:25:21 executing program 4: socket$packet(0x11, 0xa, 0x300) syz_emit_ethernet(0x11, &(0x7f0000000000)={@local, @local, [], {@x25}}, 0x0) 11:25:21 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000080)={'bridge_slave_0\x00', 0x7}) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) 11:25:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) ioctl$KVM_GET_LAPIC(r1, 0x8400ae8e, &(0x7f0000000500)={"35a91c2aa69a100bda5fee5af3d38a294e597b1814dc3eb559b2fe523f6648d2874f67a17b049f7116d807206d043ec728e23910ff947b8ac53bc374d57426e1bb7d11d6596b93ae524b9059a6430fa2b9a3169798e7ac89dc40992fcf8ea3bd3c867e01fac61a870eb7a5154c08ff196225e7852012ca36a6a835484ca276d0dfbc8464e750c7d3361ed8334ca419d5603875058a6af93c6c745fc721b926bdaad98aed1a27ab7a71def2031a3c97b174d8f61d958e8ac951780f39e8599c4473fa27621870dbb6285946f97a574b56a6c0c2173529ff4782ace97ce37597fd71b08b45351278fe76f0fc71c72694cd293a22d28f2358bf2abae95fcadd5ba96875d58cd9056644f51a49690a48d6181911e23e300845e731437af458a60c9cf3c67bc15f9695aaa6bf2bc06741e2598f984d1e15734c56a42cb9e6389513d8be855f3434720c1f98a89d45d49db4f061ec61f387642ce0fb31ca0c66f111d2edfe8823dde37eed7cc1771bcaeba3f9ce3ad3b63b9889f386268c682618f4436ba6c8999ae9f5a489b70e847241085578100e392b86a0882005386939557e9bf7c553978925eadc656bae96b08509828b61b5ec12daeb99a4345ae37301ef4deb3c41f3abebdd93213d82f4da28c0cb68ae3a27a98fbe0f3848dc86fc5efea18433d1daddd5ef315663cee1d16dfad8590636c5bf0f340de5619bc11201b6adcf89bbeba154a333121a4555a4eb5835ba26683e904114bc25021da198ee4da4a1ff7a4700246b29445504c0b0bbe5e35b23240cbc3c60133aeb9dcbbe115f1b3130902dfef779408db1108f792a9aa6404f5de17fb057ea9f221d4e7c84d8e99a7d16088e976f0640e98bbde0f01b5f2b69179cff1c99d7a07b13b68112bd2b4936db4ebada0aa0cc8d47f96c65e01c25a5b7c82d1673badf4c2be4f99922c4d28ae767a4be34f2d4b15fdfad48f7373f0d5deb7e35afc71dfe9b7e25544246090a62b0b22c62f9504a49a7ec721a5172d3c162067621833b5786cf9751f89f87ec1222787063f52e107c292b15335ed9f9395c44d6125ba5b62bf09af82ba5b2e4f351ec6a89a6ebd865b5fdaab22a85c6a751792c1ef5ac21542daf4030cc2fe28880af6cf73d156cfb98f8e344f4646316af70ff6ceed52ed1e73547b85794e7695a1f343ad704365c65f153de89565302205056b7a3fb7710da6dd4d3031b16db36e7e5f54c04e98c2797529cf1fb7dbc4711d37fa14abadee464ec8d0e25a72a773395c63f96cb3c7bf8646b4dc39654f1c10631afcc85747f8f803d9ea185d9eb3b39360b627d920081ae8a84b0347d6eccd19f2f239fbec5d0be1be536c7313acefc232c88941a6569c84d1180dcc09e493c20e820ddb270c0e0b685f73b6c5c4bfb1aab3b4adcf9109fa771b095263ea818f983fb667ab57ea9b12a"}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 11:25:22 executing program 1: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip_vs\x00\x9d\x82\x16\xb1B\x1b\x16\xf2\xb1,\xd7X\xe5\xd9\xba\xd70+2\xf9\x9c_\xad\xb4\xeady\xab\xff\"II\x92\xc4\xadEQ\x810\x1bu?\x86\xecmHEEQ\x16\'\x01\xb9\x16\xfbBc\x92\x8b\x13\xf3;myd\xbf\x8a\x17\xf2\xb1\xbc\xf7@\x89\xd1\xef\b\xae\xb7\xdao^\xfc\xfb\xff5r\xba\x00\xf7\xa3\x83\x9bB\x840n\xbf\xcdQ\xc6\x19;\x98\xdf\a\x81\x00\x17x') bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) sendfile(r2, r1, 0x0, 0x3) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) socket$inet6(0xa, 0x20000000080002, 0x88) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) r4 = dup(r3) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8b1a, &(0x7f0000000040)='wlan0\x00') ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, 0x0) 11:25:22 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:25:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev}, 0x20) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/anycast6\x00') preadv(r1, &(0x7f0000000040)=[{&(0x7f0000000380)=""/4096, 0x1000}], 0x1, 0x0) 11:25:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f0000000080)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, [], 0x0, 0x5bf1d593e5d86fe, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x10}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x10}, 0x3}, 0x70) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x1, 0x100) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000300)=ANY=[@ANYBLOB="080000001400c49d1f28e318930000000107221e000000000000000579fb97fccafddd0bce355a4527fe76e1f03881180ef830f6fb96b9feae804f0e92858d8d82a273619283cb97bb84c1691884328ed1547824000000000000000000d28574ba63b8d193e936ec116f7bf5f6923970b20404d86f3ab6874abb830859d85ba2082563dbd86bd2f1c836b1d657a164d09aa4d41cee6bad37889a884d6ae1d6ef7f7414a9a5ce423671b782c17d2c4294c9364f3e90e028bebaa86360214b93a2bf0e4de084dd229af794c18b43fa43ef79c598c61da76a8fe3164300e374b72d9c4e"]) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) getsockopt$inet6_buf(r1, 0x29, 0x3d, &(0x7f0000000140), &(0x7f0000000180)) unshare(0x20000) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000400)=""/134) r2 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x80000000, 0x200) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000100)=0x8) 11:25:22 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x404042, 0x0) ioctl$SIOCX25SENDCALLACCPT(r0, 0x89e9) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) 11:25:22 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000580)=ANY=[@ANYBLOB="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"/467], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x101000, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x3, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f00000000c0)) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) [ 894.870591][ T5154] IPVS: ftp: loaded support on port[0] = 21 [ 894.975670][ T5154] chnl_net:caif_netlink_parms(): no params data found [ 895.003201][ T5154] bridge0: port 1(bridge_slave_0) entered blocking state [ 895.010430][ T5154] bridge0: port 1(bridge_slave_0) entered disabled state [ 895.018127][ T5154] device bridge_slave_0 entered promiscuous mode [ 895.074160][ T5154] bridge0: port 2(bridge_slave_1) entered blocking state [ 895.081627][ T5154] bridge0: port 2(bridge_slave_1) entered disabled state [ 895.089238][ T5154] device bridge_slave_1 entered promiscuous mode [ 895.107090][ T5154] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 895.117571][ T5154] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 895.204034][ T5154] team0: Port device team_slave_0 added [ 895.212000][ T5154] team0: Port device team_slave_1 added [ 895.283054][ T5154] device hsr_slave_0 entered promiscuous mode [ 895.320711][ T5154] device hsr_slave_1 entered promiscuous mode [ 895.360337][ T5154] debugfs: Directory 'hsr0' with parent '/' already present! [ 895.427482][ T5157] IPVS: ftp: loaded support on port[0] = 21 [ 895.429723][ T5154] bridge0: port 2(bridge_slave_1) entered blocking state [ 895.440514][ T5154] bridge0: port 2(bridge_slave_1) entered forwarding state [ 895.447884][ T5154] bridge0: port 1(bridge_slave_0) entered blocking state [ 895.455043][ T5154] bridge0: port 1(bridge_slave_0) entered forwarding state [ 895.578047][ T5157] chnl_net:caif_netlink_parms(): no params data found [ 895.655752][ T5154] 8021q: adding VLAN 0 to HW filter on device bond0 [ 895.674695][ T5157] bridge0: port 1(bridge_slave_0) entered blocking state [ 895.681821][ T5157] bridge0: port 1(bridge_slave_0) entered disabled state [ 895.689430][ T5157] device bridge_slave_0 entered promiscuous mode [ 895.697310][ T5157] bridge0: port 2(bridge_slave_1) entered blocking state [ 895.704817][ T5157] bridge0: port 2(bridge_slave_1) entered disabled state [ 895.713117][ T5157] device bridge_slave_1 entered promiscuous mode [ 895.772684][ T5154] 8021q: adding VLAN 0 to HW filter on device team0 [ 895.780315][ T4065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 895.788681][ T4065] bridge0: port 1(bridge_slave_0) entered disabled state [ 895.796790][ T4065] bridge0: port 2(bridge_slave_1) entered disabled state [ 895.805757][ T4065] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 895.879183][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 895.887806][ T2008] bridge0: port 1(bridge_slave_0) entered blocking state [ 895.894914][ T2008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 895.913333][ T5157] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 895.926420][ T5157] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 895.938338][ T8041] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 895.947162][ T8041] bridge0: port 2(bridge_slave_1) entered blocking state [ 895.954257][ T8041] bridge0: port 2(bridge_slave_1) entered forwarding state [ 895.963856][ T8041] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 895.972801][ T8041] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 895.982588][T29332] device bridge_slave_1 left promiscuous mode [ 895.988795][T29332] bridge0: port 2(bridge_slave_1) entered disabled state [ 896.030996][T29332] device bridge_slave_0 left promiscuous mode [ 896.037150][T29332] bridge0: port 1(bridge_slave_0) entered disabled state [ 896.081971][T29332] device bridge_slave_1 left promiscuous mode [ 896.088188][T29332] bridge0: port 2(bridge_slave_1) entered disabled state [ 896.130916][T29332] device bridge_slave_0 left promiscuous mode [ 896.137153][T29332] bridge0: port 1(bridge_slave_0) entered disabled state [ 897.530858][T29332] device hsr_slave_0 left promiscuous mode [ 897.580381][T29332] device hsr_slave_1 left promiscuous mode [ 897.626767][T29332] team0 (unregistering): Port device team_slave_1 removed [ 897.637595][T29332] team0 (unregistering): Port device team_slave_0 removed [ 897.647748][T29332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 897.703800][T29332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 897.761964][T29332] bond0 (unregistering): Released all slaves [ 897.890684][T29332] device hsr_slave_0 left promiscuous mode [ 897.960578][T29332] device hsr_slave_1 left promiscuous mode [ 898.016964][T29332] team0 (unregistering): Port device team_slave_1 removed [ 898.028592][T29332] team0 (unregistering): Port device team_slave_0 removed [ 898.038742][T29332] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 898.085099][T29332] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 898.142754][T29332] bond0 (unregistering): Released all slaves [ 898.227590][ T5157] team0: Port device team_slave_0 added [ 898.234455][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 898.243700][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 898.253573][ T5157] team0: Port device team_slave_1 added [ 898.271361][ T4065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 898.279997][ T4065] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 898.322397][ T5157] device hsr_slave_0 entered promiscuous mode [ 898.380751][ T5157] device hsr_slave_1 entered promiscuous mode [ 898.420333][ T5157] debugfs: Directory 'hsr0' with parent '/' already present! [ 898.430052][ T5154] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 898.441425][ T5154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 898.451447][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 898.459967][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 898.491955][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 898.499351][T17139] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 898.517650][ T5154] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 898.663595][ T5157] 8021q: adding VLAN 0 to HW filter on device bond0 [ 898.680791][ T4065] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 898.689218][ T4065] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 898.703261][ T5157] 8021q: adding VLAN 0 to HW filter on device team0 [ 898.725080][ T8041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 898.760901][ T8041] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 898.786065][ T8041] bridge0: port 1(bridge_slave_0) entered blocking state [ 898.793167][ T8041] bridge0: port 1(bridge_slave_0) entered forwarding state [ 898.802636][ T8041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 898.814899][ T8041] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 898.827923][ T8041] bridge0: port 2(bridge_slave_1) entered blocking state [ 898.834999][ T8041] bridge0: port 2(bridge_slave_1) entered forwarding state [ 898.843812][ T8041] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 898.852994][ T8041] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 898.869800][ T5165] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 898.881545][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 898.889476][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 898.941691][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 898.981358][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 898.990197][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 899.031484][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready 11:25:28 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) [ 899.042866][ T5157] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 899.064756][ T5157] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 11:25:28 executing program 5: bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2}, 0x10) r0 = accept(0xffffffffffffffff, &(0x7f0000000080)=@in={0x2, 0x0, @dev}, &(0x7f0000000000)=0x80) r1 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x1, 0x2) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f00000001c0)={0x2126, 0x6a4, 0x9, 0x0, 0x0, [], [], [], 0x0, 0x4}) accept4$tipc(r0, &(0x7f0000000100), &(0x7f0000000140)=0x10, 0x800) 11:25:28 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x2) 11:25:28 executing program 1: r0 = socket$packet(0x11, 0x2000100000000a, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x80000006, 0x0, 0x0, 0x5}]}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setpipe(r4, 0x407, 0x0) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0x4240a2a0) bind$inet(r5, &(0x7f00000002c0)={0x2, 0x0, @local}, 0x10) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) splice(r3, 0x0, r5, 0x0, 0x30005, 0x0) 11:25:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x17, 0x2b, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0xadaa542ec7426a89, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x2}, 0x10}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$rfkill(r2, &(0x7f00000000c0)={0xab7, 0x4, 0x0, 0x1, 0x1}, 0x8) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, &(0x7f0000000080)={{0x2, 0x3b88663294112aef, 0x3, 0x1, 0x5}}) [ 899.135144][ T8041] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 899.153841][ T8041] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 899.185181][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 899.199371][ T2008] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 899.200343][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 899.212432][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 899.220029][ T5157] 8021q: adding VLAN 0 to HW filter on device batadv0 11:25:28 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x2c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000500)='\x91qzkallfr\x00\xc8\x9b\x86\xbf+u\x92}{Q`\xb6\x11]\x96\x1f\xda\x86=-\x13\xff!\xc4\xbb\xa2\xc5\xa4\r\xf4g\xae\xa7\x03/\xac\xb1\xadU\xf1r\x03\xba\xc8\xc8\xa1\xd5\"?\xae\xe1\xfc`uo\xff\xa2\x14\xed7D\xb3\xa2\xdd\x9b\x14F\xa44\x99\x02\x86j\nZ+ 2\xf1\xae\x9e\x16\xc8\'\x1bx\xeb\xff\xff\xff\x7f\x10\xf8\x10\xb1\xc8\xf4O\xb6q\xa4IG\xf5\x1aPy$\xc9\'6u\xa3\xc3v\x11r\xee\xa7_\xa6\x8d-\x90\xf6}Duy\x80Tq9C\x84\xa2\xee\x1cJ\x94\"\x19 \xae:\xc0,\a\xa5\xc4\x13\xda\xef-\xf4YTxN\r\x91\xbe\x1fL\x81\xd0\xa9\x0e\xa5\x80g\x9d\xe2;\x11D\x99\xacfW,\xad\xc84|\xd5@<\x88k\xaa\xfb\xfa/~@\xc8sh\xb5\n\xcb\x16 l\f\x84\xa8\x9f\xa8\x01\xfc\xf7l+4K3\xfe\xb5\x97\xe0\x91*r\x06\xe4\x7f\xea\xb7U\x95\x04\xbd\x8b\x1c=Em}\'\xd1\xa9\xfa\xc4\xfa\x98u\x7f\xb5\x80f\x8f\b\x12Uo?\xf6H\xaaZ\xbbE\x9eD\x15M,\xc6\xfcYB\f\x10\x9c\xe9\xa3\x17\x801\x02\xb2\xc2\xb2\xa0)Z$\xcb\xe5S\xd2\xd4PoC\xf9E\xf1#\x1e\xebh\xd8\x90\xfca\xd0w\x8f}\xdam\xb4Q8k\x87\x8b\xb2o/\xce#~\x15r1\x13H]77\x80\xa0\\\xfd\x1b\'!\x14\xaf\xee\x13\xc5\xdb\xbf\xba\x86\xa9\x9dC\\\x92\"W\xcf\x1d\xad\xc1F\xfa\ba\xa3\xcfr\xd9\xf6\xfc\xb3\xa5\xd3Q\r\x81D', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) [ 899.320272][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 899.326066][ C0] protocol 88fb is buggy, dev hsr_slave_1 11:25:28 executing program 4: getpid() perf_event_open(&(0x7f0000000a00)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r0 = socket$inet(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x1d, &(0x7f0000000180)=0x7fffffff, 0x4) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003c80), 0x38e, 0x62, 0x0) [ 899.440336][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 899.446140][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 899.560276][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 899.566079][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 899.715867][ T5293] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. 11:25:29 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r3, 0x0, 0x0, 0x404c0c0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(r3, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r3, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) 11:25:29 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) 11:25:29 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000ebe2871ee5625d0041822bf3ba154fc6616e6259cc84344987ea6253ce5d22f4e4af076163f2df832e7ea5dcfd959b0c92104780624b6329a3a24e77e91adf5a85246034742702069fd022186f88aff9a4ea5978b9d97504800fd6d5e547c6f1457654c51e7454486f57ebb5d2fe60aa066adeb3d5616ce71cf33f1bf7f1aa3e4bbf4234fea8d9625d493ec6b0138b24ade82ff32e05cd4699945e1a634bd505f1f952538817b39006983500229a75eea8b3b99340bc6b401d38ac8098d25ea06a3248e49706a34e4ad41084d87df425b98932842a6538d2156565c34812dc81c5fca3727002e204fefa18238bffe6772b6262473581"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f065581fffffff00004000633a77fbac141414e9", 0x0, 0x100}, 0x28) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={0x0, r2, 0x2}, 0x10) 11:25:29 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x660c, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000380)={'team0\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000a40)={&(0x7f0000000180)=@in={0x2, 0x4e22, @rand_addr=0x3}, 0x10, &(0x7f0000000940)=[{&(0x7f00000002c0)="776f39376ce7e7f04a37db5b5c3674e40ce4b358663abe090379feb9922020d3e11b0d24d77e7320214c5423f2dd75a16c889351339eb7f60a003751ed4480a2eac621f57605af6c8b36c6ccf016602ce4db07", 0x53}, {&(0x7f00000003c0)="c982f41a88bda76ebe986cbff00240dc17dbdbe81df82d96db6d545ace561b42b6e3cc25606c9b961a86867b7c74f5cf991a181e60a37e63cf10e519cb1dac553de8d504bd413963c49fc1fe83f0e87086ba62bdabf3d5d36587316110ee59667ddb6d68cc3c23fe4db830bf5e5c7133c4ba3af83559359d5ba0500fec542bcbbfd5350007e37fa53aeb44ad570e25ad4466a0d6c3494c360b8baaa0612a6fdbde1e559499aea36200c12fab7413725cb35d8b5d6f3b78134c318cffbe2fd2e068545b7d7b02c27229f46888ccc8ad81d8ec7f1328955af3debd8852", 0xdc}, {&(0x7f00000004c0)="d977b73cb3f4ccfb32d6ad2b1583236dc602329af1d8f5516cb3bb1c7179edb45e3af470ea8e965980edfd3a026d6df171af6fc9d4be792b4cb9654b062d8ea6f6fa026b3dca60d6a867e343e21cbe4699009260f5eb9b4d725d1a13df8cdaaa98c813f3cab6b175f36036c1d3bee79fe1a7a91702c733efc0b5b1cdda2339c7cf82da1e227f12e4ba58940a610bddb035c37ed38af38c02cfe0f0e3d5f339499ab6b1974189049e1087b71a0020d6e4e29b5efdd5", 0xb5}, {&(0x7f0000000340)="c3bbdf55bb361255f7e21a5fa9fc83b3b031511967185d33457d5d0e852ed2530110299e2f966fe5e3c9dc7adf559b7b7b06c1bf8b3c4b7d", 0x38}, {&(0x7f0000000580)="ee43c3d385f7407a86dde283e997888e058ca7b50313509b626723371d264b4cb23d76a53b1b574698a76d43b53177cac06a6e55bb27bf2a2a55a9e6d59c4e842b4b45eacdcd64f9e2ee5bd4a8b07ab2e9c88e509a4b1f9a81592b050d1a161c4fbf61bd3d4b49d36cd733505cfe900b939747d8e0cd1447e035d502df5a045449b996a6c7d61f4412c8e302c369649cc49fbf6ea2ad592171bddc6415dfab5dc33c1baca9c028adeed8b8261f671990a433f68f231d55676c5f4ae809e3b5cfd0f8e508686d216dd1e61ecc2c22ca7162ba16cd39", 0xd5}, {&(0x7f0000000680)="ddd8ac1e82dcb244d80a9dd157193762b2295671c3b021eac5dac151d0a1ba41e9fd8b08a2a99d03d5b0398b38d71b57d0acdf67163d4c47d5f6264278c0e28427deeb08302dfe2964c9d6f3ec0f9efb3cc3929312fc44a0e14cec1a073cdd87f20cbbdf9f688f022830a6e76807594c2ae9857bc63df0a901a74d08", 0x7c}, {&(0x7f0000000700)="cd82aeb60955809dfac5115de8447809a8eca829e0de84d253cf438c5df013f875e9effaa0165f312bfc6c8d9844938931b95a238961194e743ed750f027b5d45a477f36d57372d92e718219ebbb5b13a4289e4c835a10e2169b8d9cf15410a46b8f0b96fec020fa79858fcf440180386946f83af581d2f6a89986a95afbc8a4e2408fcebeadd4cce17329ee068eeeae2f56011274ee04b6d167571c818cafad42c4be0606a6872ff575b866c421b0919d17dc37d5a2595b34445eb4d79bc08e3658", 0xc2}, {&(0x7f0000000800)="49b29b4a1c69cc5e06339f383f5df041ff12485dd3614d89a31d61b7625421c6d990595226101e3f1b17667bb7887ca0c3684509e27dcc21626fc919d7663402f2d813dfecc57ad2ff9c7049aa6531a0a1de0fa3876cc760fc94136c1010df46062ad1849046e8c779485a901d5632b0d28e29f2956bc148c004bdb4866240f826af9e79c084c21dbe8cafb648a254de86ee25c2f6ffd3b337daf594fd53a45a9d702c31d5fd4bda3c9ee41043c35bf3fd512c8e11cc67af1116c8189e1cfa194f852740", 0xc4}, {&(0x7f0000000900)="71311b0db7ab2391922712709081339890b4e7101fed336527539962790d8203c642b45d9c1a7ce5266ebf18d3", 0x2d}], 0x9, &(0x7f0000000a00)=[@dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x10, 0xffffff20}}], 0x30, 0x6bce93bd3078dac2}, 0x4000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open$dir(0x0, 0x0, 0x0) linkat(r1, &(0x7f0000000240)='./file0\x00', r1, &(0x7f0000000280)='./file0\x00', 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x8, 0x6011, r2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0xfffffffffffffe26, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="0000040800010100000000"], 0x30}}, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r4 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r4, &(0x7f0000000080), 0xfe7a, 0x0, &(0x7f00000001c0), 0x10) setsockopt$inet_mreqsrc(r4, 0x0, 0x26, &(0x7f00000001c0)={@dev={0xac, 0x14, 0x14, 0x25}, @empty, @broadcast}, 0xc) syz_open_dev$rtc(0x0, 0x0, 0x0) 11:25:29 executing program 4: syz_emit_ethernet(0x11, &(0x7f00000000c0)={@empty, @remote, [], {@mpls_uc={0x8847, {[], @llc={@llc={0x0, 0x0, '2'}}}}}}, 0x0) [ 900.089241][ T5302] ================================================================== [ 900.097396][ T5302] BUG: KCSAN: data-race in iptunnel_xmit / iptunnel_xmit [ 900.104406][ T5302] [ 900.106740][ T5302] read to 0xffff8880a95d6148 of 8 bytes by task 5303 on cpu 0: [ 900.114294][ T5302] iptunnel_xmit+0x501/0x520 [ 900.118893][ T5302] ip_tunnel_xmit+0x9aa/0x1400 [ 900.123671][ T5302] __gre_xmit+0x389/0x4e0 [ 900.128011][ T5302] ipgre_xmit+0x332/0x630 [ 900.132349][ T5302] dev_hard_start_xmit+0xef/0x430 [ 900.137374][ T5302] __dev_queue_xmit+0x14ab/0x1b40 [ 900.142396][ T5302] dev_queue_xmit+0x21/0x30 [ 900.146899][ T5302] __bpf_redirect+0x4b4/0x710 [ 900.151586][ T5302] bpf_clone_redirect+0x1a5/0x1f0 [ 900.156627][ T5302] bpf_prog_bebbfe2050753572+0xe06/0x1000 [ 900.162342][ T5302] bpf_test_run+0x1c3/0x490 [ 900.166837][ T5302] bpf_prog_test_run_skb+0x4da/0x840 [ 900.172120][ T5302] __do_sys_bpf+0x1664/0x2b90 [ 900.176794][ T5302] __x64_sys_bpf+0x4c/0x60 [ 900.181209][ T5302] do_syscall_64+0xcc/0x370 [ 900.185712][ T5302] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 900.191585][ T5302] [ 900.193914][ T5302] write to 0xffff8880a95d6148 of 8 bytes by task 5302 on cpu 1: [ 900.201543][ T5302] iptunnel_xmit+0x514/0x520 [ 900.206127][ T5302] ip_tunnel_xmit+0x9aa/0x1400 [ 900.210893][ T5302] __gre_xmit+0x389/0x4e0 [ 900.215218][ T5302] ipgre_xmit+0x332/0x630 [ 900.219547][ T5302] dev_hard_start_xmit+0xef/0x430 [ 900.224568][ T5302] __dev_queue_xmit+0x14ab/0x1b40 [ 900.229586][ T5302] dev_queue_xmit+0x21/0x30 [ 900.234088][ T5302] __bpf_redirect+0x4b4/0x710 [ 900.238872][ T5302] bpf_clone_redirect+0x1a5/0x1f0 [ 900.243896][ T5302] bpf_prog_bebbfe2050753572+0xd09/0x1000 [ 900.249607][ T5302] bpf_test_run+0x1c3/0x490 [ 900.254101][ T5302] bpf_prog_test_run_skb+0x4da/0x840 [ 900.259380][ T5302] __do_sys_bpf+0x1664/0x2b90 [ 900.264054][ T5302] __x64_sys_bpf+0x4c/0x60 [ 900.268480][ T5302] do_syscall_64+0xcc/0x370 [ 900.272979][ T5302] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 900.278863][ T5302] [ 900.281296][ T5302] Reported by Kernel Concurrency Sanitizer on: [ 900.287444][ T5302] CPU: 1 PID: 5302 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 900.295233][ T5302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 900.305276][ T5302] ================================================================== [ 900.313328][ T5302] Kernel panic - not syncing: panic_on_warn set ... [ 900.319926][ T5302] CPU: 1 PID: 5302 Comm: syz-executor.5 Not tainted 5.4.0-rc6+ #0 [ 900.327732][ T5302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 900.337776][ T5302] Call Trace: [ 900.341079][ T5302] dump_stack+0xf5/0x159 [ 900.345325][ T5302] panic+0x210/0x640 [ 900.349225][ T5302] ? vprintk_func+0x8d/0x140 [ 900.353835][ T5302] kcsan_report.cold+0xc/0xe [ 900.358429][ T5302] kcsan_setup_watchpoint+0x3fe/0x410 [ 900.363819][ T5302] __tsan_unaligned_write8+0x143/0x1f0 [ 900.369282][ T5302] iptunnel_xmit+0x514/0x520 [ 900.373887][ T5302] ip_tunnel_xmit+0x9aa/0x1400 [ 900.378670][ T5302] __gre_xmit+0x389/0x4e0 [ 900.383023][ T5302] ipgre_xmit+0x332/0x630 [ 900.387366][ T5302] dev_hard_start_xmit+0xef/0x430 [ 900.392402][ T5302] __dev_queue_xmit+0x14ab/0x1b40 [ 900.397429][ T5302] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 900.403142][ T5302] ? skb_release_data+0x267/0x3a0 [ 900.408173][ T5302] ? pskb_expand_head+0x353/0x750 [ 900.413195][ T5302] ? __write_once_size+0x5a/0xe0 [ 900.418136][ T5302] dev_queue_xmit+0x21/0x30 [ 900.422643][ T5302] __bpf_redirect+0x4b4/0x710 [ 900.427330][ T5302] bpf_clone_redirect+0x1a5/0x1f0 [ 900.432361][ T5302] bpf_prog_bebbfe2050753572+0xd09/0x1000 [ 900.438083][ T5302] ? __audit_syscall_exit+0x460/0x630 [ 900.443453][ T5302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.449692][ T5302] ? __this_cpu_preempt_check+0x4a/0x170 [ 900.455342][ T5302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.461584][ T5302] ? __perf_event_task_sched_in+0x14d/0x390 [ 900.467475][ T5302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.473716][ T5302] ? __perf_event_task_sched_out+0x14d/0xaa0 [ 900.479699][ T5302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.485939][ T5302] ? _raw_spin_unlock_irq+0x68/0x80 [ 900.491141][ T5302] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 900.497382][ T5302] ? _raw_spin_unlock_irqrestore+0x70/0x80 [ 900.503190][ T5302] ? rcu_preempt_deferred_qs_irqrestore+0x34f/0x580 [ 900.509785][ T5302] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 900.515680][ T5302] ? __read_once_size+0x5a/0xe0 [ 900.520534][ T5302] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 900.526249][ T5302] ? ktime_get+0x1c4/0x210 [ 900.530670][ T5302] bpf_test_run+0x1c3/0x490 [ 900.535187][ T5302] bpf_prog_test_run_skb+0x4da/0x840 [ 900.540473][ T5302] ? bpf_ctx_init+0x150/0x150 [ 900.545151][ T5302] __do_sys_bpf+0x1664/0x2b90 [ 900.549828][ T5302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 900.556066][ T5302] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 900.561972][ T5302] ? __read_once_size+0x5a/0xe0 [ 900.566839][ T5302] __x64_sys_bpf+0x4c/0x60 [ 900.571273][ T5302] do_syscall_64+0xcc/0x370 [ 900.575793][ T5302] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 900.581691][ T5302] RIP: 0033:0x45a219 [ 900.585593][ T5302] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 900.605189][ T5302] RSP: 002b:00007fd481378c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 900.613595][ T5302] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 000000000045a219 [ 900.621560][ T5302] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 900.629529][ T5302] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 900.637513][ T5302] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd4813796d4 [ 900.645486][ T5302] R13: 00000000004c07b2 R14: 00000000004d2fc8 R15: 00000000ffffffff [ 900.654910][ T5302] Kernel Offset: disabled [ 900.659240][ T5302] Rebooting in 86400 seconds..