f09f2228fd0a46ec5398b35ee9a9fe4f789802560cbf4c8c4ca4cf9517cef18ce61c38f71c40122a0baebbeab474dfbf592d094ff4ebca4876e465b88db12b91e36c6fc823f5115a867bb83921485d1b0a00a49eca553e3cf22b0e0e4f515a60c095e1f8bafed4dae84b25c287bec8dfb55aadb4c2ce3afdcbab09677762fdba9b8b80ba222d9edac7f2ad5b291815bf7845fba468a2d5df591ee4503bf92f2959217b9f8021006f1f3dde551c54b32c575252e0b7870b6092e20b191e0ed44ecacac3c4fe1392d3e39f812a2bdcb9ab07656df8475d526f8fe079b9e7e26e1c7285e7e475a7a47e0e4", 0x1000}], 0x6}, 0x2}], 0x5, 0x4040) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x24, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x9}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4010) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x18, 0x35, 0x1829, 0x0, 0x25dfdbff, {0x2803, 0x1000000}, [@nested={0x4}]}, 0x18}}, 0x0) 03:34:45 executing program 0: mknod$loop(0x0, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7ff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) r1 = msgget$private(0x0, 0x200) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000000)=""/9) epoll_wait(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) close(r0) getsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, &(0x7f0000000200)) 03:34:45 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0/../file0\x00', 0x2000000, 0x19c) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x10) open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) accept4(r0, &(0x7f0000000180)=@alg, &(0x7f0000000080)=0x80, 0x800) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) setsockopt$inet6_tcp_int(r1, 0x6, 0xa, &(0x7f0000000000)=0x81, 0x4) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000500)="f4e448731c8631afe1c8bd104c69abeddb3ab54ce71201470971bfd1386da6ff6d59200059a62b1df02bd6d82d8c1c4e0139fc69c3460015963db09173f123b346c065ae37e0a64dfb30e16c1357bca3397e4e14f61124325ee9415377cd905b8ba9932a85ca4c394eeebb81ab6dae188ec7db0979e2399d779b557e8f71ee7b0db27132ed2b755e348b58614f0645a9b89dc93e24c3d4a2eecaaf4eaf34ca8df8fcd8b5855dc55224c7b20900c4a09df179163d215bbf0d51e12ad146910443e721c44785f2da720d71eced16ce4b6142f965122f11b3bda9ab2f58c278ffe0b71dd813f2e5d816db80379fb1ccb7b46b4c14bf") getsockopt$inet_opts(r4, 0x0, 0x400000000000006, &(0x7f0000937fed)=""/16, &(0x7f000021affc)=0x10) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000440)=ANY=[@ANYBLOB="00000000000000008a19cb39357d158f66d0891d5fced9321bc8489c0374209ade8832b4b3721f1b28a9c76b377eb0047198058cca1a6c3250a7d585e0f7b5fd255b30f67a14c32fe9cde2bd823834c0c1d0f3420488ac2d62537ca2e14af8df4ee96d90103e52218dd5ed9663b9cef138a7b9c3964bcf9ebbc33bddc9225414bae035473b14673e0e0c432dfd89edd8a9487cae85db158a63cab63407b1aa6879201425cee9a17b8fbfb4b9b3d38d3ff9fa9f78"], 0x1) mkdirat(0xffffffffffffffff, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0x33, &(0x7f0000000100)=0x5, 0x4) lsetxattr(&(0x7f00000002c0)='./file0/../file0/file0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="6f73782e7365ef759437d5e029616300"], &(0x7f0000000340)='vboxnet0\x00', 0x9, 0x1) ioctl$GIO_SCRNMAP(r2, 0x4b40, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff6000/0x8000)=nil, 0x8000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r5, 0x7fff) sendfile(r2, r5, &(0x7f0000d83ff8), 0x8000fffffffe) 03:34:45 executing program 2: socketpair$unix(0x1, 0x2000000000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2000, 0x0) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000100)=0x226, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x16, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="8500000007dd000046000000000000"], &(0x7f0000000240)='GPL\x00\x83\xff\x13\x0f_\xb0\x0e][dCT\xb6\xe2wp\xc5\xa6$\x1e\x8d\xef\xd6S>*\xe1\x06\xbee\\lRcI!l0\xbb\x1f\x80\xfbE\x0e\xc0\xd5\xbe', 0x1, 0x99, &(0x7f0000000440)=""/153}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xe, 0x0, &(0x7f0000000000)="eb32f4a64c993be0a328dcbc4429", 0x0, 0xf1f}, 0x28) 03:34:45 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x20000, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000040)={0x3, 0xffffffff, 0x8, 0x6, 0x7, 0xe37a, 0x8, 0xfff, 0x7fff, 0x3f}) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, &(0x7f0000003280)={r2, r3+10000000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) readv(r1, &(0x7f00000007c0)=[{&(0x7f0000002300)=""/4096, 0x1000}], 0x30e) 03:34:45 executing program 2: ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, &(0x7f0000000100)={0x0, @bt={0x100, 0x0, 0x1, 0x3, 0x3, 0x4, 0x0, 0x4, 0x0, 0x2fb2, 0x0, 0x6}}) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x4, 0x80) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000080)={0x1, 0x0, 0x103, 0x0, {0x800, 0x3, 0x6, 0xffffffffffffffc1}}) r1 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x100000000000001) dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'qu2zZ\xdeqtC\x9e\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00`\xbe\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) write$sndseq(r1, &(0x7f0000000000)=[{0x26, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0x100000209) 03:34:46 executing program 2: r0 = socket(0x11, 0x800000003, 0x600081) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000001200)={0x0, 0x0, [], @bt={0x100000001, 0x10000, 0x9, 0xdb, 0x9, 0x3, 0x10, 0xd}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001180)) getsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000012c0)=@assoc_id=0x0, &(0x7f0000001300)=0x4) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000001340)={r2, 0x1, 0x3, [0x4, 0x9, 0x204a]}, &(0x7f0000001380)=0xe) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fd) bind(r0, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = dup2(r0, r0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001140)={r3, &(0x7f0000000080)="4c63d003aeedd60997", &(0x7f00000010c0)=""/87}, 0x18) write$tun(r3, &(0x7f00000000c0)=ANY=[@ANYBLOB="ffff0fe6000081000000ffffffffffff000000000000d7b52e2ab5df0000426553b20d6872e0136e4d234b5784b2fef47303cde767ee3794b9c247b320fdafb45c2ba40513010f7f854faa2d428330164a5f338c264bf64947a6f6290300a41250d22c122147872cd04910dab17cac5b4e23d3148cce900f9466e21bdc4ea20c0b6f74d2de714f8239610651766839f0bbd80d5f8e3c0932a71c48b2d5f05e4548f2af5248a58aa4a025ed8ff8845943218b706b0482b7f94904755a327bf892f46cde662d239ca138edccff581f589a2e77ac63c1e64e5c46108e2154a34793d3f17ae3bd7daab02febd7149c62bd7f7843a2984fe646981e7108b00d9a1f110746184531fd93b73ce960cb2a8149d4c6492590dac1cf17ce8f7815fa529b4dc10cd5d1b9f06621e1ffd2b3610791daf5a95951aee02a3c5502b9c8f3e865ca4dd91e736307f3efb77fbb656b47a4e9263de2d042bbc2b0643ab3b3256030da9f1ae5f5bac15a669d6886ebf520c96f8f4b36a840ab8da7eeec0e1d1a7eea67b09b6f176ba8cf23292dab452927348865e1a47668002c27cfaf3d9adc80fc1568bf0b7bdde34e6e738c0000d87e368e10cee479a2b2968c1d880adb3202c63dcbb90431e2c31716a58824653d79ad9135bd16afa8793195996e82456c76b14cc690f04f05c0402343fac765fb0335c36e0dd26d7f73eb0fa2ed9b7fcf85459898c33b063b56f2520f3309ec7288fc40ae7fa36d985f90f5924f94eea72a68092cd61901f3f9eab33728d9e7980d5787f6da2c76f6db1bdce52fe0d7bf21705ce830c72480a50550da1206edbe80d13c6f9dc5587422ff7077193a694a0e26661fc62e1fbc0afa9e4128c554bc5fef0fb977d013206fa062c34ae59a6737861c229db4a889531adbcb3a4392cf19725e6b7d83d606a33c88e670e0cc42d9dc90b30ae6b878777fb1767add7f1e0d9746759c4c32c7d42d95146ab604017d9187613ce105c12adf67d62d62bb57df5d14609fce910073d3ac7d87a401b4e086b800aa90f521f7fb6af69fbff9ada5666d24d4ef7e8b0ef3e7408cad9d555a497db61e5f1a120a178c34907c930329c96724082e3f89f24f3c57848d3c686a1bf0ac8ce6d0913501c9e35f4eed0d00c49681d93adbe7425530c3c5492e8ae0a12b7971beeaf4a08b4bc8bd447d3a7da0e9a08ac9170bc63e23c1e2c31387dd92d98287e2f65608d93c5ad8e565eb93e2edaf455709e18c21c92eba3dbfa757acb11b8f4889048790816196fd47a2f8127cc67bee6389b48f6fdd8402377b35e3c03889f1e6def993f308a1d54c14e7c302ce96db29733b28e4eb2a2e02e04ee737615a9206f4213acafe9b55ab24caec20d397e421b14ed1cd54e44a7d3a42460eb0cfb73a39cf96fcd929ccce28e868ec99a421f9f54d1ecb1a343a9c7aa9bbcf2c304fcd62da7d6774418c861b8ce9594c9a9802cca99635143e6bae96c9669520283a1103a009f4c47beacbb515fb51aec33c8e49c2ca9a3766a4bb63bf4c8b2771283f9c2866992b8a2b4532bfa410384bde3d5de0b02d38633d13037f1538acdb91046dfe194d57cbcf359b831d405826f57a55e6fd6b8beec78c8f539d0fc3c9464a02cb3f59f107a2d5cdfedfa38c48063f64206376b1426dbd681355faad8da06f098e046982e372c0b84c71525dfde26608de6a0b0c430a1f5b3a4de2c9fdb698346eda6a0cb17eea62cf5ea1ae326eb2759483fe14e335bce3abe60ebd883f6d74cb299c0798761a96ada0b28c33a6bddd75587c6dbaf50fa704791cf6805d9a7175ff9545f7b458aa12f0306c786316a18f6f91d12a468d03ad134a952da05a2cac106c6376fac38ef4dec635efb93a84d64d867c697d9eab3ccdfcfc3eb85d86452dc13af7605161ca2c715f17f08a4e8f0fa725d92880a07b3d5a2f9866f148756de4beb5f7413ccce63a41da1a1af7bc3a70d2e50737a0b773c9cd3ff686af57b0e1cbdadbd48d54ea1ee8fda52e8d58fc031f3b362cb66f2959144a32fae0f06b2b34f5bfa83a09fcf68576a4ac3647b2c54c45f6f99e4b26f4da40f3396ee21ac5e3f1a8f6b33d27fc2820069724563708254a7025420f807930f7bb73390616e594112bd7b5f627ad8aacebc821033b07210acff24f796dd83c7d1985b77168601e430609f66a0748b3d2a9d1d59959ebbf74fa94a7914a528bfe7f5738dc596d2d26d66a57f0cde6e2794e51a8fe796451aef43505d4028e96ec29f20a1bd226af4837a687132867a11e37adaba51047f57594dbfb1d9a59a2afe5528ecbf684e8b15f440c89d489f5c79b339adeaa812329638e0ba36207627bec1ebb00b1ffecbcb0bd4d9c08228c09ce40497af2e7476f953f93d9df1290113d4156f3f2288e4a8168ec5a7f62a4f38890db901ea48f7109c2275042a8d1167b12ab4f9509911b7b927cbb8b7f1ad0bb49206b4ea5b3ab7e374a514debc66e6b096364af2910c71f3e2422b20cc2363620939d7dc72702ce94ea0bf1d43a2b1cf556266dbeea93cb883fc1cccbd51fe32264227c75a328636144434dd045696add3fb004669c3e5e5d630533f884fab1f4ebbbda6d5162e3ba163eff8b6f21e7c21dd29b81fdc8c88ae2a6878ec13daa0768629840e1a558deab01301ee7feb8a822aa3a563faace3eedec4d06d105c686e1fe5dc7af2e3e62f120d469b69521c7dfaa4b0df81eedf282e96997f61cb571f408872d68695b5bf91a98056045665486763b2cdfa7c0f70ac04a3e2981c58bd1659b1701b6cb21e329b4aefa0ae4d0054875dc5987b2468f0e8a8383ec3172cee5bf67ee98531b4af08558be11576ba0d04c197f8f7f0b8b357036e96b9cf8625f67cf6446f3d6ad4e7bc657f5311711ffc9b1bce7aa099de701764adfd7523d09ecba04e18c69d365b5a70bc95852057ee760664b1f179f6b4075f04b008f3477b929b00d64a16ce47f63f0406debfb02a06f7f7d3a98b03deb89385bea09c659dabd8cccba18044f7fc40cdbc26278d1c2b683e7af4e49b249e3f190cf8e427c96faca3a3e75d0383ed905505dfe633b6c8aee86999552bf07b6e305e6cac6590f9cbbec53f2c68477ff84200fbf8dc72f37769f10e26f21823a2398f211fa96be31a17482bc14a419ecee0ed35356c7ea84c860fad8abb8b2aa76953e7eafafca9906bd15bee9f115edff6f0aec737fe5ab239f55a0b8521212628d52a0e592b8948815cf13e56b47014826adf2ec5487f619e6afe0302db020badf850ca72fa35922c5aad259df8fd38dc6f182a1d2127dd57f7409245fe4cf77c71278be53249b0be5836968ed5607e45b5563f3e4a0c9f1d04c88c31ef1429a2661008879c9c8714e1125a4a11125b55450412f3317c4505755f9dad11b55e3f0fe2685f44666dfe649f39296838e4c5b6e0f3e47e232382997a27b0330c3d3b64549ba3ea9bdedd140afd4514a76d8cbc7049d62db0c65847735994e12393c2e287722250710dcce7ebbe39f406938db4115bc34ecfddb6fb370a862abebf2b495b552b48f99b207c3ebf87f22693f985d1d29fbbdc3b7f3af97a752880c09b4e1fff5fbad4d157efa4ebb50587357c8e2d81621bf973c490cd9d330a971820db27e58876c89ace5079309e5dcaa2b9eaf8b551d0bfde0d50b39e0e46312c0bf38c068613a0115299bbef9a9b8a2e1cf32b3480a6ca42b8af00f9fd9243f738054b8c35bb30510e4a6f9d63fe54837cc3e7200522a85af1c58ae0ca6185c058da78d4a1bee1ba6ddc0285e8f78271e3b4203a56d54acb2fefee95fd30c74da4deaa287f87092409dcb0487fb67200440a1414b5bad283b276af0edbfdb83d1c2d48e5d771f67d91f9d7b8518121e15ff91a148e5dc8af88c1dc76e2d8231fa08698491522fb7371ae583a8e73bb03c4fb2f9f1be3e7d1f4c9d16aa0035066e26622476399879b00be5761b1f520d2d19746ec6243223ed266169703d8a7b0b49dadc6fd453610bbe05217eed1c988056610946420b34eaa6bdb34cbc8f523f691d5e3b20b611bbf593f42bf6d26282cbabac404e0d5ea06bc953110cbb1a30336f1746009ff5b9fa9ed57ae6da6c662073400d4b52cdebc0c5d627865f9f28bdd9e5a1a3ab4d4a59eeb28e9c79a522f71048605d98c49b1be7e587435ff0ee31b40057c9086092366866d7b6dbf0d02fb1de8627c261628c258e22783e024765412aba14231f774c4c0e92ffe591d8220404c2743c70be2e18774da16ef60e142616968f4bbb714180b05ef2bbcf8c6918a8cb748567e0cfbc6187d9ab0e6782996c379a7c2b4f60fc7168f5770dd1362a00865146fdfd27417fc52e598f3b55919793cd340ff26be24508b0a7c3564d5f97105bd22fd1bf2fae8329d80f4c160cb3bdd5dcbe3cad92b6326e25ceea9d864659f8e36e046a8d3b47b402dc1763caa1a8ed9b23dd9bb984a4697f13e2120b86390598db3ec6d4720624585c7a189ecbc779d4feb2f353cebb03318a3ed7492e02ada18b235693cf96f1ae39645bb779aa9a5eaeed37d9e18f3fe640bf20e5fd0bc36d34ea8245073ffbf64e7024e8753a3a2dd2460986fcce08c176ce85d8417ce599d23ccffa59b4aa5cea1e80af4e20b090e34e7f567706c6c88c325118cb83eb3cfeba6f2bdf846a66961c770c9fa13c06c505abd3435deffaaf4f08c3e4c7e5c3b753b950ea30447948d0a6c48778a5b91f1c9aa3c798d84d6e8fcdf6da7c6f572d9b103251728be1a1ccc0d1f0e93f130a49b642d795beda155fff0ffd72fb53fc0bd9c43db6687494f54dc1fd80f1719379eae1a85a9ac12ff58cd190c5da1189493e052ac12fe48b5dbdee7a5b8c66a49a44e7525f22bcd8b2dc21e40ed3aebfa56fa79f8a4b5570f35c36844eb8bf5c81b64bbec5685331041008f7c7b7f9ff19b68bebed4b5916732f382bfeaab8272e8858c0ee1a685c6ee465f5c08c0719930bdfad822da8e933a76b7ae52732e42c2a8189f52e507ee12ec80facb9742cfe3565deba65b6b6bee6516f948c4bce3422d602965f5a36c5ce5693c7639e69522a3af6bc9bf1421590327ef8eb053a039fc8e3e915d5526ad4aa86fcb416784e3511f06806ce5c83b5e38c69c72bc96f1cc090432e5a6e0ae4699c656ea7f3d90618cab141cd4197f86b4798ee27a25c084b2c332d7646ca1f4e474fc6ef6fbbbb6aa6d7b429fd858623655dfaea04f42c830eda68f23bd8bc54ffd62dbb3863c9f26a7c383209eebe90debaeb91ea6c3826d90eb01a400d7aa3907c3227c4c70ef29272c7446b94cfb2b0e562dad69bd33a2f556c5e3c287fb571319685f7ee02fa5ee54676e3750daf2d6e958aba0de7da9bb0b3b8e7c17cd66e2786b3553bc0f9187aa468b5da98a772aa0b676163d816f41da0a676d6a3e45c3202c035507a2a16fe8cadcb5bae4390cdf536e572d82608fe7e11c0c8eed2af6392be410afef97d8d4500f3d21a23cb368d9764f7a5ad18b6309300ad9b806777a5c6e5389afb44fba9c477e617840ad86b34ac9fad4a76b9abf11c4a5bdc332c5ba57a5badf27b70ac7646ec8ea7c6ed08e50b0a5f82027e2423b9ca7b609fd5b5288514277df699bc0abefca9ad3e3ee93704eea6a18829564d9108febc02da0de79cc43175dc4283440f8dcf772382eec5a1afa8b74d2d34f73af7665f788bf6ec2414a0fdfc5e3af7bbfa16f910fd983a203bd5545a81a21f29bf96f1be001c"], 0xfe6) socket(0x145d87fb814ec671, 0x3, 0xffffffffffffffff) 03:34:46 executing program 2: r0 = socket(0x10, 0x80003, 0xc) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) waitid(0x0, r1, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_nanosleep(0x7, 0x0, &(0x7f0000000040)={r2, r3+10000000}, &(0x7f0000000100)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x88000, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) write(r0, &(0x7f00000000c0)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f0000000080)="1f0000000104ff04fd4354c007110000f305010008000100020423dcffdf00", 0x1f) [ 1065.153013][ T605] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1065.163097][ T605] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 03:34:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x6, &(0x7f0000000080)=0x0) close(r0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x800008, 0x202) io_submit(r1, 0x1, &(0x7f00000000c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) [ 1065.952657][ T607] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1065.954266][ T608] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.2'. 03:34:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='sy\xf1>u\xb8U\xc4\xca\xff\x97\xdaA\\\xf7\xe1\xb9\'\xb4\xcaW', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0xfffffffffffffdd1) r3 = socket$kcm(0x29, 0x200000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000240)={r0, r2}) write$FUSE_NOTIFY_STORE(r3, &(0x7f0000000140)=ANY=[@ANYBLOB='.'], 0x1) iopl(0xa4c) close(r3) 03:34:47 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffd76}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100030e000000030000000000000005000600000000000a0000400000000400000000000000000000002100004000000100000000000002000100010000fdff00000200fd000005000500000000000a004872bbb6896209000000000000009aec3f3f7710aa000000ff1700400000"], 0x70}}, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000200)={0x5, &(0x7f0000000140)="b9"}) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x81) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000240)=ANY=[@ANYRES32=0x0, @ANYBLOB="c3000000b3b3be15740c7e030c0d5f00cbf154fe8f7d34c4f5e02c5b8bfe6f212234d303bf942de028e7d15617a8b78c1af085874021af36b9d988233e05214a5fdbfe790b42a9dc30a836e814f5020c2813505975ade4d5889bb90f060abc981d53a731db73a82824c349a25fa945bd276abe1d5f28dec09f01ea0cf4952940f0416dd099489a0633b37967439bd49ea134985f806bd62a83be81e430cf0a85f5d7354a0bf3c8c2a54d90a23f60770a1bca6bca19b1af2736f7b0601989285a399410"], &(0x7f0000000340)=0xcb) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000380)={r3, @in6={{0xa, 0x4e20, 0x8, @loopback, 0xffffffffffffff80}}}, &(0x7f0000000440)=0x84) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r2, 0x3) sendmmsg(r0, &(0x7f0000000180), 0x8000000000000e3, 0x0) 03:34:47 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x22200) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x78) ioctl$TIOCNXCL(r2, 0x540d) r3 = socket$inet(0x10, 0x3, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0xffffffffffffff7a, &(0x7f0000000340), 0x1, 0x0, 0x35f}, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x0, r4}) 03:34:47 executing program 2: r0 = socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200000100000890e, &(0x7f0000000100)="0adc1f123c123f3188b070") pipe(&(0x7f0000000000)) write(r0, &(0x7f0000000100)="2400000052001f0014000000000000000200071008000100ffffffff0800000000000000", 0x24) 03:34:47 executing program 2: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0xaa72, 0x200000) r1 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x5, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x2000) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000200)={0x0, r2, 0xd, 0x1}, 0x14) setsockopt$bt_hci_HCI_TIME_STAMP(r2, 0x0, 0x3, &(0x7f0000000080)=0x1000, 0x4) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000100)={0x2, @reserved}) fsetxattr$trusted_overlay_origin(r2, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) ioctl$FICLONE(r1, 0x40049409, r0) 03:34:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x9, &(0x7f0000000100)=0x8000, 0x4) getsockopt$sock_buf(r0, 0x1, 0x37, &(0x7f0000000180)=""/211, &(0x7f0000000280)=0xd3) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f00000000c0), &(0x7f0000000140)=0x4) getsockopt$inet_tcp_int(r2, 0x6, 0x9, 0x0, &(0x7f0000000080)) 03:34:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video37\x00', 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x175000, 0x0) ioctl$VIDIOC_ENUMINPUT(r1, 0xc050561a, &(0x7f0000000140)={0x0, "1db7e86447698efea9e92d5edf4905276e893255148947c2894fbc0b70eb8627", 0x3, 0x496, 0x3, 0x402004, 0x20004, 0x2}) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000300)={0x56aa, 0xd, 0x0, 0xffffffffffffffff}) mmap(&(0x7f0000007000/0x3000)=nil, 0x3000, 0x0, 0x6012, r3, 0x2000) 03:34:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0xc0000, 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f00000000c0)={0x0, r2, 0x1}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEBUGREGS(r3, 0x4080aea2, &(0x7f0000000180)={[], 0x0, 0x4}) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000300)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:34:47 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = semget(0x2, 0x7, 0xd) semctl$GETVAL(r0, 0x4, 0xc, &(0x7f0000000200)=""/4096) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffff9c}, 0x1df) r1 = socket$kcm(0xa, 0x2, 0x0) r2 = socket$kcm(0xa, 0x100000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x890c, &(0x7f0000000000)) 03:34:47 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x80, 0x1) getsockname$unix(r1, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000040)={{0x10001, 0x5, 0x100000000, 0x2}, 'syz0\x00', 0x40}) bind$nfc_llcp(r0, 0x0, 0x0) 03:34:47 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x2000, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x70, 0x5, 0x48, 0x6a69, 0xfffffffffffff001, 0x0, 0x4, 0x40082, 0x7, 0x10000, 0x0, 0x4, 0x9, 0x8, 0x100, 0xc4de, 0x80000000, 0x800, 0x0, 0x1, 0xff8, 0x10000, 0xd5d, 0x1, 0x0, 0x5, 0x7, 0xd7, 0x1000, 0x3, 0x7fffffff, 0x5, 0x8, 0x1, 0x3, 0x800, 0x0, 0x0, 0x236, 0x4, @perf_config_ext={0xbdb, 0x4}, 0x440, 0x962b, 0xfffffffffffff000, 0x8, 0x7, 0x101, 0xa1cf}, r1, 0x5, 0xffffffffffffffff, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x200}], 0x30}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000200)=""/98, 0x1ac}, {&(0x7f0000000280)=""/112, 0x7fffef4a}, {&(0x7f0000000340)=""/249, 0x20000439}], 0x4}}], 0x1, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0a0800023c390d3188b070") 03:34:48 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x58) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x2000, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x70, 0x5, 0x48, 0x6a69, 0xfffffffffffff001, 0x0, 0x4, 0x40082, 0x7, 0x10000, 0x0, 0x4, 0x9, 0x8, 0x100, 0xc4de, 0x80000000, 0x800, 0x0, 0x1, 0xff8, 0x10000, 0xd5d, 0x1, 0x0, 0x5, 0x7, 0xd7, 0x1000, 0x3, 0x7fffffff, 0x5, 0x8, 0x1, 0x3, 0x800, 0x0, 0x0, 0x236, 0x4, @perf_config_ext={0xbdb, 0x4}, 0x440, 0x962b, 0xfffffffffffff000, 0x8, 0x7, 0x101, 0xa1cf}, r1, 0x5, 0xffffffffffffffff, 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x200}], 0x30}, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r2, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000200)=""/98, 0x1ac}, {&(0x7f0000000280)=""/112, 0x7fffef4a}, {&(0x7f0000000340)=""/249, 0x20000439}], 0x4}}], 0x1, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0a0800023c390d3188b070") 03:34:49 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r2 = socket(0x200000000000011, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'ip6gre0\x00', 0x0}) connect$bt_l2cap(r2, &(0x7f0000000180)={0x1f, 0x9, {0x4a, 0x7f, 0xffffffff, 0x200000000000000, 0x4, 0x2ad}, 0xff, 0x61}, 0xe) bind$packet(r2, &(0x7f0000000200)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @dev}, 0x14) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000240)={0x0, 0x5f, 0xaff, 0xffff, 0x1, 0x7f}, &(0x7f0000000280)=0x14) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000002c0)={r4}, 0x8) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000040)=0x400, 0x4) fcntl$setstatus(r1, 0x4, 0x4800) r5 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xa186, 0x101) ioctl$KVM_RUN(r5, 0xae80, 0x0) setsockopt$packet_int(r5, 0x107, 0xe, &(0x7f0000000340)=0x20004, 0xfffffffffffffdf3) vmsplice(r5, &(0x7f0000000300)=[{&(0x7f0000000380)="6fa9415f35ad50a6357101e279e988a444bc7a4b7c2a7a19bc9cd50117f9ac46b73c9626cb2f3d7e7e142679e83fa6f48343d6a191331740d3f1e6dd4a49bfd5cae59363c647c0d958c94428e1a4c2a6698ef75de1f2a455483f0e594f178e9ec04237d3fde911a531ed9498cc0ab90d31a6c2d0be047924c90e141a1c862d6d34586c7b9bddbd30a0ec9a9811123099deb984d2de0678cf24c6fbaa2e04f18c8ec297692f4621f12cce361845c2d731c9e1f09201ac27bbda52a0ef47374c", 0xbf}, {&(0x7f0000000000)="f60dfc26dfa4cbfd", 0x8}], 0x2, 0x4) io_setup(0x40, &(0x7f00000000c0)=0x0) syncfs(r1) io_submit(r6, 0x1, &(0x7f0000000080)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000040), 0xfdef}]) ioctl$SNDRV_TIMER_IOCTL_START(r5, 0x54a0) 03:34:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/raw6\x00') ioctl$DRM_IOCTL_ADD_CTX(r3, 0xc0086420, &(0x7f0000000080)) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000140)={0x0, r2}) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x1}) 03:34:49 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0xffffffff) bind$inet6(r0, &(0x7f0000d85fe4)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6(0xa, 0x4, 0x2) setsockopt$inet6_udp_int(r1, 0x11, 0x100000000a, &(0x7f00000003c0)=0x800000001, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x8800, &(0x7f0000000000)={0xa, 0x4e23, 0x2ecb, @ipv4}, 0x1c) sendto$inet6(r0, &(0x7f00000000c0)="dd", 0x1, 0x0, 0x0, 0x0) recvfrom(r0, 0x0, 0x0, 0x22, 0x0, 0x0) 03:34:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x6, @local, 0x8}}, 0x8, 0x2, 0x6, 0x100000001, 0x1}, &(0x7f00000001c0)=0x98) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20\x00', 0x10000, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r1, 0x8, 0xff}, 0x8) timer_create(0x1, &(0x7f00000000c0)={0x0, 0x3c, 0x4, @thr={&(0x7f0000000000)="c2349b1099e7202c1f3ea0419202e1e34d4a9ca436ba5bbfffd6611afd89f0045781c177ddd6b1ac78d1ec6eea", &(0x7f0000000340)="492269fa8bfdccf526f9cc79828623d933513b4aaba1682e3963a1c4cb530d5be0ccd747ed107e839b98d62f3b8bd2d6d1a069010ec808e647ba356776d2ee4e16c536ff17f8dd519b1e65f8f1007d0a1c3e3d0312e29e483ba3cb0702a437322bc347b0895f687023d524ebf040c0b5f34e541ac4c2e415eefcdebbe1633f8dffcb47728a5d6b2170ff2bf8ee33dac2959627f1a1337a2edd80f3989384e866de26a92c84adf8cde2c7f3f063786d221818f56ab5e6c74083d00b2d5172"}}, &(0x7f0000000100)) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000640)='trusted.overlay.redirect\x00', &(0x7f0000000680)='./file0\x00', 0x8, 0x2) r3 = openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) sendto$unix(r2, &(0x7f0000000580)="c1428c8af2d4b5de060000002859842f6bce030500000000000000", 0x1b, 0x800, &(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0xff42) write$cgroup_pid(r4, &(0x7f0000000300), 0x5) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x6, @local, 0x8}}, 0x8, 0x2, 0x6, 0x100000001, 0x1}, &(0x7f00000001c0)=0x98) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20\x00', 0x10000, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r1, 0x8, 0xff}, 0x8) timer_create(0x1, &(0x7f00000000c0)={0x0, 0x3c, 0x4, @thr={&(0x7f0000000000)="c2349b1099e7202c1f3ea0419202e1e34d4a9ca436ba5bbfffd6611afd89f0045781c177ddd6b1ac78d1ec6eea", &(0x7f0000000340)="492269fa8bfdccf526f9cc79828623d933513b4aaba1682e3963a1c4cb530d5be0ccd747ed107e839b98d62f3b8bd2d6d1a069010ec808e647ba356776d2ee4e16c536ff17f8dd519b1e65f8f1007d0a1c3e3d0312e29e483ba3cb0702a437322bc347b0895f687023d524ebf040c0b5f34e541ac4c2e415eefcdebbe1633f8dffcb47728a5d6b2170ff2bf8ee33dac2959627f1a1337a2edd80f3989384e866de26a92c84adf8cde2c7f3f063786d221818f56ab5e6c74083d00b2d5172"}}, &(0x7f0000000100)) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000640)='trusted.overlay.redirect\x00', &(0x7f0000000680)='./file0\x00', 0x8, 0x2) r3 = openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) sendto$unix(r2, &(0x7f0000000580)="c1428c8af2d4b5de060000002859842f6bce030500000000000000", 0x1b, 0x800, &(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0xff42) write$cgroup_pid(r4, &(0x7f0000000300), 0x5) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x6, @local, 0x8}}, 0x8, 0x2, 0x6, 0x100000001, 0x1}, &(0x7f00000001c0)=0x98) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20\x00', 0x10000, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r1, 0x8, 0xff}, 0x8) timer_create(0x1, &(0x7f00000000c0)={0x0, 0x3c, 0x4, @thr={&(0x7f0000000000)="c2349b1099e7202c1f3ea0419202e1e34d4a9ca436ba5bbfffd6611afd89f0045781c177ddd6b1ac78d1ec6eea", &(0x7f0000000340)="492269fa8bfdccf526f9cc79828623d933513b4aaba1682e3963a1c4cb530d5be0ccd747ed107e839b98d62f3b8bd2d6d1a069010ec808e647ba356776d2ee4e16c536ff17f8dd519b1e65f8f1007d0a1c3e3d0312e29e483ba3cb0702a437322bc347b0895f687023d524ebf040c0b5f34e541ac4c2e415eefcdebbe1633f8dffcb47728a5d6b2170ff2bf8ee33dac2959627f1a1337a2edd80f3989384e866de26a92c84adf8cde2c7f3f063786d221818f56ab5e6c74083d00b2d5172"}}, &(0x7f0000000100)) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000640)='trusted.overlay.redirect\x00', &(0x7f0000000680)='./file0\x00', 0x8, 0x2) r3 = openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) sendto$unix(r2, &(0x7f0000000580)="c1428c8af2d4b5de060000002859842f6bce030500000000000000", 0x1b, 0x800, &(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0xff42) write$cgroup_pid(r4, &(0x7f0000000300), 0x5) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x6, @local, 0x8}}, 0x8, 0x2, 0x6, 0x100000001, 0x1}, &(0x7f00000001c0)=0x98) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20\x00', 0x10000, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r1, 0x8, 0xff}, 0x8) timer_create(0x1, &(0x7f00000000c0)={0x0, 0x3c, 0x4, @thr={&(0x7f0000000000)="c2349b1099e7202c1f3ea0419202e1e34d4a9ca436ba5bbfffd6611afd89f0045781c177ddd6b1ac78d1ec6eea", &(0x7f0000000340)="492269fa8bfdccf526f9cc79828623d933513b4aaba1682e3963a1c4cb530d5be0ccd747ed107e839b98d62f3b8bd2d6d1a069010ec808e647ba356776d2ee4e16c536ff17f8dd519b1e65f8f1007d0a1c3e3d0312e29e483ba3cb0702a437322bc347b0895f687023d524ebf040c0b5f34e541ac4c2e415eefcdebbe1633f8dffcb47728a5d6b2170ff2bf8ee33dac2959627f1a1337a2edd80f3989384e866de26a92c84adf8cde2c7f3f063786d221818f56ab5e6c74083d00b2d5172"}}, &(0x7f0000000100)) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000640)='trusted.overlay.redirect\x00', &(0x7f0000000680)='./file0\x00', 0x8, 0x2) r3 = openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) sendto$unix(r2, &(0x7f0000000580)="c1428c8af2d4b5de060000002859842f6bce030500000000000000", 0x1b, 0x800, &(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0xff42) write$cgroup_pid(r4, &(0x7f0000000300), 0x5) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x6, @local, 0x8}}, 0x8, 0x2, 0x6, 0x100000001, 0x1}, &(0x7f00000001c0)=0x98) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20\x00', 0x10000, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r1, 0x8, 0xff}, 0x8) timer_create(0x1, &(0x7f00000000c0)={0x0, 0x3c, 0x4, @thr={&(0x7f0000000000)="c2349b1099e7202c1f3ea0419202e1e34d4a9ca436ba5bbfffd6611afd89f0045781c177ddd6b1ac78d1ec6eea", &(0x7f0000000340)="492269fa8bfdccf526f9cc79828623d933513b4aaba1682e3963a1c4cb530d5be0ccd747ed107e839b98d62f3b8bd2d6d1a069010ec808e647ba356776d2ee4e16c536ff17f8dd519b1e65f8f1007d0a1c3e3d0312e29e483ba3cb0702a437322bc347b0895f687023d524ebf040c0b5f34e541ac4c2e415eefcdebbe1633f8dffcb47728a5d6b2170ff2bf8ee33dac2959627f1a1337a2edd80f3989384e866de26a92c84adf8cde2c7f3f063786d221818f56ab5e6c74083d00b2d5172"}}, &(0x7f0000000100)) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000640)='trusted.overlay.redirect\x00', &(0x7f0000000680)='./file0\x00', 0x8, 0x2) r3 = openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) sendto$unix(r2, &(0x7f0000000580)="c1428c8af2d4b5de060000002859842f6bce030500000000000000", 0x1b, 0x800, &(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0xff42) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x6, @local, 0x8}}, 0x8, 0x2, 0x6, 0x100000001, 0x1}, &(0x7f00000001c0)=0x98) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20\x00', 0x10000, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r1, 0x8, 0xff}, 0x8) timer_create(0x1, &(0x7f00000000c0)={0x0, 0x3c, 0x4, @thr={&(0x7f0000000000)="c2349b1099e7202c1f3ea0419202e1e34d4a9ca436ba5bbfffd6611afd89f0045781c177ddd6b1ac78d1ec6eea", &(0x7f0000000340)="492269fa8bfdccf526f9cc79828623d933513b4aaba1682e3963a1c4cb530d5be0ccd747ed107e839b98d62f3b8bd2d6d1a069010ec808e647ba356776d2ee4e16c536ff17f8dd519b1e65f8f1007d0a1c3e3d0312e29e483ba3cb0702a437322bc347b0895f687023d524ebf040c0b5f34e541ac4c2e415eefcdebbe1633f8dffcb47728a5d6b2170ff2bf8ee33dac2959627f1a1337a2edd80f3989384e866de26a92c84adf8cde2c7f3f063786d221818f56ab5e6c74083d00b2d5172"}}, &(0x7f0000000100)) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000640)='trusted.overlay.redirect\x00', &(0x7f0000000680)='./file0\x00', 0x8, 0x2) r3 = openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r3, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x6, @local, 0x8}}, 0x8, 0x2, 0x6, 0x100000001, 0x1}, &(0x7f00000001c0)=0x98) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20\x00', 0x10000, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r1, 0x8, 0xff}, 0x8) timer_create(0x1, &(0x7f00000000c0)={0x0, 0x3c, 0x4, @thr={&(0x7f0000000000)="c2349b1099e7202c1f3ea0419202e1e34d4a9ca436ba5bbfffd6611afd89f0045781c177ddd6b1ac78d1ec6eea", &(0x7f0000000340)="492269fa8bfdccf526f9cc79828623d933513b4aaba1682e3963a1c4cb530d5be0ccd747ed107e839b98d62f3b8bd2d6d1a069010ec808e647ba356776d2ee4e16c536ff17f8dd519b1e65f8f1007d0a1c3e3d0312e29e483ba3cb0702a437322bc347b0895f687023d524ebf040c0b5f34e541ac4c2e415eefcdebbe1633f8dffcb47728a5d6b2170ff2bf8ee33dac2959627f1a1337a2edd80f3989384e866de26a92c84adf8cde2c7f3f063786d221818f56ab5e6c74083d00b2d5172"}}, &(0x7f0000000100)) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000640)='trusted.overlay.redirect\x00', &(0x7f0000000680)='./file0\x00', 0x8, 0x2) openat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x200002, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x6, @local, 0x8}}, 0x8, 0x2, 0x6, 0x100000001, 0x1}, &(0x7f00000001c0)=0x98) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20\x00', 0x10000, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r1, 0x8, 0xff}, 0x8) timer_create(0x1, &(0x7f00000000c0)={0x0, 0x3c, 0x4, @thr={&(0x7f0000000000)="c2349b1099e7202c1f3ea0419202e1e34d4a9ca436ba5bbfffd6611afd89f0045781c177ddd6b1ac78d1ec6eea", &(0x7f0000000340)="492269fa8bfdccf526f9cc79828623d933513b4aaba1682e3963a1c4cb530d5be0ccd747ed107e839b98d62f3b8bd2d6d1a069010ec808e647ba356776d2ee4e16c536ff17f8dd519b1e65f8f1007d0a1c3e3d0312e29e483ba3cb0702a437322bc347b0895f687023d524ebf040c0b5f34e541ac4c2e415eefcdebbe1633f8dffcb47728a5d6b2170ff2bf8ee33dac2959627f1a1337a2edd80f3989384e866de26a92c84adf8cde2c7f3f063786d221818f56ab5e6c74083d00b2d5172"}}, &(0x7f0000000100)) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000640)='trusted.overlay.redirect\x00', &(0x7f0000000680)='./file0\x00', 0x8, 0x2) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x6, @local, 0x8}}, 0x8, 0x2, 0x6, 0x100000001, 0x1}, &(0x7f00000001c0)=0x98) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20\x00', 0x10000, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r1, 0x8, 0xff}, 0x8) timer_create(0x1, &(0x7f00000000c0)={0x0, 0x3c, 0x4, @thr={&(0x7f0000000000)="c2349b1099e7202c1f3ea0419202e1e34d4a9ca436ba5bbfffd6611afd89f0045781c177ddd6b1ac78d1ec6eea", &(0x7f0000000340)="492269fa8bfdccf526f9cc79828623d933513b4aaba1682e3963a1c4cb530d5be0ccd747ed107e839b98d62f3b8bd2d6d1a069010ec808e647ba356776d2ee4e16c536ff17f8dd519b1e65f8f1007d0a1c3e3d0312e29e483ba3cb0702a437322bc347b0895f687023d524ebf040c0b5f34e541ac4c2e415eefcdebbe1633f8dffcb47728a5d6b2170ff2bf8ee33dac2959627f1a1337a2edd80f3989384e866de26a92c84adf8cde2c7f3f063786d221818f56ab5e6c74083d00b2d5172"}}, &(0x7f0000000100)) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x6, @local, 0x8}}, 0x8, 0x2, 0x6, 0x100000001, 0x1}, &(0x7f00000001c0)=0x98) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20\x00', 0x10000, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000240)={r1, 0x8, 0xff}, 0x8) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x6, @local, 0x8}}, 0x8, 0x2, 0x6, 0x100000001, 0x1}, &(0x7f00000001c0)=0x98) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000500)='/proc/capi/capi20\x00', 0x10000, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e22, 0x6, @local, 0x8}}, 0x8, 0x2, 0x6, 0x100000001, 0x1}, &(0x7f00000001c0)=0x98) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:49 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:50 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:50 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:50 executing program 2: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:50 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:50 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:50 executing program 2: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) [ 1068.889634][ C1] net_ratelimit: 23 callbacks suppressed [ 1068.889643][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1068.901352][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:34:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(0x0, &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(0x0, &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(0x0, &(0x7f00000004c0)='security.SMACK64MMAP\x00', &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', 0x0, &(0x7f0000000540)='\xbd\xd9L\x14\x0e\xa5\x9eS\x13.\x00', 0xb, 0x3) 03:34:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x3) 03:34:50 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) [ 1070.009112][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1070.014934][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1070.020781][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1070.026554][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1070.089127][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1070.089260][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1070.094991][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1070.100728][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:34:52 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000080)={0x98f901}) 03:34:52 executing program 1: syz_open_dev$sndpcmc(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80005, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000180)={0x0, 0x4, 0xf8ba, 0x0, 0xaa09, 0x5, 0x4, 0x10000, 0x1000, 0x65, 0x69406e46, 0x1, 0x0, 0x4, 0x0, 0x1, 0x7fff, 0x5, 0xa7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x0, 0xffffffff00000000}}], 0x48, 0x7}, 0x0) 03:34:52 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) close(r0) 03:34:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) utimes(&(0x7f0000000080)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:34:52 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 03:34:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a01002356ba602dff05000b", 0x10) write$binfmt_elf32(r2, &(0x7f0000000100)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYRESHEX=0x0], 0x3a) recvmmsg(r2, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x228, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) read(0xffffffffffffffff, 0x0, 0x0) ioctl$int_out(r0, 0x2, 0x0) ptrace$getregs(0xe, 0x0, 0x1875, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) 03:34:52 executing program 3 (fault-call:2 fault-nth:0): mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:34:52 executing program 0: r0 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000180)={0xb, 0x10, 0xfa00, {&(0x7f0000000040), r1, 0x5}}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'bpq0\x00', 0x1}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) ioctl$UI_DEV_DESTROY(r0, 0x5502) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000200)={r0, 0x1, 0x0, 0xffffffffffffffe1, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) accept4(r2, &(0x7f00000002c0), &(0x7f0000000380)=0x80, 0x80800) socket$bt_rfcomm(0x1f, 0x3, 0x3) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000240)={0x1, 0x9}) 03:34:52 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) r0 = socket$inet(0x2, 0x3, 0x2) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) setsockopt$inet_int(r0, 0x0, 0xca, 0x0, 0x0) [ 1071.195980][ T740] rdma_op 0000000008ccbf6e conn xmit_rdma (null) 03:34:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a01002356ba602dff05000b", 0x10) write$binfmt_elf32(r2, &(0x7f0000000100)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYRESHEX=0x0], 0x3a) recvmmsg(r2, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x228, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) read(0xffffffffffffffff, 0x0, 0x0) ioctl$int_out(r0, 0x2, 0x0) ptrace$getregs(0xe, 0x0, 0x1875, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) [ 1071.237671][ T755] rdma_op 00000000cff30598 conn xmit_rdma (null) 03:34:52 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:34:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"]}) r1 = syz_open_dev$evdev(&(0x7f00000003c0)='/dev/input/event#\x00', 0x0, 0x28021) write$evdev(r1, &(0x7f0000000040)=[{}, {{0x0, 0x7530}}], 0xff3e) ppoll(&(0x7f0000000180)=[{}], 0x20000000000000fc, 0x0, 0x0, 0xfffffffffffffef1) 03:34:52 executing program 1: syz_open_dev$sndpcmc(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80005, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000180)={0x0, 0x4, 0xf8ba, 0x0, 0xaa09, 0x5, 0x4, 0x10000, 0x1000, 0x65, 0x69406e46, 0x1, 0x0, 0x4, 0x0, 0x1, 0x7fff, 0x5, 0xa7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x0, 0xffffffff00000000}}], 0x48, 0x7}, 0x0) 03:34:52 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@pkt_toobig={0xffffff83, 0x0, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @dev}}}}}}}}, 0x0) 03:34:52 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a01002356ba602dff05000b", 0x10) write$binfmt_elf32(r2, &(0x7f0000000100)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYRESHEX=0x0], 0x3a) recvmmsg(r2, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x228, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) read(0xffffffffffffffff, 0x0, 0x0) ioctl$int_out(r0, 0x2, 0x0) ptrace$getregs(0xe, 0x0, 0x1875, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) 03:34:53 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x31, 0x0, 0x0) 03:34:53 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='tecurity.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:34:53 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffff}) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 03:34:53 executing program 1: syz_open_dev$sndpcmc(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80005, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000180)={0x0, 0x4, 0xf8ba, 0x0, 0xaa09, 0x5, 0x4, 0x10000, 0x1000, 0x65, 0x69406e46, 0x1, 0x0, 0x4, 0x0, 0x1, 0x7fff, 0x5, 0xa7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x0, 0xffffffff00000000}}], 0x48, 0x7}, 0x0) 03:34:53 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@pkt_toobig={0xffffff83, 0x0, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @dev}}}}}}}}, 0x0) 03:34:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0x200, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000400)="d3ab27191a01002356ba602dff05000b", 0x10) write$binfmt_elf32(r2, &(0x7f0000000100)=ANY=[@ANYRESDEC, @ANYRESDEC, @ANYRESHEX=0x0], 0x3a) recvmmsg(r2, &(0x7f00000062c0)=[{{&(0x7f0000002bc0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000003ec0), 0x3, &(0x7f0000000440)=""/190, 0xfb}}, {{&(0x7f0000004000)=@ipx, 0x80, &(0x7f0000006180), 0x228, &(0x7f00000061c0)=""/240, 0xf0}}], 0x400000000000399, 0x0, &(0x7f0000006400)={0x77359400}) read(0xffffffffffffffff, 0x0, 0x0) ioctl$int_out(r0, 0x2, 0x0) ptrace$getregs(0xe, 0x0, 0x1875, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) 03:34:53 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@pkt_toobig={0xffffff83, 0x0, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @dev}}}}}}}}, 0x0) 03:34:53 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='securisy.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:34:53 executing program 5: syz_emit_ethernet(0x21a, &(0x7f000070aef1)={@local, @empty=[0x3, 0x0, 0x14], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @broadcast}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 03:34:53 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001800)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000080)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0xaf02, 0x0) [ 1072.062250][ T790] rdma_op 00000000d510dd01 conn xmit_rdma (null) 03:34:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f3188b070") getrandom(&(0x7f0000000000)=""/91, 0x5b, 0x3) getgid() 03:34:53 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security/SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:34:53 executing program 1: syz_open_dev$sndpcmc(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x80005, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) ioctl$KVM_SET_VCPU_EVENTS(0xffffffffffffffff, 0x4040aea0, &(0x7f0000000180)={0x0, 0x4, 0xf8ba, 0x0, 0xaa09, 0x5, 0x4, 0x10000, 0x1000, 0x65, 0x69406e46, 0x1, 0x0, 0x4, 0x0, 0x1, 0x7fff, 0x5, 0xa7}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000100), 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {&(0x7f0000000040)=""/156, 0x80305}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}, {&(0x7f00000001c0)=""/67, 0x43}, {&(0x7f0000000240)=""/198, 0xc6}, {&(0x7f0000000140)=""/15, 0xf}, {&(0x7f0000000340)=""/54, 0x7ffff}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f00000003c0)=""/77, 0x4d}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/219, 0xdb}], 0x7, 0x0, 0xffffffff00000000}}], 0x48, 0x7}, 0x0) 03:34:53 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000040)={@link_local, @random="b42d87402e52", [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x30, 0x3a, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @mcast2, {[], @icmpv6=@pkt_toobig={0xffffff83, 0x0, 0x0, 0x0, {0x0, 0x6, "0a07ec", 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}, @ipv4={[0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2], [], @dev}}}}}}}}, 0x0) 03:34:53 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000100)) 03:34:53 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffff}) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 03:34:53 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r0, 0x800000c0045006, &(0x7f0000000000)) 03:34:53 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x02', 0x0, 0x0, 0x0) 03:34:53 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b7028a889a73f1803a08092ccde170ff6041a9ca844e75a67c86d665069cfc07128e5a406634aae87d13ed0d5fb62d3f2ed2eea2480d6525417bd176b15974760833140803ed3080cb1ea09851b99c30ad32b6388ca48e6", 0x159, 0x10000}], 0x0, 0x0) close(r0) [ 1072.382139][ T807] rdma_op 00000000c9da7e90 conn xmit_rdma (null) 03:34:53 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x280000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000001040)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x1ed) shutdown(r0, 0x1) 03:34:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000340)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') close(r1) 03:34:53 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x04', 0x0, 0x0, 0x0) 03:34:53 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000100)) 03:34:53 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) close(r0) 03:34:53 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:34:53 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x74eda5c2}) 03:34:53 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x0, @local}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @broadcast}}) 03:34:54 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffff}) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 03:34:54 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000100)) 03:34:54 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:34:54 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) close(r0) 03:34:54 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2200000021000707000000000900e4010a00001efffff000ff080400050015800241", 0x22) 03:34:54 executing program 2: r0 = socket$inet(0x10, 0x4000000000003, 0x80000000c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2400000004011f001cfffd946fa2830020200a006000010006e70000000064a204040800", 0x24}], 0x1}, 0x0) 03:34:54 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000100)) 03:34:54 executing program 1: r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000440)="2e000000130081c5e4050cecdb4cb9040a485e432500000000fffffff032f9000600b0ebb06ac40004001400f9ff", 0x2e}], 0x1}, 0x0) [ 1072.921978][ T862] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1072.995608][ T866] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.1'. 03:34:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000000)=@name, 0x10) bind$tipc(r1, &(0x7f0000000100)=@name, 0x10) r2 = socket(0x1e, 0x5, 0x0) sendmsg(r2, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 03:34:54 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_EPOCH_READ(r0, 0xc0287c02, &(0x7f0000000040)) 03:34:54 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(&(0x7f0000000300), 0x0) write$binfmt_script(r3, &(0x7f0000000200)={'#! ', './file0', [{0x20, '/dev/full\x00'}], 0xa, "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"}, 0x178) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r3, 0x0) write$FUSE_INIT(r3, &(0x7f0000000100)={0x50}, 0x50) splice(r0, &(0x7f00000001c0), r1, 0x0, 0x6000000000000000, 0x0) 03:34:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000000)=@name, 0x10) bind$tipc(r1, &(0x7f0000000100)=@name, 0x10) r2 = socket(0x1e, 0x5, 0x0) sendmsg(r2, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 03:34:54 executing program 0: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffffffff}) fallocate(r0, 0x20, 0x0, 0xfffffeff000) 03:34:54 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_EPOCH_READ(r0, 0xc0287c02, &(0x7f0000000040)) [ 1074.167217][ C0] net_ratelimit: 15 callbacks suppressed [ 1074.167227][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1074.178926][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1074.184768][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1074.190622][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1074.247002][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1074.247036][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1074.252837][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1074.326936][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1074.332809][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1075.136576][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1075.329460][T16573] bridge0: port 3(gretap0) entered disabled state [ 1075.338687][T16573] device gretap0 left promiscuous mode [ 1075.344194][T16573] bridge0: port 3(gretap0) entered disabled state [ 1075.694761][ T888] IPVS: ftp: loaded support on port[0] = 21 [ 1075.785052][ T888] chnl_net:caif_netlink_parms(): no params data found [ 1075.814111][ T888] bridge0: port 1(bridge_slave_0) entered blocking state [ 1075.821581][ T888] bridge0: port 1(bridge_slave_0) entered disabled state [ 1075.830074][ T888] device bridge_slave_0 entered promiscuous mode [ 1075.838579][ T888] bridge0: port 2(bridge_slave_1) entered blocking state [ 1075.845904][ T888] bridge0: port 2(bridge_slave_1) entered disabled state [ 1075.854154][ T888] device bridge_slave_1 entered promiscuous mode [ 1075.943900][ T888] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1075.954774][ T888] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1075.973798][ T888] team0: Port device team_slave_0 added [ 1075.981396][ T888] team0: Port device team_slave_1 added [ 1076.049169][ T888] device hsr_slave_0 entered promiscuous mode [ 1076.106429][ T888] device hsr_slave_1 entered promiscuous mode [ 1076.235664][ T888] bridge0: port 2(bridge_slave_1) entered blocking state [ 1076.242807][ T888] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1076.250233][ T888] bridge0: port 1(bridge_slave_0) entered blocking state [ 1076.257390][ T888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1076.299131][ T888] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1076.347568][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1076.355973][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 1076.363831][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 1076.372355][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1076.386035][ T888] 8021q: adding VLAN 0 to HW filter on device team0 [ 1076.461974][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1076.470626][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 1076.477718][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1076.496530][T16350] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1076.504964][T16350] bridge0: port 2(bridge_slave_1) entered blocking state [ 1076.512166][T16350] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1076.523219][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1076.578463][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1076.586791][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1076.598945][T16350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1076.612574][ T888] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1076.624378][ T888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1076.634358][T16350] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1076.715161][ T888] 8021q: adding VLAN 0 to HW filter on device batadv0 03:34:58 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) close(r0) 03:34:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000003061f001cfffd946fa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 03:34:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000000)=@name, 0x10) bind$tipc(r1, &(0x7f0000000100)=@name, 0x10) r2 = socket(0x1e, 0x5, 0x0) sendmsg(r2, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) 03:34:58 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_EPOCH_READ(r0, 0xc0287c02, &(0x7f0000000040)) 03:34:58 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:34:58 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) [ 1076.894520][ T905] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:34:58 executing program 5: r0 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_EPOCH_READ(r0, 0xc0287c02, &(0x7f0000000040)) 03:34:58 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\xff', 0x0, 0x0, 0x0) 03:34:58 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) [ 1076.935887][ T905] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:34:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000000)=@name, 0x10) bind$tipc(r1, &(0x7f0000000100)=@name, 0x10) r2 = socket(0x1e, 0x5, 0x0) sendmsg(r2, &(0x7f0000316000)={&(0x7f00000001c0)=@generic={0x10000000001e, "010000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, 0x0}, 0x0) [ 1077.048530][T16573] device bridge_slave_1 left promiscuous mode [ 1077.054867][T16573] bridge0: port 2(bridge_slave_1) entered disabled state 03:34:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000003061f001cfffd946fa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 03:34:58 executing program 5: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in6=@mcast2}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f00000001c0)={@multicast2, @local, 0x1, 0x2, [@local, @multicast1]}, 0x18) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) [ 1077.193429][T16573] device bridge_slave_0 left promiscuous mode [ 1077.206121][T16573] bridge0: port 1(bridge_slave_0) entered disabled state [ 1077.275088][ T930] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 1077.302888][ T930] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:34:58 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\xff', 0x0, 0x0, 0x0) 03:34:58 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) 03:34:58 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f00000000c0)) 03:34:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000003061f001cfffd946fa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) 03:34:58 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x8c', 0x0, 0x0, 0x0) 03:34:58 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)={[{0x2d, 'cpu'}]}, 0x5) 03:34:58 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f00000000c0)) [ 1077.497008][ T943] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 03:34:58 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f00000000c0)) [ 1077.547886][ T943] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:34:58 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\xf6', 0x0, 0x0, 0x0) [ 1079.284584][ C1] net_ratelimit: 31 callbacks suppressed [ 1079.284591][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1079.296841][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1080.126425][T16573] device hsr_slave_1 left promiscuous mode [ 1080.168548][T16573] device hsr_slave_0 left promiscuous mode [ 1080.217760][T16573] team0 (unregistering): Port device team_slave_1 removed [ 1080.234516][T16573] team0 (unregistering): Port device team_slave_0 removed [ 1080.247658][T16573] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1080.300794][T16573] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1080.391583][T16573] bond0 (unregistering): Released all slaves [ 1080.403931][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1080.413621][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1080.413739][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1080.413838][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:35:01 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f00000000c0)) 03:35:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000003061f001cfffd946fa2830020200a000900010006e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) [ 1080.493932][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1080.499773][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:35:01 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x80053, r0, 0x0) 03:35:01 executing program 0: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000000)={0x3, 0x0, 0x9}) 03:35:01 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:01 executing program 2: r0 = socket$rxrpc(0x21, 0x2, 0xa) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$rxrpc(r0, &(0x7f0000000000)=@in6={0x21, 0x0, 0x2, 0x1c}, 0x77) 03:35:01 executing program 0: r0 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000080)=@broute={'broute\x00', 0x20, 0x2, 0x208, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000340], 0x0, 0x0, &(0x7f0000000340)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x0, 0x8100, 'syzkaller1\x00', 'sit0\x00\x00\x02\x00\x00\x00\xff\xff\x00', 'bond0\x00', 'veth0\x00', @broadcast, [], @empty, [], 0xa0, 0xa0, 0xd0, [@vlan={'vlan\x00', 0x8, {{0x0, 0x0, 0x0, 0x2}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x0, 'ip6_vti0\x00', 'syzkaller0\x00', 'bcsf0\x00', 'veth0_to_team\x00', @remote, [], @local, [], 0x70, 0x70, 0xa8}}, @common=@dnat={'dnat\x00', 0x10, {{@local, 0xfffffffffffffffc}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x280) [ 1080.563841][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1080.569674][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1080.601427][ T963] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 1080.640225][ T963] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:35:01 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0x4020565a, &(0x7f0000000080)) 03:35:01 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:01 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe2(0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x800) r1 = socket$kcm(0x2, 0x2, 0x73) pwrite64(r1, &(0x7f00000003c0)="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", 0xff8, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x308) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x8914, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r2, 0xc0286415, &(0x7f0000000180)={&(0x7f0000ffa000/0x6000)=nil, 0x2, 0x2, 0x60, &(0x7f0000ffd000/0x3000)=nil, 0x7}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'sit0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\x00\x00\x00\x00\xfc\xfe\x80\x00', 0x141}) 03:35:01 executing program 0: add_key(&(0x7f00000002c0)='asymmetric\x00\x00\xbe:\x8a:\x9e8\x9dm\xe5\x16\xfe\xae\x12\x18\x93\x1b\x7fb\xf1\x98\x9ew\x9c\xb3\xe1\x99\x01^o\"M\xc7\x86\xb7\x8bidb\xc7\xde\xc5\x8c\xd0_\xa4\'s\xa4\xaf\np=c\xe1\x96 \xfd\x16[]\x86.&5\x05\x9c@\x11Rt`7\xa5\x1f\x9d\x03]\xcfA\x97\xd2e\xf6\xf5\xd2F\xb1B\x12\xdbi\xe7gWD \xfb\x11\xa70\x8e\xb2\x93\x96}\xbdZr\x9b\xb8\xc6\x83:\x85N 6\xd4\xe9\'\x0f\xefL\xef\'\x068\xe5l\x14Bc\xec\xf6\x908\xc9l\x9d8\xf6\x86h\xc2\x15\x13\xe1\x9c\x13\x11\xee\xa8\xee\x94\xc5\x96\t\x98}\x03<\xa3\xc8\xadbM\xbc\\\x89X\xaa\xa4\xe9\x15\x8cXP\xc6\"\x8a\"\xd0\xad\xaa\xbe\x8b\xb5f\xc0i\xba\xba\xa6N0\xafm\x87\x8c', &(0x7f0000000040), &(0x7f0000000000)="3080", 0x2, 0xfffffffffffffffd) 03:35:02 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind(r0, &(0x7f0000000200)=@nfc, 0x80) getpeername(r0, 0x0, &(0x7f0000000080)) [ 1080.815944][T16573] Left network mode 03:35:02 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'hmac(sha256)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x28042, 0x0) ftruncate(r2, 0x40) sendfile(r1, r2, 0x0, 0x3c) 03:35:02 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:02 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0x4020565a, &(0x7f0000000080)) 03:35:02 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000002c0)="240000002400075e1dfffd726fa2830020200a0009000000000001a0ffffffff0d00ff7e", 0x24}], 0x1}, 0x0) 03:35:02 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind(r0, &(0x7f0000000200)=@nfc, 0x80) getpeername(r0, 0x0, &(0x7f0000000080)) 03:35:02 executing program 1: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000240)={{0x0, r1}}) 03:35:02 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0x4020565a, &(0x7f0000000080)) 03:35:02 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:02 executing program 1: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000240)={{0x0, r1}}) [ 1081.794816][ T994] device sit0 entered promiscuous mode [ 1081.888247][ T1017] device sit0 left promiscuous mode [ 1082.153564][ T1018] device sit0 entered promiscuous mode 03:35:03 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe2(0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x800) r1 = socket$kcm(0x2, 0x2, 0x73) pwrite64(r1, &(0x7f00000003c0)="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", 0xff8, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x308) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x8914, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r2, 0xc0286415, &(0x7f0000000180)={&(0x7f0000ffa000/0x6000)=nil, 0x2, 0x2, 0x60, &(0x7f0000ffd000/0x3000)=nil, 0x7}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'sit0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\x00\x00\x00\x00\xfc\xfe\x80\x00', 0x141}) 03:35:03 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind(r0, &(0x7f0000000200)=@nfc, 0x80) getpeername(r0, 0x0, &(0x7f0000000080)) 03:35:03 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000240)={{0x0, r1}}) 03:35:03 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0x4020565a, &(0x7f0000000080)) 03:35:03 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x55) r1 = creat(&(0x7f0000000440)='./file0\x00', 0x8) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc6a1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x15, 0x7, 0x400000009}, 0x2c) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0xd, 0xe, 0x4, 0x3, 0x0, r3}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r4, &(0x7f0000000040)}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) unlink(&(0x7f00000004c0)='./file0\x00') ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000200)=""/122) chroot(&(0x7f0000000280)='./file1\x00') ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000140)) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000500)="2324fd81447ba1d7f53cf5a78a2594ceead836a3df4a1f1e25b26edb8dbf0283cbf2a9107b1d4d07fd2444c101fbad47646374ee97b5d0325a875cc6716af304d4922bbfdf33425810cda46e02ac0309a3be64a3414be0bb4035f657050dd4152b927bdf0d89ce3ffa164af651378307d399b094e877784aab44e7bc5387f665ec6b94259b9e4a403c5e8e9f32edd86e929590044857ffd172099366ff64b77434246a8008b16a5be34ed280448fe41e6b8dc3e67869317e971e849ae64dbee1cb7b9cd9e4387e061cdee34d", 0xcc, 0x0) 03:35:03 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:03 executing program 1: r0 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) r2 = msgget$private(0x0, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000240)={{0x0, r1}}) 03:35:03 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$swradio(0x0, 0x1, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)='vmnet1\\self.!lo\\wlan0}posix_acl_accesseth0.*&\x00', 0xffffffffffffffff}, 0x30) close(0xffffffffffffffff) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) sendfile(r1, r1, &(0x7f0000000140)=0x2000, 0x8800000) 03:35:03 executing program 5: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind(r0, &(0x7f0000000200)=@nfc, 0x80) getpeername(r0, 0x0, &(0x7f0000000080)) 03:35:03 executing program 1: r0 = socket$inet6(0xa, 0x200080803, 0x58) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in=@loopback, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x80000002, 0x0, 0x1}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x33}, 0x0, @in=@remote}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) 03:35:03 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value={0x0, 0xffff}, 0x8) [ 1084.235016][ T1032] device sit0 left promiscuous mode [ 1084.350688][ T1039] device sit0 entered promiscuous mode 03:35:05 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe2(0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x800) r1 = socket$kcm(0x2, 0x2, 0x73) pwrite64(r1, &(0x7f00000003c0)="c9aa51fb528b73884de1d8e13295ec37ca6819a498adbc55745b174fcbabcf766e2e7a322f3d107b7845706aa40ce778714bcbba6ab6e1c78322016050c8341fb6e46227bcf617af98339dde03edb6160b59acd1b87109f131f9eede0e35db992601f604940ca1eda2cdc597fa5541c3c96d20c3f2d1e39f3ad711fb7f89dd4cc90ac9c1f187b6cf2833a164632182cd85c455cadbd4b523faad59a7b653e14a7da072cc87130db9aa012c664f236b6e4225847f39bbc5d85741efc3040ad96325ef4e00fab64cc83dcdfecf2267b21ffec7d71c457daf8de624de1447f2812088fb1a97c92cfc406e384ffc413ff9fdc2a6e837b040516ccbc761ab648c048b87732444c5796f7b1c0da2a773560262465459c6858255bf2943b5ef9aca34fbb3f43f8cc9036635f9ad3e0ea40978cec7d423b98206bd365c250709db4c215761092c7794c500c4b144351d8c5760302edc6fc2926fc630c1ccf4748d677ec5161168bd7adb3577e4b6d85fc6f29c773e17109804fcb49fbdd6eb8e4852135db5c6857fa751c4a0c3bb3c2d7e3ebc84cee68d94f87b0a933a008c318f187a845c3fdfcb1605a8ac0130cb82a611bb6851879e69362041e6dc8b354d73f68468548ccd1944987b8ef8dd0328b0d7565182d9f108246e45710caf7079825a5abd5d8fd16cf8eb50d07fa391833949ac876a3f619e32a2e6cbbce92d1181cfed3d97b9f1a8393876d2788092296972400efdbf158a4f79fa009766219be96344ad8a257cedf0c437ebf0af6ebacbd0632cc018546baa14a54078093f68eb1adac58e5e3f9d2fcb0009aed684e30df4260c68dd69aea1765c5d60212db15ff3122adb80d7c24e06f714129aae260a799e482e30b5006a3730aad3fb06a30a96690aa6b8493fd514772ce52d40909a2fcb84a88180f036881848c2c51b8cf5b25e7369300e4a8a102aa3c6d8df901f462e86de0811983c20f6daa6f00edab881aae269478b3275d70ee4b3a12330a2b4ba4ed5744fbfeb2838b56609d883b18d241f5b4b9be290db3e6da5ad13d49b0528df82b35aad40ae0e4b7dd94a47d71b932a27dc0be8b1405c90cde84f7d35ec3d2f621c382a63fe11ce146843973442d665fd4cbf0f419c4238ce963544039c8343746142c16ba0511d10cec4b5ac4cf1eb28dbaf1d98a6551379c80681a7e5179d6b7795efde8038cbd10f82e870117fad7f8c212e2710f1786b03c9a1076255597e34475c45a3c52157c78948f13e75523d6dbc7e04d06c29571109abad836430dfca72cc46934bd452ec371cdcbc872c8dd4f915b5364dc98cf8e2a8e456e28c4fd8f3a0b95141ec6fba4c6cf89d0b449746c58b737297da917f4fd5cc54f9e9f979df902e2a77cbba9f2f6b82b51170145bf4f711afc8fb71a33757c16e12f205e9df935e9b6e786e31dfa3ec1589841e617e71b2e95b107b495bf0589383e5b1c6464109f326381b0336c274b95591bc30367dc2df8c0aab1890f46f8a94583eee55e47e860e4ee83e10b89f5d5ae0d346ce3badbc70d1c1a152feff59d45c2b8979e1c07f7211fca7d987509522af575c1fce285452b14b6438eb5bb01f7d6d951771a8221089df8d9fb3054c0fe07ffb2237207c8eb5d1c5815419546b366a91d96693a910e5339679f4c68848f28f1e67a198469cf9abd6d0441002c8ef0af7839a8b1194aeebb9a9419bf780bd0d269b41a7b16553861de156e697e63a754c4630c2a41c6bd697235a6b355fa0a243b9b4a4a6575cf9fb2fca9a4d3ab9f1954b2b8029f78bc18d302d091fe17b2313346aa4893e34504ec2fee91a9b678d30f9ba91a8c301008a2414720375ed2c3df8bb1917d7dad93e33d8772e082a050cef21a6fa95f313849b428193a9efa4dad1e5bfbcf4b3fcfc13abbdc73ddc942df30ee9bb07eeaa0be829199383fc3936712b211d0f40fa4c240e748dc484cc908683cd392367198ffb6c2e31151dca2ca5580eeb5bdf1f15d1a24f888f8441c1bc8dd8729a9f84957b2ea10b40931119af720de8bd8aad391821dade25b469250d4621d1126d082ebf405690b0487b2b26aaab7c8affb1b45bb1a4f150fff15482e0e46dd3bc1b1066d2955be924a731cb4b002fce737ce042d0decf663f6a140fff47f07aa94931170c87227ac88eeaaa0061cdf38484a3351483ecac305417b4eebbe675aeef9cbbbb9cf55f32ae53bb6d2d29835480505ff1686bec6f670bce27e691e3927909a9b58e899e1d85f90301d16ff606964bdb5cb09486afd9846e30802d3563e5db9fffc0474c5c3e129fa5f844cb833706fc41bc9d7835c27f787a1e48552b43300f98c8c91f81b4020e49625a43ce7faa836af6c28a540c1f1024df1c3a431d2fcd70ffa96963ca0ffc6a4948435b40d6937b8775676b1c8bfb70f180faba3186c068b6fc8d7c1089f4369b74825ed141191af0760e1ddd939dcecdbc066a8c506760feb3d1cffa138ca35c7323a4829c647f27009153b681985ef51115010af5d5095827c2f65dd2b5a846e4e926801975280f501284c011853612f67cde3e2ee5d00c03aab957ef595ca0213afbccd0f3a152832fd47ef5837e1149945aeca3abcb26c70c8eb220c073cd3deedc8da9d34403c94290b2d024842ac9fbb793c678e57c920fa9c30eef12b9bf6286b1a7da89195bafda8c37cd314ebc46cc0d5c1a6f44318aa473bb3b9292f6222f6a760987c7d0f3248da423b444f74d57531aec05fda0b22e2fde04cfe0d3cf364031db8b383d86fe91bd1ee6255136ee6729ffad0e0a72a0a28eb61d8d01c1f406559534f67b815a0d970cc16fbedb9bedccae484b0693d84983ebabba289b257f5df2b7e98e371391b7a16416f612a73afeca068a6793a36d66f3a647b29bc23b2217afe77edb2c1b6b18d6795851f2543f59ccb9bf988eb0e6bc31b29df52d9399e089c25c029c0ddacf3dc973de550b32a388fd3ca8d7064a4084ade0bc103a2f73899b8d0677a2c220086348e7370da4b55b677d91d17a5dd186521d4d7f5bc9dafbd128c264c178fcaaf92e6d51236c62767e798e5d2d47a5fa5ad210c61c6d4d82db31a0f1b041e2212475899c38142c971065ed791e91a5f4233afee3a22f779d9984508cb39d0e85fd1636b411e0309bd38599c4103063172af1d46ef4646abb4a864034201b09d565e32d042416ee5dfd15fd365c1be06e1bb28c5b467137a50ad55b9ff85aa7cac7f46cb9554dcef16153f102228e21ebac5952537dce79527cf2d3b02e68d7e526416dcc49fc8bcdab75faecb60fa1b34bfbb622346e594a42c7dd76214eb589edb807817dfbfade3d932cfcb0997d2cb1ec1860f270b2ca898f8f5e599ea83595c2e2c7060f38ccb15e836449586a66ec4d6e675183cdc4ab790252e30093e37dcefb8cad4199e6fe7be11a531ad49ccb332a3a21160eb5f9ae4d0d52b1c6b744ef2cfd6ac838744ae7c0531271b4b05f125116450c592f6053f5a04a4315d0bd1ef292a91a14f32fa92d139aa2b0c8445f9ce85cec694af7835f25fbde62b1d371bee2ca0ed3aeedd52bb3ef5bae9bcc8812977b2d9db52df13a8adb80cf2466680ae07632773545bd048a7efc2a889e972aacea30d9072fe75182bf4174473ce347b97c7c7b885cee92753ee58564e7e7357322de3181492dcf0783c2d011722697a4efe2b6a550d5a027f90df96fb289de87df6fb2e36d74a6beb451fd9323c493535fbd773d311d32fdc54d44f0e831851de91ebe1f4a8c8a9fd0622ee3bf3e3fc2a7ab4f86844407b2389f31468072fb8f258eca5c430117eef423589d10aa88366dc59f0bf1a2855357933574970100662cde51d401515e6215327918f8474a5fbbfb67c0adf22470fe1bca68ed0b9d4e5b8416e51bf20def8b964da9f6b2b0bf55be62e8c385e18d6da0d9bd83e437da501791aee08ec6dcf5d27dd21055244aaca8c5ad1b1b6a591c8175f25f644bac0feed010b99549b8278d82279ed54b3c8c1accad8dc8ab61b323589f3811513c1de638c60e9d22b29148baeb4814ec5a8a113b2e9746632c226331ebc4fe82dd162787c17bac759881a0d8c1641e4234d5ae6114365f77c94cd53daaed76181021d80ff32f04cd61659c326a3255fece1a75eb6a94457840ae72167ade7561743000f5914d61bb2801ee291fff88f4798a1f6c07ef70fec788714f0989290a7ba71f8f289a8100dff200c9cb3679c8077664aa033285b5a8bb7f99666566ae9be388c0133aaf44087191ff4736e9974b8ff56b1561fd0c61095f3319dc21ecd2d663745c961193333f34571dacafe1a1a3888bdb95a0e2d94da982dce4626c6a5605d7260111bbb59d3251331151f6f5c723e1ffbae7a9e35ad855c6863bbea729f564c330edeea74015d42c10f6f31c4af195269b3a50120e3fe386735aac688828c66920d2d13eacf2889754cedff9108d5ccd7e8036f495ab2976588fca2d64aeb690fb87e1370bc01c7a8d352f948d9d616ce1c27a0c46eb01195268c921ad4bf63597644dfb037e8388a1751a5056e7a64667ee88b535fa5ddba8de10d4e83d03da7c962eb219850573ce1d7c6a381e5dc146cd7ec62c36f0b1fcbc97b2253584f58fbc25860be96358a4a4295647330e455841627da7a2d880ba3178bdd95951af1679eb008461fc44c365575997766f65fe1c64eac775a8ef1eac160e80f45d8d2cf403f70cc6c27b232fc22866bec685182581b9d0679a3f3faf9f5279dd09fdf1c7d6347aa8814c7937fb13668bdd2849117b5c4819d2571048d14334db9f75b4621645e58b12f4dc98a458104ed6e2848b2bedbf22e5e7fc9f7beee7e09e1662c7385e8117d2c74ca3cc5648305b4359a7e9955a6460558bdf714d7bc5636f0904750c5401d6492e3fc25432e97a8e7cfa90705f346a488723533078dea821f2dd860a560ebbc1f9eb12e5824a513a39f3607a885630f3e9e62d9e4347118cc6132fe4625ea12307fb8bb227119f193a08fdd3f8216341ce05185a563cc45ca6136a636bd1c1d808aeaa02dd4661401f15417472d46b866dcee0ff79279f0ae7fffb57ea9041df69e7b38d722af88f13e29dbe77a52c27e2d2caa5b126d100345d2df24bcfafd128d6fb2e47e5f26bfbfe28e094aec15e6d6609d176dae87439dc45ba90a0377f07f2ea74ccc0b73516963b63ef6767f7564802fb5ee874d7f33f40c8201155f639f3954212c9df58fd0caa9336d6de59020a4bf54cadf48c30474e2aab2e90704c7ffbbc3e11ebffa95a17834c38884aa3daa74b7cf8529a604d393c62e7ccbe16661c63bed4ab26a128d11cb57f841451c418779439db4dc11b2b6b3ba5d0bd29197bbb3ba4b3f34f412075cf6478f38bd11c38fd1e46377d870401527ca904b7e9566f41fc822c4a2fc8a05ec9ad6ab619829340e021ded74ec75afa78473aa3ea38181dd6e8e5d765c5278ddb423d9b0199d8c2f71f874c3869a8a8dafed1cc0b2811d8bf6b294297dbd595244f6902a093d588989409e5e7fead4291f284c4c5c0a147e640e6909ec70c30388f562c1e006a69294de429198e472ab1e38b26197168b9246d8dfc75f91030bb5094a5d9450e201cc6d11fd440243bb8225890fd1db28029d53d9daca396437e86a1b81ec32f98de86a061c0a0fc0e5e2c64e24832b89952dad6268b3bf95e47cfc95e915503435ceb0eedd98752348847d1b81d1b60a8f07c35f4abb085cf9bfa5c9d9a67f6809f14bdf7c44d7576a6aea6334e254e", 0xff8, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x308) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x8914, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r2, 0xc0286415, &(0x7f0000000180)={&(0x7f0000ffa000/0x6000)=nil, 0x2, 0x2, 0x60, &(0x7f0000ffd000/0x3000)=nil, 0x7}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'sit0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\x00\x00\x00\x00\xfc\xfe\x80\x00', 0x141}) 03:35:05 executing program 1: setrlimit(0x400000000000007, &(0x7f0000000000)) mq_open(&(0x7f0000000040)='trustedcgroupvboxnet0GPLself\x00', 0x0, 0x0, 0x0) 03:35:05 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/41, &(0x7f0000000140)=0x29) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)='fuse\x00', 0x0, &(0x7f00000008c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000540)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2ad40f000400000000000000000000000100000000000000be0000000000000002000000000000000000"], 0x2a) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df1388f1adc93f6cb6cd0000000000000000000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="969957b52d30030000005a209691fd3e214cb904c33db7762efad2628dcef5d3b6364e60f818df973b53d859e769464fe2a2410d59da45b6f46e36586e71a0cae4c45f6aaca9f6fc4bb835b482532f8638eba84a357dc698b942bb4d434d5b390f5d1313600fca03803913a6e149d54443eb4f1cb0221dd2e2e709e8bce2bba579293bce5a7e2adfef8317a3d1f169ae2e43d2ce5f47ec8977afc1ff463d49f236f25edad8cf2329387576df74743283c85ddb6c0e21c1f10f549e07d9e9617cca51c659eba3cc04f65ff6040c720e75d5f3855cf410bcbd19e30a16334fef5369360000"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="05c402bf144c59ed0aec37a9b0b4b459e6ab02bafc5163cadde3907e351790ad57982a2f2f6d48a33e9a284f216fd818ba149b98cd7a564074417273e77d49f99d942d8426b80e14d1f955f6"], 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r4 = dup2(r1, r1) write$FUSE_OPEN(r4, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) ioctl$int_out(r3, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000340), 0x2) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) sysinfo(&(0x7f0000000680)=""/75) close(r1) 03:35:05 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$swradio(0x0, 0x1, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)='vmnet1\\self.!lo\\wlan0}posix_acl_accesseth0.*&\x00', 0xffffffffffffffff}, 0x30) close(0xffffffffffffffff) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) sendfile(r1, r1, &(0x7f0000000140)=0x2000, 0x8800000) 03:35:05 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x2, 0x0) [ 1084.562061][ C0] net_ratelimit: 16 callbacks suppressed [ 1084.562103][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1084.575422][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1084.583908][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1084.591411][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1084.641924][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1084.647811][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:35:05 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x1ff) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 03:35:05 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x4, 0x0) 03:35:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x800000000801, 0x84) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @dev}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000001080)) [ 1084.722384][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1084.728660][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:35:06 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="1800120008000100767469000c000200080001c0e0000002"], 0x1}}, 0x0) 03:35:06 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$swradio(0x0, 0x1, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)='vmnet1\\self.!lo\\wlan0}posix_acl_accesseth0.*&\x00', 0xffffffffffffffff}, 0x30) close(0xffffffffffffffff) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) sendfile(r1, r1, &(0x7f0000000140)=0x2000, 0x8800000) 03:35:06 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/41, &(0x7f0000000140)=0x29) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)='fuse\x00', 0x0, &(0x7f00000008c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000540)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2ad40f000400000000000000000000000100000000000000be0000000000000002000000000000000000"], 0x2a) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df1388f1adc93f6cb6cd0000000000000000000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="969957b52d30030000005a209691fd3e214cb904c33db7762efad2628dcef5d3b6364e60f818df973b53d859e769464fe2a2410d59da45b6f46e36586e71a0cae4c45f6aaca9f6fc4bb835b482532f8638eba84a357dc698b942bb4d434d5b390f5d1313600fca03803913a6e149d54443eb4f1cb0221dd2e2e709e8bce2bba579293bce5a7e2adfef8317a3d1f169ae2e43d2ce5f47ec8977afc1ff463d49f236f25edad8cf2329387576df74743283c85ddb6c0e21c1f10f549e07d9e9617cca51c659eba3cc04f65ff6040c720e75d5f3855cf410bcbd19e30a16334fef5369360000"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="05c402bf144c59ed0aec37a9b0b4b459e6ab02bafc5163cadde3907e351790ad57982a2f2f6d48a33e9a284f216fd818ba149b98cd7a564074417273e77d49f99d942d8426b80e14d1f955f6"], 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r4 = dup2(r1, r1) write$FUSE_OPEN(r4, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) ioctl$int_out(r3, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000340), 0x2) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) sysinfo(&(0x7f0000000680)=""/75) close(r1) 03:35:06 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x1ff) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 1085.361451][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1085.367403][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1086.042254][ T1083] device sit0 left promiscuous mode [ 1086.236371][ T1086] device sit0 entered promiscuous mode 03:35:07 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe2(0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x800) r1 = socket$kcm(0x2, 0x2, 0x73) pwrite64(r1, &(0x7f00000003c0)="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", 0xff8, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'eql\x00', 0x10000803}) ioctl$TUNSETLINK(r4, 0x400454cd, 0x308) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r3, 0x8914, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r2, 0xc0286415, &(0x7f0000000180)={&(0x7f0000ffa000/0x6000)=nil, 0x2, 0x2, 0x60, &(0x7f0000ffd000/0x3000)=nil, 0x7}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'sit0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'sit0\x00\x00\x00\x00\x00\x00\xfc\xfe\x80\x00', 0x141}) 03:35:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x1ff) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 03:35:07 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_open_dev$swradio(0x0, 0x1, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2e, &(0x7f0000000000)='vmnet1\\self.!lo\\wlan0}posix_acl_accesseth0.*&\x00', 0xffffffffffffffff}, 0x30) close(0xffffffffffffffff) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) write$P9_RLERRORu(0xffffffffffffffff, 0x0, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) sendfile(r1, r1, &(0x7f0000000140)=0x2000, 0x8800000) 03:35:07 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x1000000, 0x0) 03:35:07 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/41, &(0x7f0000000140)=0x29) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)='fuse\x00', 0x0, &(0x7f00000008c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000540)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2ad40f000400000000000000000000000100000000000000be0000000000000002000000000000000000"], 0x2a) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df1388f1adc93f6cb6cd0000000000000000000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="969957b52d30030000005a209691fd3e214cb904c33db7762efad2628dcef5d3b6364e60f818df973b53d859e769464fe2a2410d59da45b6f46e36586e71a0cae4c45f6aaca9f6fc4bb835b482532f8638eba84a357dc698b942bb4d434d5b390f5d1313600fca03803913a6e149d54443eb4f1cb0221dd2e2e709e8bce2bba579293bce5a7e2adfef8317a3d1f169ae2e43d2ce5f47ec8977afc1ff463d49f236f25edad8cf2329387576df74743283c85ddb6c0e21c1f10f549e07d9e9617cca51c659eba3cc04f65ff6040c720e75d5f3855cf410bcbd19e30a16334fef5369360000"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="05c402bf144c59ed0aec37a9b0b4b459e6ab02bafc5163cadde3907e351790ad57982a2f2f6d48a33e9a284f216fd818ba149b98cd7a564074417273e77d49f99d942d8426b80e14d1f955f6"], 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r4 = dup2(r1, r1) write$FUSE_OPEN(r4, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) ioctl$int_out(r3, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000340), 0x2) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) sysinfo(&(0x7f0000000680)=""/75) close(r1) 03:35:07 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/41, &(0x7f0000000140)=0x29) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)='fuse\x00', 0x0, &(0x7f00000008c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000540)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2ad40f000400000000000000000000000100000000000000be0000000000000002000000000000000000"], 0x2a) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df1388f1adc93f6cb6cd0000000000000000000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="969957b52d30030000005a209691fd3e214cb904c33db7762efad2628dcef5d3b6364e60f818df973b53d859e769464fe2a2410d59da45b6f46e36586e71a0cae4c45f6aaca9f6fc4bb835b482532f8638eba84a357dc698b942bb4d434d5b390f5d1313600fca03803913a6e149d54443eb4f1cb0221dd2e2e709e8bce2bba579293bce5a7e2adfef8317a3d1f169ae2e43d2ce5f47ec8977afc1ff463d49f236f25edad8cf2329387576df74743283c85ddb6c0e21c1f10f549e07d9e9617cca51c659eba3cc04f65ff6040c720e75d5f3855cf410bcbd19e30a16334fef5369360000"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="05c402bf144c59ed0aec37a9b0b4b459e6ab02bafc5163cadde3907e351790ad57982a2f2f6d48a33e9a284f216fd818ba149b98cd7a564074417273e77d49f99d942d8426b80e14d1f955f6"], 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r4 = dup2(r1, r1) write$FUSE_OPEN(r4, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) ioctl$int_out(r3, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000340), 0x2) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) sysinfo(&(0x7f0000000680)=""/75) close(r1) 03:35:07 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x2000000, 0x0) 03:35:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) listen(r0, 0x1ff) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) [ 1086.592068][ T1119] device sit0 left promiscuous mode 03:35:07 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/41, &(0x7f0000000140)=0x29) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)='fuse\x00', 0x0, &(0x7f00000008c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000540)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2ad40f000400000000000000000000000100000000000000be0000000000000002000000000000000000"], 0x2a) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df1388f1adc93f6cb6cd0000000000000000000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="969957b52d30030000005a209691fd3e214cb904c33db7762efad2628dcef5d3b6364e60f818df973b53d859e769464fe2a2410d59da45b6f46e36586e71a0cae4c45f6aaca9f6fc4bb835b482532f8638eba84a357dc698b942bb4d434d5b390f5d1313600fca03803913a6e149d54443eb4f1cb0221dd2e2e709e8bce2bba579293bce5a7e2adfef8317a3d1f169ae2e43d2ce5f47ec8977afc1ff463d49f236f25edad8cf2329387576df74743283c85ddb6c0e21c1f10f549e07d9e9617cca51c659eba3cc04f65ff6040c720e75d5f3855cf410bcbd19e30a16334fef5369360000"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="05c402bf144c59ed0aec37a9b0b4b459e6ab02bafc5163cadde3907e351790ad57982a2f2f6d48a33e9a284f216fd818ba149b98cd7a564074417273e77d49f99d942d8426b80e14d1f955f6"], 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r4 = dup2(r1, r1) write$FUSE_OPEN(r4, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) ioctl$int_out(r3, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000340), 0x2) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) sysinfo(&(0x7f0000000680)=""/75) close(r1) 03:35:07 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/41, &(0x7f0000000140)=0x29) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)='fuse\x00', 0x0, &(0x7f00000008c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000540)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2ad40f000400000000000000000000000100000000000000be0000000000000002000000000000000000"], 0x2a) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df1388f1adc93f6cb6cd0000000000000000000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="969957b52d30030000005a209691fd3e214cb904c33db7762efad2628dcef5d3b6364e60f818df973b53d859e769464fe2a2410d59da45b6f46e36586e71a0cae4c45f6aaca9f6fc4bb835b482532f8638eba84a357dc698b942bb4d434d5b390f5d1313600fca03803913a6e149d54443eb4f1cb0221dd2e2e709e8bce2bba579293bce5a7e2adfef8317a3d1f169ae2e43d2ce5f47ec8977afc1ff463d49f236f25edad8cf2329387576df74743283c85ddb6c0e21c1f10f549e07d9e9617cca51c659eba3cc04f65ff6040c720e75d5f3855cf410bcbd19e30a16334fef5369360000"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="05c402bf144c59ed0aec37a9b0b4b459e6ab02bafc5163cadde3907e351790ad57982a2f2f6d48a33e9a284f216fd818ba149b98cd7a564074417273e77d49f99d942d8426b80e14d1f955f6"], 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r4 = dup2(r1, r1) write$FUSE_OPEN(r4, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) ioctl$int_out(r3, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000340), 0x2) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) sysinfo(&(0x7f0000000680)=""/75) close(r1) 03:35:08 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/41, &(0x7f0000000140)=0x29) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)='fuse\x00', 0x0, &(0x7f00000008c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000540)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2ad40f000400000000000000000000000100000000000000be0000000000000002000000000000000000"], 0x2a) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df1388f1adc93f6cb6cd0000000000000000000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="969957b52d30030000005a209691fd3e214cb904c33db7762efad2628dcef5d3b6364e60f818df973b53d859e769464fe2a2410d59da45b6f46e36586e71a0cae4c45f6aaca9f6fc4bb835b482532f8638eba84a357dc698b942bb4d434d5b390f5d1313600fca03803913a6e149d54443eb4f1cb0221dd2e2e709e8bce2bba579293bce5a7e2adfef8317a3d1f169ae2e43d2ce5f47ec8977afc1ff463d49f236f25edad8cf2329387576df74743283c85ddb6c0e21c1f10f549e07d9e9617cca51c659eba3cc04f65ff6040c720e75d5f3855cf410bcbd19e30a16334fef5369360000"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="05c402bf144c59ed0aec37a9b0b4b459e6ab02bafc5163cadde3907e351790ad57982a2f2f6d48a33e9a284f216fd818ba149b98cd7a564074417273e77d49f99d942d8426b80e14d1f955f6"], 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r4 = dup2(r1, r1) write$FUSE_OPEN(r4, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) ioctl$int_out(r3, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000340), 0x2) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) sysinfo(&(0x7f0000000680)=""/75) close(r1) 03:35:08 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/41, &(0x7f0000000140)=0x29) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)='fuse\x00', 0x0, &(0x7f00000008c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000540)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2ad40f000400000000000000000000000100000000000000be0000000000000002000000000000000000"], 0x2a) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df1388f1adc93f6cb6cd0000000000000000000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="969957b52d30030000005a209691fd3e214cb904c33db7762efad2628dcef5d3b6364e60f818df973b53d859e769464fe2a2410d59da45b6f46e36586e71a0cae4c45f6aaca9f6fc4bb835b482532f8638eba84a357dc698b942bb4d434d5b390f5d1313600fca03803913a6e149d54443eb4f1cb0221dd2e2e709e8bce2bba579293bce5a7e2adfef8317a3d1f169ae2e43d2ce5f47ec8977afc1ff463d49f236f25edad8cf2329387576df74743283c85ddb6c0e21c1f10f549e07d9e9617cca51c659eba3cc04f65ff6040c720e75d5f3855cf410bcbd19e30a16334fef5369360000"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="05c402bf144c59ed0aec37a9b0b4b459e6ab02bafc5163cadde3907e351790ad57982a2f2f6d48a33e9a284f216fd818ba149b98cd7a564074417273e77d49f99d942d8426b80e14d1f955f6"], 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r4 = dup2(r1, r1) write$FUSE_OPEN(r4, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) ioctl$int_out(r3, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000340), 0x2) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) sysinfo(&(0x7f0000000680)=""/75) close(r1) [ 1087.473868][ T1123] device sit0 entered promiscuous mode 03:35:08 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/41, &(0x7f0000000140)=0x29) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)='fuse\x00', 0x0, &(0x7f00000008c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000540)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2ad40f000400000000000000000000000100000000000000be0000000000000002000000000000000000"], 0x2a) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df1388f1adc93f6cb6cd0000000000000000000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="969957b52d30030000005a209691fd3e214cb904c33db7762efad2628dcef5d3b6364e60f818df973b53d859e769464fe2a2410d59da45b6f46e36586e71a0cae4c45f6aaca9f6fc4bb835b482532f8638eba84a357dc698b942bb4d434d5b390f5d1313600fca03803913a6e149d54443eb4f1cb0221dd2e2e709e8bce2bba579293bce5a7e2adfef8317a3d1f169ae2e43d2ce5f47ec8977afc1ff463d49f236f25edad8cf2329387576df74743283c85ddb6c0e21c1f10f549e07d9e9617cca51c659eba3cc04f65ff6040c720e75d5f3855cf410bcbd19e30a16334fef5369360000"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="05c402bf144c59ed0aec37a9b0b4b459e6ab02bafc5163cadde3907e351790ad57982a2f2f6d48a33e9a284f216fd818ba149b98cd7a564074417273e77d49f99d942d8426b80e14d1f955f6"], 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r4 = dup2(r1, r1) write$FUSE_OPEN(r4, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) ioctl$int_out(r3, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000340), 0x2) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) sysinfo(&(0x7f0000000680)=""/75) close(r1) 03:35:08 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/41, &(0x7f0000000140)=0x29) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)='fuse\x00', 0x0, &(0x7f00000008c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000540)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2ad40f000400000000000000000000000100000000000000be0000000000000002000000000000000000"], 0x2a) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df1388f1adc93f6cb6cd0000000000000000000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="969957b52d30030000005a209691fd3e214cb904c33db7762efad2628dcef5d3b6364e60f818df973b53d859e769464fe2a2410d59da45b6f46e36586e71a0cae4c45f6aaca9f6fc4bb835b482532f8638eba84a357dc698b942bb4d434d5b390f5d1313600fca03803913a6e149d54443eb4f1cb0221dd2e2e709e8bce2bba579293bce5a7e2adfef8317a3d1f169ae2e43d2ce5f47ec8977afc1ff463d49f236f25edad8cf2329387576df74743283c85ddb6c0e21c1f10f549e07d9e9617cca51c659eba3cc04f65ff6040c720e75d5f3855cf410bcbd19e30a16334fef5369360000"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="05c402bf144c59ed0aec37a9b0b4b459e6ab02bafc5163cadde3907e351790ad57982a2f2f6d48a33e9a284f216fd818ba149b98cd7a564074417273e77d49f99d942d8426b80e14d1f955f6"], 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r4 = dup2(r1, r1) write$FUSE_OPEN(r4, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) ioctl$int_out(r3, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000340), 0x2) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) sysinfo(&(0x7f0000000680)=""/75) close(r1) 03:35:08 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/41, &(0x7f0000000140)=0x29) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)='fuse\x00', 0x0, &(0x7f00000008c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000540)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2ad40f000400000000000000000000000100000000000000be0000000000000002000000000000000000"], 0x2a) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df1388f1adc93f6cb6cd0000000000000000000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="969957b52d30030000005a209691fd3e214cb904c33db7762efad2628dcef5d3b6364e60f818df973b53d859e769464fe2a2410d59da45b6f46e36586e71a0cae4c45f6aaca9f6fc4bb835b482532f8638eba84a357dc698b942bb4d434d5b390f5d1313600fca03803913a6e149d54443eb4f1cb0221dd2e2e709e8bce2bba579293bce5a7e2adfef8317a3d1f169ae2e43d2ce5f47ec8977afc1ff463d49f236f25edad8cf2329387576df74743283c85ddb6c0e21c1f10f549e07d9e9617cca51c659eba3cc04f65ff6040c720e75d5f3855cf410bcbd19e30a16334fef5369360000"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="05c402bf144c59ed0aec37a9b0b4b459e6ab02bafc5163cadde3907e351790ad57982a2f2f6d48a33e9a284f216fd818ba149b98cd7a564074417273e77d49f99d942d8426b80e14d1f955f6"], 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r4 = dup2(r1, r1) write$FUSE_OPEN(r4, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) ioctl$int_out(r3, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000340), 0x2) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) sysinfo(&(0x7f0000000680)=""/75) close(r1) 03:35:08 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000400)={'gre0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='\b\x00\x00\x00\x00\x00'], 0x6) 03:35:08 executing program 0: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003a0081aee4050cecdb4cb9040a485e510befccdf7f3e9cf0758ef900e1cf3aebb1cb4c100c0003720000", 0x2e}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000006600)={0x0, 0x0, &(0x7f0000006580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socketpair(0x1, 0x20000000000001, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x22) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 03:35:09 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000280)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000000)={0x1, "0086920d1266a72a2e313c78b0faa5c9acb93c4e23dec47eafe4450fdc00eec3"}) 03:35:10 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x4000000, 0x0) 03:35:10 executing program 1: r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './bus'}, 0x9) 03:35:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000600)=0x4, 0x12) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback, 0x0, 0x4, [@multicast2, @remote, @rand_addr, @multicast2]}, 0x20) close(r0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x4000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) 03:35:10 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/41, &(0x7f0000000140)=0x29) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)='fuse\x00', 0x0, &(0x7f00000008c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000540)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2ad40f000400000000000000000000000100000000000000be0000000000000002000000000000000000"], 0x2a) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df1388f1adc93f6cb6cd0000000000000000000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="969957b52d30030000005a209691fd3e214cb904c33db7762efad2628dcef5d3b6364e60f818df973b53d859e769464fe2a2410d59da45b6f46e36586e71a0cae4c45f6aaca9f6fc4bb835b482532f8638eba84a357dc698b942bb4d434d5b390f5d1313600fca03803913a6e149d54443eb4f1cb0221dd2e2e709e8bce2bba579293bce5a7e2adfef8317a3d1f169ae2e43d2ce5f47ec8977afc1ff463d49f236f25edad8cf2329387576df74743283c85ddb6c0e21c1f10f549e07d9e9617cca51c659eba3cc04f65ff6040c720e75d5f3855cf410bcbd19e30a16334fef5369360000"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="05c402bf144c59ed0aec37a9b0b4b459e6ab02bafc5163cadde3907e351790ad57982a2f2f6d48a33e9a284f216fd818ba149b98cd7a564074417273e77d49f99d942d8426b80e14d1f955f6"], 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r4 = dup2(r1, r1) write$FUSE_OPEN(r4, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) ioctl$int_out(r3, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000340), 0x2) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) sysinfo(&(0x7f0000000680)=""/75) close(r1) 03:35:10 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) setsockopt$llc_int(r0, 0x10c, 0x1, &(0x7f0000000040)=0x374, 0x4) 03:35:10 executing program 0: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003a0081aee4050cecdb4cb9040a485e510befccdf7f3e9cf0758ef900e1cf3aebb1cb4c100c0003720000", 0x2e}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000006600)={0x0, 0x0, &(0x7f0000006580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socketpair(0x1, 0x20000000000001, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x22) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 03:35:10 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000440)='tls\x00', 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") shutdown(r0, 0x1) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f0000000000)='[', 0x1, 0x4000, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000040)="85", 0x1, 0x4000, 0x0, 0x0) close(r0) 03:35:10 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x8cffffff, 0x0) 03:35:10 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000240)=@filter={'filter\x00', 0xe, 0x1, 0x130, [0x0, 0x20000100, 0x20000130, 0x20000160], 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]}, 0x1a8) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) 03:35:10 executing program 0: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003a0081aee4050cecdb4cb9040a485e510befccdf7f3e9cf0758ef900e1cf3aebb1cb4c100c0003720000", 0x2e}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000006600)={0x0, 0x0, &(0x7f0000006580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socketpair(0x1, 0x20000000000001, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x22) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 03:35:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000880)='cifs.idmap\x00', &(0x7f00000008c0)={'syz', 0x2}, &(0x7f0000000900)='\x00', 0xfffffffffffffffd) request_key(&(0x7f0000000600)='.request_key_auth\x00', 0x0, 0x0, r1) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0x7fffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcd84, 0xfffffffffffffffb}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r2 = socket$inet(0x10, 0x3, 0xc) ioctl$PPPIOCSPASS(r0, 0x40107447, 0x0) syz_open_dev$vcsa(0x0, 0x9, 0x440000) readahead(r0, 0x7fff, 0x2) getresgid(0x0, &(0x7f00000007c0), &(0x7f0000000800)) sendmsg(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000100)="24000000030307031dfffd944ef20c0020200a0009000100021d85680c1baba20400ff7e28000000110affff82aba0aa1c0009b356da5a80918b06b20cd37ed01cc000000000000000000000", 0x4c}], 0x1}, 0x0) add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={'syz', 0x2}, &(0x7f0000000400)="7fccd60d1802ce06741e8361f9d74dcb36d2a90bef643e6e392bb5c2d93f792309ed877fe030301086ebdb69cfb9091a9c7a56fc5cb277c89fdbcc01761471aca8bdffa5e4abd4d2b3e457d0fe7e6a2b4bf4cbe05fddf6a1ddc8de5d261c1f5e57130db7141eb375e05fd21e84f9b4ce54e5b64caa8f106bd085", 0x7a, 0xfffffffffffffffd) request_key(&(0x7f0000000380)='user\x00', &(0x7f00000004c0)={'syz'}, 0x0, 0xfffffffffffffffa) 03:35:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000600)=0x4, 0x12) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback, 0x0, 0x4, [@multicast2, @remote, @rand_addr, @multicast2]}, 0x20) close(r0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x4000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) 03:35:10 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0xf6ffffff, 0x0) 03:35:10 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/41, &(0x7f0000000140)=0x29) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) socket$inet6(0xa, 0x3, 0x3c) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000004c0)='fuse\x00', 0x0, &(0x7f00000008c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r2}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000540)) set_thread_area(&(0x7f0000000580)={0x7a, 0x20001800, 0x4000, 0x200, 0xffff, 0x1, 0x101, 0x2, 0x843, 0x3}) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="2ad40f000400000000000000000000000100000000000000be0000000000000002000000000000000000"], 0x2a) mount(&(0x7f0000000640)=ANY=[@ANYBLOB="539b9105ab1072c24e2b98df1388f1adc93f6cb6cd0000000000000000000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000d04000), &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="969957b52d30030000005a209691fd3e214cb904c33db7762efad2628dcef5d3b6364e60f818df973b53d859e769464fe2a2410d59da45b6f46e36586e71a0cae4c45f6aaca9f6fc4bb835b482532f8638eba84a357dc698b942bb4d434d5b390f5d1313600fca03803913a6e149d54443eb4f1cb0221dd2e2e709e8bce2bba579293bce5a7e2adfef8317a3d1f169ae2e43d2ce5f47ec8977afc1ff463d49f236f25edad8cf2329387576df74743283c85ddb6c0e21c1f10f549e07d9e9617cca51c659eba3cc04f65ff6040c720e75d5f3855cf410bcbd19e30a16334fef5369360000"], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="05c402bf144c59ed0aec37a9b0b4b459e6ab02bafc5163cadde3907e351790ad57982a2f2f6d48a33e9a284f216fd818ba149b98cd7a564074417273e77d49f99d942d8426b80e14d1f955f6"], 0x0, &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) r4 = dup2(r1, r1) write$FUSE_OPEN(r4, &(0x7f0000000380)={0x20, 0x0, 0x8, {0x0, 0x1}}, 0x20) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000004200)=""/4096, 0x9d}], 0x1, 0x2) ioctl$int_out(r3, 0x2, &(0x7f0000000700)) link(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='./file0\x00') getsockopt$bt_BT_SECURITY(r3, 0x112, 0x4, &(0x7f0000000340), 0x2) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) utimes(&(0x7f0000000440)='./file0\x00', &(0x7f0000000180)={{0x0, 0x7530}}) sysinfo(&(0x7f0000000680)=""/75) close(r1) [ 1089.301861][ T1193] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.5'. 03:35:10 executing program 0: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000140)='syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003a0081aee4050cecdb4cb9040a485e510befccdf7f3e9cf0758ef900e1cf3aebb1cb4c100c0003720000", 0x2e}], 0x1}, 0x0) recvmsg(r1, &(0x7f0000006600)={0x0, 0x0, &(0x7f0000006580)=[{0x0}, {0x0}, {0x0}], 0x3}, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) socketpair(0x1, 0x20000000000001, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x22) openat$cgroup(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 03:35:10 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0xffffff8c, 0x0) 03:35:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000600)=0x4, 0x12) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback, 0x0, 0x4, [@multicast2, @remote, @rand_addr, @multicast2]}, 0x20) close(r0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x4000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) 03:35:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1000000000000002, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f0000000000), 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="b4", 0x1, 0x0, 0x0, 0x0) [ 1089.519518][ C1] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 1089.530567][ C1] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 1089.531441][ C0] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration [ 1089.541614][ C1] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 03:35:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000600)=0x4, 0x12) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback, 0x0, 0x4, [@multicast2, @remote, @rand_addr, @multicast2]}, 0x20) close(r0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x4000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) 03:35:10 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006ac0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/49, 0xf00}, {&(0x7f0000000600)=""/4096, 0x1f10}], 0x2}}], 0x2, 0x0, 0x0) 03:35:10 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x100000000001b) ptrace$cont(0x1a, r1, 0x0, 0x0) 03:35:10 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0xfffffff6, 0x0) 03:35:10 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000600)=0x4, 0x12) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback, 0x0, 0x4, [@multicast2, @remote, @rand_addr, @multicast2]}, 0x20) close(r0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x4000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) [ 1089.679240][ C1] net_ratelimit: 24 callbacks suppressed [ 1089.679250][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1089.690846][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:35:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000600)=0x4, 0x12) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback, 0x0, 0x4, [@multicast2, @remote, @rand_addr, @multicast2]}, 0x20) close(r0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x4000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) 03:35:11 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x100000000001b) ptrace$cont(0x1a, r1, 0x0, 0x0) 03:35:11 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x100000000000000, 0x0) 03:35:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@multicast2, @loopback}, 0xc) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000600)=0x4, 0x12) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)={@multicast2, @loopback, 0x0, 0x4, [@multicast2, @remote, @rand_addr, @multicast2]}, 0x20) close(r0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x4000, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) 03:35:11 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x100000000001b) ptrace$cont(0x1a, r1, 0x0, 0x0) 03:35:11 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000200)={r1, @in={{0x2, 0x0, @local}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0x6d, &(0x7f00000000c0)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in={{0x2, 0x0, @remote}}}}, &(0x7f0000000000)=0xb0) 03:35:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100007}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="f96918ce12b2f495"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:35:11 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x200000000000000, 0x0) [ 1090.501037][ T1258] *** Guest State *** [ 1090.505298][ T1258] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 1090.515396][ T1258] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 1090.525561][ T1258] CR3 = 0x0000000000000000 [ 1090.530378][ T1258] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 1090.537273][ T1258] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 1090.544304][ T1258] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 1090.552880][ T1258] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 1090.561908][ T1258] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 1090.570937][ T1258] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 1090.580517][ T1258] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 1090.589463][ T1258] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 03:35:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006ac0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/49, 0xf00}, {&(0x7f0000000600)=""/4096, 0x1f10}], 0x2}}], 0x2, 0x0, 0x0) 03:35:11 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x100000000001b) ptrace$cont(0x1a, r1, 0x0, 0x0) 03:35:11 executing program 2: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write(r1, &(0x7f00000037c0)="c9", 0x1) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) dup2(r2, r3) 03:35:11 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x400000000000000, 0x0) [ 1090.598170][ T1258] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 1090.607245][ T1258] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 1090.633558][ T1258] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 03:35:11 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x8cffffff00000000, 0x0) 03:35:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") connect$pppoe(r1, &(0x7f0000000180)={0x18, 0x0, {0x3, @local, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x0, @link_local, 'syz_tun\x00'}}, 0x1e) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) r4 = socket$inet6(0xa, 0x3, 0x10000000003) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000100)={@remote, 0x23, r3}) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f00000003c0)={@remote, r3}, 0x14) [ 1090.679820][ T1258] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 1090.688556][ T1258] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 1090.708341][ T1258] EFER = 0x0000000000000000 PAT = 0x0007040600070406 03:35:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1000000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x40000) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x7ff) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) [ 1090.727774][ T1258] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 1090.769149][ T1258] Interruptibility = 00000000 ActivityState = 00000000 03:35:12 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0xf6ffffff00000000, 0x0) [ 1090.786761][ T1258] *** Host State *** [ 1090.798803][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1090.804661][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1090.810643][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1090.816435][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:35:12 executing program 1: syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000280)={0x0, 0x8, 0x18, "4cb8c4cdbf4042ce7613bd59cd410f518eebace935aba9c639402a8902ae47a867b0b7f42d26cf8e4050ba8f92cb447c189ca9d55c4b17c71b44417f", 0x28, "4eda5403a63f43cfe5cfa93586455b6f5ab094e4b0e008b6bf98e8ee715e17a4668212d2593e998a66fbed16910524026bc78710de1fa800b5e98740", 0x20}) syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x0) r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, 0x0, 0xfffffffffffffdcb) r1 = getpid() r2 = request_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='/dev/ptmx\x00', 0x0) keyctl$restrict_keyring(0x1d, r2, &(0x7f00000001c0)='.request_key_auth\x00', &(0x7f0000000200)='/dev/sequencer2\x00') sched_setscheduler(r1, 0x5, &(0x7f0000000040)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00005befdc)) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0x3) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video1\x00', 0x2, 0x0) [ 1090.862828][ T1258] RIP = 0xffffffff811b3d90 RSP = 0xffff88809596f8e0 [ 1090.879625][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1090.883999][ T1258] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 1090.885707][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1090.921843][ T1258] FSBase=00007f9ce1336700 GSBase=ffff8880ae900000 TRBase=fffffe0000003000 [ 1090.958301][ T1258] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 1090.965181][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1090.965237][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:35:12 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x16, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x84}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) [ 1091.015093][ T1258] CR0=0000000080050033 CR3=0000000059ef2000 CR4=00000000001426e0 [ 1091.051754][ T1258] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff87201360 [ 1091.070409][ T1258] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 1091.077572][ T1258] *** Control State *** [ 1091.086141][ T1258] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 1091.095462][ T1258] EntryControls=0000d1ff ExitControls=002fefff [ 1091.106064][ T1258] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 1091.115696][ T1258] VMEntry: intr_info=80000202 errcode=00000000 ilen=00000000 [ 1091.134208][ T1258] VMExit: intr_info=00000000 errcode=00000000 ilen=00000000 [ 1091.147421][ T1258] reason=80000021 qualification=0000000000000000 [ 1091.154966][ T1258] IDTVectoring: info=00000000 errcode=00000000 [ 1091.166786][ T1258] TSC Offset = 0xfffffdb5eff2ab3e [ 1091.172199][ T1258] EPT pointer = 0x0000000098a5c01e 03:35:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") connect$pppoe(r1, &(0x7f0000000180)={0x18, 0x0, {0x3, @local, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x0, @link_local, 'syz_tun\x00'}}, 0x1e) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) r4 = socket$inet6(0xa, 0x3, 0x10000000003) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000100)={@remote, 0x23, r3}) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f00000003c0)={@remote, r3}, 0x14) 03:35:12 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0xffffffff00000000, 0x0) 03:35:12 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-control\x00', 0x101002, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000340)=0xfffffffffffffff8, 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x5, 0x0, 0x4, 0x1, 0x5}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x100000000000000d) clone(0x80000000, &(0x7f0000000440)="07d247dc79e5c607a0ea758b2d2734f99926", 0x0, 0x0, &(0x7f0000000500)) 03:35:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006ac0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/49, 0xf00}, {&(0x7f0000000600)=""/4096, 0x1f10}], 0x2}}], 0x2, 0x0, 0x0) 03:35:12 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xfa3) socket$kcm(0xa, 0x40122000000003, 0x11) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x1ff) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) 03:35:12 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x2) 03:35:12 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") connect$pppoe(r1, &(0x7f0000000180)={0x18, 0x0, {0x3, @local, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x0, @link_local, 'syz_tun\x00'}}, 0x1e) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) r4 = socket$inet6(0xa, 0x3, 0x10000000003) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000100)={@remote, 0x23, r3}) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f00000003c0)={@remote, r3}, 0x14) 03:35:12 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x4) 03:35:13 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") connect$pppoe(r1, &(0x7f0000000180)={0x18, 0x0, {0x3, @local, 'syz_tun\x00'}}, 0x1e) connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x0, @link_local, 'syz_tun\x00'}}, 0x1e) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth0_to_team\x00', 0x0}) r4 = socket$inet6(0xa, 0x3, 0x10000000003) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000100)={@remote, 0x23, r3}) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f00000003c0)={@remote, r3}, 0x14) 03:35:13 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1000000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x40000) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x7ff) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 03:35:13 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x1000000) 03:35:13 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x2000000) 03:35:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1000000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x40000) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x7ff) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 03:35:13 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-control\x00', 0x101002, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000340)=0xfffffffffffffff8, 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x5, 0x0, 0x4, 0x1, 0x5}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x100000000000000d) clone(0x80000000, &(0x7f0000000440)="07d247dc79e5c607a0ea758b2d2734f99926", 0x0, 0x0, &(0x7f0000000500)) 03:35:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000006ac0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000280)=""/49, 0xf00}, {&(0x7f0000000600)=""/4096, 0x1f10}], 0x2}}], 0x2, 0x0, 0x0) 03:35:13 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xfa3) socket$kcm(0xa, 0x40122000000003, 0x11) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x1ff) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) 03:35:13 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x4000000) 03:35:14 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x8cffffff) 03:35:14 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1000000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x40000) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x7ff) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 03:35:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1000000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x40000) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x7ff) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 03:35:14 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0xf6ffffff) 03:35:14 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-control\x00', 0x101002, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000340)=0xfffffffffffffff8, 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x5, 0x0, 0x4, 0x1, 0x5}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x100000000000000d) clone(0x80000000, &(0x7f0000000440)="07d247dc79e5c607a0ea758b2d2734f99926", 0x0, 0x0, &(0x7f0000000500)) 03:35:14 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-control\x00', 0x101002, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000340)=0xfffffffffffffff8, 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x5, 0x0, 0x4, 0x1, 0x5}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x100000000000000d) clone(0x80000000, &(0x7f0000000440)="07d247dc79e5c607a0ea758b2d2734f99926", 0x0, 0x0, &(0x7f0000000500)) 03:35:15 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0xffffff8c) 03:35:15 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0xfffffff6) 03:35:15 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1000000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x40000) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x7ff) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 03:35:15 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xfa3) socket$kcm(0xa, 0x40122000000003, 0x11) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x1ff) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) 03:35:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000280)='/dev/md0\x00', 0x0, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x1000000000000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r1, 0x40505330, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x40000) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e23}, 0x1c) listen(r0, 0x7ff) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x4e23, @local}], 0x10) 03:35:15 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x100000000000000) 03:35:15 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x200000000000000) [ 1094.667536][ C0] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 03:35:15 executing program 5: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-control\x00', 0x101002, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000340)=0xfffffffffffffff8, 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x5, 0x0, 0x4, 0x1, 0x5}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x100000000000000d) clone(0x80000000, &(0x7f0000000440)="07d247dc79e5c607a0ea758b2d2734f99926", 0x0, 0x0, &(0x7f0000000500)) 03:35:15 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-control\x00', 0x101002, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000340)=0xfffffffffffffff8, 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x5, 0x0, 0x4, 0x1, 0x5}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x100000000000000d) clone(0x80000000, &(0x7f0000000440)="07d247dc79e5c607a0ea758b2d2734f99926", 0x0, 0x0, &(0x7f0000000500)) [ 1094.956651][ C0] net_ratelimit: 16 callbacks suppressed [ 1094.956660][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1094.968400][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1094.974281][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1094.980121][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1095.036561][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1095.043394][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:35:16 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x400000000000000) 03:35:16 executing program 4: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)="0b8493da69d419d3e5a313affec5c48780fa42c0606761a2404a9a6c5a567525af09b4ae9ae6a36177018ff55a012c3fa3d9a196466f930c37b676633bbcdd54ad15d1d19aa5b95e6b797acddbacf7ed0796c0f196dfbb8bbe0d57cab508ca10839a6750dab329b861c57d41508204309f85c612f8e5b88a528d442e05736cbb65dc347f371e3b617e807818682759751ae85a5f6de6d672fdf84dfe6317c6c4a7e11b8fd8babb2127430a3eb3", 0xad) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x502, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) fchownat(r2, &(0x7f0000000500)='./file1/file0\x00', 0x0, 0x0, 0x1100) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) setxattr$system_posix_acl(0x0, &(0x7f0000000380)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bind$rxrpc(r2, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @loopback, 0x504}}, 0x24) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) lgetxattr(0x0, 0x0, &(0x7f0000000bc0)=""/108, 0x6c) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') stat(&(0x7f0000000440)='./file1\x00', &(0x7f0000000640)) preadv(r1, &(0x7f0000000700), 0x31f, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r5, 0xae80, 0x0) [ 1095.118814][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1095.125740][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:35:16 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x8cffffff00000000) 03:35:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) r2 = dup2(r1, r0) ioctl$VIDIOC_ENUMAUDIO(r2, 0xc0345641, 0x0) 03:35:16 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-control\x00', 0x101002, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000340)=0xfffffffffffffff8, 0x4) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x5, 0x0, 0x4, 0x1, 0x5}) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SET_NETID(0xffffffffffffffff, 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) epoll_create1(0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x10}, 0x10) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x100000000000000d) clone(0x80000000, &(0x7f0000000440)="07d247dc79e5c607a0ea758b2d2734f99926", 0x0, 0x0, &(0x7f0000000500)) 03:35:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='illinois\x00q\xf1\xb5+\xc9P\xe6\xab\xc9\xaf\xc5+Q\xdb\xdb\t^\x0f\x8d\x1f\xf1\x80', 0x1f) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 1095.756745][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1095.765326][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:35:17 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0xfa3) socket$kcm(0xa, 0x40122000000003, 0x11) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x1ff) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x3f00) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) 03:35:17 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0xf6ffffff00000000) 03:35:17 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$bfs(&(0x7f0000000040)='bfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x800004, 0x0) 03:35:17 executing program 5: write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$rxrpc(0x21, 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000100)='syz', 0x3) 03:35:17 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000140)={0xb, 0x10, 0xfa00, {0x0}}, 0x18) 03:35:17 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0xffffffff00000000) [ 1096.034708][ T1400] overlayfs: './file0' not a directory 03:35:17 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x400000, 0x0) renameat(r0, &(0x7f0000000100)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') setxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.SMACK64IPOUT\x00', 0x0, 0xad, 0x2) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{}, {0x0, 0x7530}}) 03:35:17 executing program 4: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)="0b8493da69d419d3e5a313affec5c48780fa42c0606761a2404a9a6c5a567525af09b4ae9ae6a36177018ff55a012c3fa3d9a196466f930c37b676633bbcdd54ad15d1d19aa5b95e6b797acddbacf7ed0796c0f196dfbb8bbe0d57cab508ca10839a6750dab329b861c57d41508204309f85c612f8e5b88a528d442e05736cbb65dc347f371e3b617e807818682759751ae85a5f6de6d672fdf84dfe6317c6c4a7e11b8fd8babb2127430a3eb3", 0xad) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x502, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) fchownat(r2, &(0x7f0000000500)='./file1/file0\x00', 0x0, 0x0, 0x1100) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) setxattr$system_posix_acl(0x0, &(0x7f0000000380)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bind$rxrpc(r2, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @loopback, 0x504}}, 0x24) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) lgetxattr(0x0, 0x0, &(0x7f0000000bc0)=""/108, 0x6c) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') stat(&(0x7f0000000440)='./file1\x00', &(0x7f0000000640)) preadv(r1, &(0x7f0000000700), 0x31f, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:35:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vsock\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x800000080011, r1, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 03:35:17 executing program 5: write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$rxrpc(0x21, 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000100)='syz', 0x3) 03:35:17 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4000004e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x2ec, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='scalable\x00', 0xffb2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:35:17 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)=[&(0x7f00000000c0)='cgroup2\x00', &(0x7f0000000100)='cgroup2\x00', &(0x7f0000000180)='cgroup2\x00', &(0x7f00000001c0)='(^-\\selinuxem0systemem0\x00', &(0x7f0000000240)='cgroup2\x00'], &(0x7f00000005c0)=[&(0x7f0000000300)='securityppp1GPL\\wlan1\x00', &(0x7f0000000340)='procvmnet1[trustedcgroupsecurity@eth0%system\x00', &(0x7f0000000380)='cgroup2\x00', &(0x7f00000003c0)='selinux\xae\xe7p:\x00', &(0x7f0000000400)='cgroup2\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='security.SMACK64MMAP\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='security.SMACK64MMAP\x00', &(0x7f0000000580)='wlan1proc[$[{trusted#\x00'], 0x1000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000680)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x24, r1, 0x202, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x2}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x6ac1067b99dd21df) 03:35:18 executing program 5: write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$rxrpc(0x21, 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000100)='syz', 0x3) 03:35:18 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2000) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000040)={0x7, 0x1}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:18 executing program 1: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)="0b8493da69d419d3e5a313affec5c48780fa42c0606761a2404a9a6c5a567525af09b4ae9ae6a36177018ff55a012c3fa3d9a196466f930c37b676633bbcdd54ad15d1d19aa5b95e6b797acddbacf7ed0796c0f196dfbb8bbe0d57cab508ca10839a6750dab329b861c57d41508204309f85c612f8e5b88a528d442e05736cbb65dc347f371e3b617e807818682759751ae85a5f6de6d672fdf84dfe6317c6c4a7e11b8fd8babb2127430a3eb3", 0xad) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x502, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) fchownat(r2, &(0x7f0000000500)='./file1/file0\x00', 0x0, 0x0, 0x1100) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) setxattr$system_posix_acl(0x0, &(0x7f0000000380)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bind$rxrpc(r2, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @loopback, 0x504}}, 0x24) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) lgetxattr(0x0, 0x0, &(0x7f0000000bc0)=""/108, 0x6c) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') stat(&(0x7f0000000440)='./file1\x00', &(0x7f0000000640)) preadv(r1, &(0x7f0000000700), 0x31f, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:35:18 executing program 2: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)="0b8493da69d419d3e5a313affec5c48780fa42c0606761a2404a9a6c5a567525af09b4ae9ae6a36177018ff55a012c3fa3d9a196466f930c37b676633bbcdd54ad15d1d19aa5b95e6b797acddbacf7ed0796c0f196dfbb8bbe0d57cab508ca10839a6750dab329b861c57d41508204309f85c612f8e5b88a528d442e05736cbb65dc347f371e3b617e807818682759751ae85a5f6de6d672fdf84dfe6317c6c4a7e11b8fd8babb2127430a3eb3", 0xad) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x502, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) fchownat(r2, &(0x7f0000000500)='./file1/file0\x00', 0x0, 0x0, 0x1100) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) setxattr$system_posix_acl(0x0, &(0x7f0000000380)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bind$rxrpc(r2, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @loopback, 0x504}}, 0x24) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) lgetxattr(0x0, 0x0, &(0x7f0000000bc0)=""/108, 0x6c) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') stat(&(0x7f0000000440)='./file1\x00', &(0x7f0000000640)) preadv(r1, &(0x7f0000000700), 0x31f, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:35:18 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='security.SMACK64IPOUT\x00', 0x0, 0x1d2, 0x200000000000000) 03:35:18 executing program 5: write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r0 = socket$rxrpc(0x21, 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000100)='syz', 0x3) 03:35:18 executing program 3: chdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file0\x00') mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f00000001c0)=[0x5]) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xfff, 0x2) socket$can_raw(0x1d, 0x3, 0x1) dup2(r1, 0xffffffffffffff9c) 03:35:18 executing program 4: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)="0b8493da69d419d3e5a313affec5c48780fa42c0606761a2404a9a6c5a567525af09b4ae9ae6a36177018ff55a012c3fa3d9a196466f930c37b676633bbcdd54ad15d1d19aa5b95e6b797acddbacf7ed0796c0f196dfbb8bbe0d57cab508ca10839a6750dab329b861c57d41508204309f85c612f8e5b88a528d442e05736cbb65dc347f371e3b617e807818682759751ae85a5f6de6d672fdf84dfe6317c6c4a7e11b8fd8babb2127430a3eb3", 0xad) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x502, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) fchownat(r2, &(0x7f0000000500)='./file1/file0\x00', 0x0, 0x0, 0x1100) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) setxattr$system_posix_acl(0x0, &(0x7f0000000380)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bind$rxrpc(r2, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @loopback, 0x504}}, 0x24) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) lgetxattr(0x0, 0x0, &(0x7f0000000bc0)=""/108, 0x6c) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') stat(&(0x7f0000000440)='./file1\x00', &(0x7f0000000640)) preadv(r1, &(0x7f0000000700), 0x31f, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:35:18 executing program 5: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)="0b8493da69d419d3e5a313affec5c48780fa42c0606761a2404a9a6c5a567525af09b4ae9ae6a36177018ff55a012c3fa3d9a196466f930c37b676633bbcdd54ad15d1d19aa5b95e6b797acddbacf7ed0796c0f196dfbb8bbe0d57cab508ca10839a6750dab329b861c57d41508204309f85c612f8e5b88a528d442e05736cbb65dc347f371e3b617e807818682759751ae85a5f6de6d672fdf84dfe6317c6c4a7e11b8fd8babb2127430a3eb3", 0xad) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x502, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) fchownat(r2, &(0x7f0000000500)='./file1/file0\x00', 0x0, 0x0, 0x1100) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) setxattr$system_posix_acl(0x0, &(0x7f0000000380)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bind$rxrpc(r2, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @loopback, 0x504}}, 0x24) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) lgetxattr(0x0, 0x0, &(0x7f0000000bc0)=""/108, 0x6c) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') stat(&(0x7f0000000440)='./file1\x00', &(0x7f0000000640)) preadv(r1, &(0x7f0000000700), 0x31f, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:35:18 executing program 0: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)="0b8493da69d419d3e5a313affec5c48780fa42c0606761a2404a9a6c5a567525af09b4ae9ae6a36177018ff55a012c3fa3d9a196466f930c37b676633bbcdd54ad15d1d19aa5b95e6b797acddbacf7ed0796c0f196dfbb8bbe0d57cab508ca10839a6750dab329b861c57d41508204309f85c612f8e5b88a528d442e05736cbb65dc347f371e3b617e807818682759751ae85a5f6de6d672fdf84dfe6317c6c4a7e11b8fd8babb2127430a3eb3", 0xad) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x502, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) fchownat(r2, &(0x7f0000000500)='./file1/file0\x00', 0x0, 0x0, 0x1100) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) setxattr$system_posix_acl(0x0, &(0x7f0000000380)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bind$rxrpc(r2, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @loopback, 0x504}}, 0x24) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) lgetxattr(0x0, 0x0, &(0x7f0000000bc0)=""/108, 0x6c) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') stat(&(0x7f0000000440)='./file1\x00', &(0x7f0000000640)) preadv(r1, &(0x7f0000000700), 0x31f, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:35:18 executing program 2: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)="0b8493da69d419d3e5a313affec5c48780fa42c0606761a2404a9a6c5a567525af09b4ae9ae6a36177018ff55a012c3fa3d9a196466f930c37b676633bbcdd54ad15d1d19aa5b95e6b797acddbacf7ed0796c0f196dfbb8bbe0d57cab508ca10839a6750dab329b861c57d41508204309f85c612f8e5b88a528d442e05736cbb65dc347f371e3b617e807818682759751ae85a5f6de6d672fdf84dfe6317c6c4a7e11b8fd8babb2127430a3eb3", 0xad) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x502, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) fchownat(r2, &(0x7f0000000500)='./file1/file0\x00', 0x0, 0x0, 0x1100) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) setxattr$system_posix_acl(0x0, &(0x7f0000000380)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bind$rxrpc(r2, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @loopback, 0x504}}, 0x24) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) lgetxattr(0x0, 0x0, &(0x7f0000000bc0)=""/108, 0x6c) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') stat(&(0x7f0000000440)='./file1\x00', &(0x7f0000000640)) preadv(r1, &(0x7f0000000700), 0x31f, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:35:18 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x1) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:18 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/audio\x00', 0x8000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000240)=[@in6={0xa, 0x4e22, 0x100000001, @dev={0xfe, 0x80, [], 0x25}, 0x758}, @in6={0xa, 0x4e23, 0x7f, @empty, 0x2}, @in6={0xa, 0x4e20, 0xbd8, @rand_addr="9df5a8cbb498ef3d599556df26a86bf2", 0x9}], 0x54) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x80000001, 0x800) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={r2, 0x5}, &(0x7f0000000180)=0x8) ioperm(0x4, 0x1, 0x4) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:18 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000000c0)='security.SMACK6jMMAP\x00\x9cd-1^a\xae\x8b\x01xL\xaa}\xaa\x14\xf1\xfa\xfdb\x8f\x9fkC\xf7i \xb5\x12>\xdbE9\xfa\xe3\xd4\xecw7\x8d\x00\xb1\xf1\xc3\xb6\xf6\xb0\xff\x8av!8\xaeHf?\x81\xd0\x9e\xd8)\b\xf12m\x14!%\x1b\xa0Udf\v\xefx\xd6\x9f+\x1b\xe6>\b\xc1>}\xc2E \x98\x14\x17\x14i\xa9\x8c\x00\x93[2\x91Y\xa5\x9e\xc2x\x01\xed\f\x18\x82$\b\xa1\x12\tA\x91:\v\a\x8ex[\xbf\xe3%T\xbb~\xff?^\x7f9\xba\x9d\x1f\xe1\x83\x9a\v\x88\x04\xe3,?1\xaf\x06\x11\x9d\x01&X/\x92\x92\xd6\x81\x94\xe57\x91\xb1w\xf6\xfb\x9c\x90IdBln\xbdS\x9e\xe2\xf0\x12\r\xe5\xe0\x7f]\xbe\x9f\x82\r8\x03\x00\x00\x00v([\xc1NIN9V\xc1\x04U\xfeM\xea', 0x6, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x2000) inotify_add_watch(r0, &(0x7f0000000180)='./file0\x00', 0x801) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:init_var_run_t:s0\x00', 0x24, 0x0) 03:35:21 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000000c0)=0xfffffffffffffffb, 0x8) 03:35:21 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r0, &(0x7f0000e5c000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) 03:35:21 executing program 0: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x6, &(0x7f0000027000)={0x1}) unshare(0x40600) ftruncate(r0, 0xa92) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 03:35:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="0affefff7f000000001e6ea64aa8e1c9", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000004040)=[{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f00000002c0)="205eecb0ade76f0c62d5e6f75dd084ae30b3382f0b6e2b47fdc298356dc8a4", 0x1f}], 0x1}], 0x1, 0x0) [ 1100.074079][ C1] net_ratelimit: 24 callbacks suppressed [ 1100.074088][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1100.093206][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:35:21 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='yeah\x00', 0x5) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) socket$rxrpc(0x21, 0x2, 0x80002) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:21 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f00000000c0)={{0xffffff94}, {0xfdfdffff}}) 03:35:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="0affefff7f000000001e6ea64aa8e1c9", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000004040)=[{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f00000002c0)="205eecb0ade76f0c62d5e6f75dd084ae30b3382f0b6e2b47fdc298356dc8a4", 0x1f}], 0x1}], 0x1, 0x0) 03:35:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="0affefff7f000000001e6ea64aa8e1c9", 0x10) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$unix(r1, &(0x7f0000004040)=[{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f00000002c0)="205eecb0ade76f0c62d5e6f75dd084ae30b3382f0b6e2b47fdc298356dc8a4", 0x1f}], 0x1}], 0x1, 0x0) 03:35:21 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10000, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b000000050000006005000020010000c8030000c80300002001000000000000c8040000c8040000c8040000c8040000c804000005000000", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="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"], 0x5c0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:21 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f00000000c0)={{0xffffff94}, {0xfdfdffff}}) 03:35:21 executing program 2: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)="0b8493da69d419d3e5a313affec5c48780fa42c0606761a2404a9a6c5a567525af09b4ae9ae6a36177018ff55a012c3fa3d9a196466f930c37b676633bbcdd54ad15d1d19aa5b95e6b797acddbacf7ed0796c0f196dfbb8bbe0d57cab508ca10839a6750dab329b861c57d41508204309f85c612f8e5b88a528d442e05736cbb65dc347f371e3b617e807818682759751ae85a5f6de6d672fdf84dfe6317c6c4a7e11b8fd8babb2127430a3eb3", 0xad) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x502, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000040)) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, 0x0, 0x0) fchownat(r2, &(0x7f0000000500)='./file1/file0\x00', 0x0, 0x0, 0x1100) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5"]) setxattr$system_posix_acl(0x0, &(0x7f0000000380)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) bind$rxrpc(r2, &(0x7f0000000080)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e24, 0x0, @loopback, 0x504}}, 0x24) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) lgetxattr(0x0, 0x0, &(0x7f0000000bc0)=""/108, 0x6c) link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') stat(&(0x7f0000000440)='./file1\x00', &(0x7f0000000640)) preadv(r1, &(0x7f0000000700), 0x31f, 0x0) r4 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r4, 0xae60) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r5, 0x4400ae8f, &(0x7f0000000280)) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:35:21 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x2, 0x80) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.SMA\x01A\xc7\xd4[\xddK64MMAP\x00', 0x0, 0xffffffffffffff79, 0x3) 03:35:21 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f00000000c0)={{0xffffff94}, {0xfdfdffff}}) 03:35:22 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x10000, 0x244100) r1 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x7, 0x283ebaffd950d8f2) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs, &(0x7f0000000480)=0x6e) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=0xffffffffffffffff, 0x4) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000300)="2cae42a17d15acffd74ca5f407b5689fea6079d659a3e4941861a32c685c465b6ef719e113756bf7b3c698cc28c8c2f59f0ddae18beb588bd7533428375fa372eec088219b8e6407d9d6476400cf42afe69696f77486230d4e9fe5daed56f105295332e92ae1edbb885a0a12dc61565401a0cfb99c67e8e414110846076e2fd5010fbe65349ec18da6174e424708d290b559be6be5e1fbe71e09a74053aa11e7c3f1f19202e1864e56103d033c7b04a503a6da90961eed79c32c9fedfe8a887ecda88c6bc9b172e60a6935fd16a3bfdf52bb27b02434efcd6bb25ad50a0977d7afecb1e91a35bfd7dd90f4f7c66013", 0xef}, {&(0x7f0000000180)="bd24b0739e1e8a39746f341f4543b0aaea0aa4d1ccbb19878d8afaeb43686f920ffbc922ed", 0x25}, {&(0x7f00000001c0)="0726b3f07e64a54778eab4e9f82b483795940b42d65c4cbd192f14a14373f4cfd0", 0x21}], 0x3, &(0x7f0000000540)=[@rights={0x20, 0x1, 0x1, [r1, r2, r3, r4]}, @rights={0x18, 0x1, 0x1, [r5]}], 0x38, 0x4000}, 0x1) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x0, 0x0) ioctl$KDSETLED(r6, 0x4b32, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:22 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) 03:35:22 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x1f, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000800)={'veth1\x00', 0x0}) bind$packet(r0, &(0x7f0000000080)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local}, 0x14) sendto$inet6(r0, &(0x7f0000000200)="030400000300600000000000fff55b4202938207d9fb3780398d537500e50600591f301ee616d5c01843e0650053c0e385472da70100af5ba514d44d1e4a4c00801600002fd08d49a47eff71bc4131fe4c1f99bf00a900000200d1843e770afd6e9ef5837dbd0000a4273015b7b65288", 0x70, 0x0, 0x0, 0x0) 03:35:22 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f00000000c0)={{0xffffff94}, {0xfdfdffff}}) 03:35:22 executing program 0: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x6, &(0x7f0000027000)={0x1}) unshare(0x40600) ftruncate(r0, 0xa92) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 03:35:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) move_pages(0x0, 0x221d, &(0x7f0000000000)=[&(0x7f0000ed5000/0x3000)=nil], &(0x7f0000000ffc), &(0x7f0000000000), 0x0) 03:35:22 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) 03:35:22 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) recvmmsg(r0, &(0x7f0000002400)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)=""/183, 0xb7}], 0x1}, 0x4}, {{&(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000300)=""/80, 0x50}, {&(0x7f0000000380)=""/72, 0x48}, {&(0x7f0000000400)=""/160, 0xa0}], 0x3, &(0x7f00000004c0)=""/231, 0xe7}, 0x2}, {{&(0x7f00000005c0)=@xdp, 0x80, &(0x7f0000000840)=[{&(0x7f0000000640)=""/158, 0x9e}, {&(0x7f0000000700)=""/155, 0x9b}, {&(0x7f00000007c0)=""/68, 0x44}], 0x3, &(0x7f0000000880)=""/64, 0x40}, 0x81}, {{&(0x7f00000008c0)=@can, 0x80, &(0x7f0000000980)=[{&(0x7f0000000940)=""/48, 0x30}], 0x1}, 0x4fc6}, {{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f00000009c0)=""/113, 0x71}, {&(0x7f0000000a40)=""/69, 0x45}, {&(0x7f0000000ac0)=""/144, 0x90}, {&(0x7f0000000b80)=""/162, 0xa2}, {&(0x7f0000000c40)=""/162, 0xa2}, {&(0x7f0000000d00)=""/74, 0x4a}, {&(0x7f0000000d80)=""/184, 0xb8}, {&(0x7f0000000e40)=""/30, 0x1e}], 0x8, &(0x7f0000000f00)=""/76, 0x4c}, 0x3}, {{&(0x7f0000000f80)=@nfc_llcp, 0x80, &(0x7f0000001100)=[{&(0x7f0000001000)=""/137, 0x89}, {&(0x7f00000010c0)=""/39, 0x27}], 0x2, &(0x7f0000001140)=""/124, 0x7c}, 0x3}, {{&(0x7f00000011c0)=@nfc_llcp, 0x80, &(0x7f0000002380)=[{&(0x7f0000001240)=""/121, 0x79}, {&(0x7f00000012c0)=""/14, 0xe}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/98, 0x62}], 0x4, &(0x7f00000023c0)=""/11, 0xb}, 0xfffffffffffffffa}], 0x7, 0x2100, &(0x7f00000025c0)={0x77359400}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000000)='\x92ecurity.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000002600)='/dev/vfio/vfio\x00', 0x80000, 0x0) getsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f0000002640)=""/4096, &(0x7f0000003640)=0x1000) 03:35:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e0000002800812de45ae087185082cf0300b0eba06ec4000323000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 03:35:22 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x100, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x121001, 0x0) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f00000000c0)={0x70, 0x800, 0x10000, 0x1ff}) 03:35:22 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) [ 1101.170214][ T1661] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1101.193664][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1101.200984][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1101.209397][ C0] protocol 88fb is buggy, dev hsr_slave_0 03:35:22 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='xfs\x00', 0x2001, 0x0) prctl$PR_SET_KEEPCAPS(0x8, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:22 executing program 1: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000240)='./bus\x00', 0x800) lseek(r0, 0x0, 0x4) 03:35:22 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) [ 1101.218822][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1101.273528][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1101.289812][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:35:22 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000440)='security.SMACK6\x14\xd5MMAq\x00\xae\xf2S\xc8/ds\xc65\x93\xf2\x8d\xcd\xdc\xe3\x1d\xd0&\xa5\x82\xd2\xda\x98\xffJ\xa7i\r\xd6}{\xb0z\x86\x80Kr_&\x95\xcc\xd6>\xa098\aW\xe2\xe7,s[k\xc6\xca\x17\xaf\x80\x01\x00\x00\x00\x00\x00\x00\x00\xfdD\xa4nd\xe0\xe6Z\xa0\x14\xce/\x04\x00\xc6\xbf\x9e|a\xd3\xe9\aW\xc3\xa4\xcdz#5\xdfq\xe9\xa4\x0e$u\xc4\xb9L\b\xeb\xdc4 \"n\xd9;\x11\bb>\x85\xfb\x8f\x97\xbc\xe6(\xc0+\xfa\xfe\xb7z?\xfb:?\xaf\x89\xf3Y\xeb-\xa0\xb2G\xcd\xb7D\xba\xc5\aX p\xa5\xf5\xa6\x86\"\xb9\xfck`\xcf\xfd\x81\xd5\xbc\xba;V\xf8\x9d0;\\\r2\x8e\xd6\x1a\xd8\xd4\x9a\x14l\x06\x8e$\xa4`\xe8\xfd\xb5/\x97\x85\xca>3\xbc_\xc0\x85\xf20\x7f\xc91=\x1d\xb0HIA\x8a\xdd\xc8\x8e4\x92\x99}\x88\x85LU\x93\xdf25\x06\xc3\x13\x8a\xdcn\xe6n\x1f\x9a\xb3\xb7\xe5\xe5\xf5\xceY\xc5\xceE\x12\vOF@srEI\xf5\x80Z4\x8c\ni]\xect\xf0\xeb\xd7bVh\x1d\xd2\x17\xba\xc8\xa5\x10D}\xd0\'\x1d\x88\xe1\x12\xaf\xb7\xa13\xca\"\x9a\xe6\xe3\xe8\\\x8e\xbf[i=Y\xa7\xe5\xf6\xafDs\x94\x96\x9a\xe2\xcb6\x85\aShH\xbe\xef\x9e}k:\xc8\x99c\x80\x9b\xd2D\x92\xe7\xb2\xe9\xa7\xee\xb1\x9dg\x03\xa6\x1f\xeeJ\x8c\xc9>AFQ0\xe8\n\xd4\xc8\x1d!\x17\xc6H0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000440)={0x0, 0x1ff, 0x2}, 0xc) [ 1101.353503][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1101.362480][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:35:23 executing program 0: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x6, &(0x7f0000027000)={0x1}) unshare(0x40600) ftruncate(r0, 0xa92) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 03:35:23 executing program 2: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ashmem\x00', 0x0, 0x0) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/228, 0xe4}], 0x1) 03:35:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e0000002800812de45ae087185082cf0300b0eba06ec4000323000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 03:35:23 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x5437, 0x0) ioctl$TCSETSF(r0, 0x5441, 0x0) 03:35:23 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff}) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000000240)="624e21585cad3d575425a2c8fd8d88f3894dc166ddc8be925de0632fafde92538635dce44263b1ed19a42ebdb3b742a511dab3b5e115cfc49fab974031b37a14bffe0d06bda135e48efe7010e81fee94c4ac1c7488be0b7187f41e0bcad3cf475b158da0cb574e37a69a68355d9c44d1ca9ba2330c3fc52a8a7876d3ad", 0x7d}, {&(0x7f0000000300)="56f4c536ed67115bbbde0864fe9f58b2812b95db91bee01fc2a9ce67c8a408f6bf1440dcf2d3a529706876125abdbeb5b9582c1f310d127bad55f7c5c5075a6bd7dd509ebe7c9001a5f9779d3b1e8cc538fbd7698e74894caafa2c38609130b5ca9c72efff17c46e8bed940add77", 0x6e}], 0x3, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x881) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={0xffffffffffffffff}, 0x113, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0xfa2, @mcast2, 0x1}, r2}}, 0x30) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000380)={0x8, 0x0, [{0x248}, {0x400003a3, 0x0, 0x5}, {0xbf3, 0x0, 0xdd}, {0xc0010114, 0x0, 0xc7}, {0x4000029f, 0x0, 0x7f}, {0x40000bdf, 0x0, 0x1877}, {0x235, 0x0, 0x1ff}, {0xa90, 0x0, 0x4cfc8957}]}) 03:35:23 executing program 5: syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff, 0x3}}}, 0x118) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r1, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad77", 0x4a) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) flock(r1, 0x8) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000640)={{0x8f, @multicast2, 0x4e21, 0x3, 'lblc\x00', 0x34, 0x4, 0x24}, {@multicast2, 0x4e21, 0x10000, 0x0, 0xd5, 0x2}}, 0x44) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x15, 0xf, 0xfffffffffffffffe, "01a40c3b68511fb408ba75017fac6ee2ac8e65b6225b9c81245ccbd7d52ad387", 0x7f777f5f}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000005c0)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000440)={0x0, 0x1ff, 0x2}, 0xc) [ 1101.870552][ T1689] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 03:35:23 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff, 0x3}}}, 0x118) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r1, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad77", 0x4a) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) flock(r1, 0x8) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000640)={{0x8f, @multicast2, 0x4e21, 0x3, 'lblc\x00', 0x34, 0x4, 0x24}, {@multicast2, 0x4e21, 0x10000, 0x0, 0xd5, 0x2}}, 0x44) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x15, 0xf, 0xfffffffffffffffe, "01a40c3b68511fb408ba75017fac6ee2ac8e65b6225b9c81245ccbd7d52ad387", 0x7f777f5f}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000005c0)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000440)={0x0, 0x1ff, 0x2}, 0xc) 03:35:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\a\x00', 0x43732e5398416f1a}) ioctl$TUNSETOFFLOAD(r1, 0x801054db, 0x713000) 03:35:23 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10000, 0x0) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000300)={{0x106002, 0x4, 0xc, 0x20, 0x1, 0x7, 0x4, 0x5, 0x0, 0x6, 0x3, 0x8e1}, {0x10f000, 0x100000, 0x1d, 0x3ff, 0x6, 0xf2, 0x5, 0x20, 0x4, 0x48, 0x0, 0x1}, {0x100000, 0xf000, 0xf, 0x5, 0x7, 0x7, 0xfffffffffffffffc, 0x8000, 0x9, 0x9, 0x5, 0x8}, {0x0, 0x4001, 0xf, 0x80, 0xc05, 0x38d, 0xb1, 0x40, 0x80000001, 0xffffffffffffe7ff, 0x1ff, 0x10}, {0x10f000, 0xf000, 0xf, 0x2, 0x6, 0x5d847ddc, 0x7, 0xd362, 0x8f5, 0x2, 0x8, 0x1}, {0xf000, 0x1004, 0x4, 0x5, 0x366c4ba2, 0x0, 0x20200000000, 0x2, 0xfff, 0x8, 0x8}, {0x5000, 0x0, 0xf, 0x9, 0x4, 0x5, 0x100000001, 0x10001, 0xffff, 0x7fffffff, 0x4, 0x3}, {0x6000, 0xf002, 0xc, 0x1f, 0x0, 0xdb, 0x1, 0xffffffff, 0x330, 0xb653, 0x7ff0000000000000, 0x10000}, {0x2000, 0x103001}, {0x5000, 0xd000}, 0x10, 0x0, 0x1000, 0x8, 0xa, 0x5d01, 0x0, [0x7ff, 0x40, 0x2, 0x7]}) 03:35:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e0000002800812de45ae087185082cf0300b0eba06ec4000323000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 03:35:23 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x1) [ 1102.094296][ T1711] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 03:35:23 executing program 2: syz_mount_image$iso9660(&(0x7f00000000c0)='iso9660\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[{@norock='norock'}, {@check_relaxed='check=relaxed'}, {@nocompress='nocompress'}]}) 03:35:23 executing program 0: mkdir(&(0x7f0000001c40)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x6, &(0x7f0000027000)={0x1}) unshare(0x40600) ftruncate(r0, 0xa92) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 03:35:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)="2e0000002800812de45ae087185082cf0300b0eba06ec4000323000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 03:35:23 executing program 5: syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff, 0x3}}}, 0x118) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r1, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad77", 0x4a) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) flock(r1, 0x8) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000640)={{0x8f, @multicast2, 0x4e21, 0x3, 'lblc\x00', 0x34, 0x4, 0x24}, {@multicast2, 0x4e21, 0x10000, 0x0, 0xd5, 0x2}}, 0x44) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x15, 0xf, 0xfffffffffffffffe, "01a40c3b68511fb408ba75017fac6ee2ac8e65b6225b9c81245ccbd7d52ad387", 0x7f777f5f}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000005c0)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000440)={0x0, 0x1ff, 0x2}, 0xc) 03:35:23 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff, 0x3}}}, 0x118) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r1, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad77", 0x4a) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) flock(r1, 0x8) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000640)={{0x8f, @multicast2, 0x4e21, 0x3, 'lblc\x00', 0x34, 0x4, 0x24}, {@multicast2, 0x4e21, 0x10000, 0x0, 0xd5, 0x2}}, 0x44) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x15, 0xf, 0xfffffffffffffffe, "01a40c3b68511fb408ba75017fac6ee2ac8e65b6225b9c81245ccbd7d52ad387", 0x7f777f5f}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000005c0)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000440)={0x0, 0x1ff, 0x2}, 0xc) 03:35:23 executing program 3: io_setup(0x101, &(0x7f00000000c0)=0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vfio/vfio\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="8f000000f2ff7f0000d1a917b3ec5ac5925bd8461710487f2f7c849444a70f50140a5ab85a1d363d9b8a43bf68a49573c64802f21747b74e2def9f60eaf99c528d129c3d231a013def64f2cd0a22a48dc6447b5987a6a5aab565070763000d51717b4d95d7a14d66c5d0ba2dae45b569999418c0e88a0a763608c0801fdbb314a802160780183b602883a83c25c600738f0182"], &(0x7f0000000500)=0x97) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20ncci\x00', 0x440000, 0x0) io_getevents(r0, 0x10001, 0x6, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000180)={r1, r2+10000000}) r4 = semget$private(0x0, 0x7, 0x4ca) semtimedop(r4, &(0x7f0000000000)=[{0x2, 0x64, 0x800}, {0x2, 0x800}, {0x7, 0xfff, 0x800}, {0x3, 0x80000001, 0x1000}, {0x7, 0x80, 0x1000}, {0x0, 0x7ff, 0x1000}, {0x7, 0x1ff, 0x1800}, {0x4, 0x7, 0x1800}, {0x2, 0x7e, 0x800}], 0x9, &(0x7f0000000040)) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(r3, 0x40084504, &(0x7f0000000540)=[0x4, 0x7]) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) write(r1, &(0x7f0000000080)="130000004e001f00ff03f4f9002305000a04f5", 0x13) [ 1102.740087][ T1720] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 03:35:24 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x25, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="006340400000000000000a00007a000000000000d61a000005000000000000befe8a5ac196"], 0x0, 0x0, 0x0}) 03:35:24 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:24 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r2, 0xc00caee0, &(0x7f0000000280)={0x4, 0xffffffffffffffff}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0x36, 0x0, 0x0, 0x0) [ 1103.064109][ T1748] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 03:35:24 executing program 1: syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff, 0x3}}}, 0x118) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r1, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad77", 0x4a) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) flock(r1, 0x8) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000640)={{0x8f, @multicast2, 0x4e21, 0x3, 'lblc\x00', 0x34, 0x4, 0x24}, {@multicast2, 0x4e21, 0x10000, 0x0, 0xd5, 0x2}}, 0x44) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x15, 0xf, 0xfffffffffffffffe, "01a40c3b68511fb408ba75017fac6ee2ac8e65b6225b9c81245ccbd7d52ad387", 0x7f777f5f}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000005c0)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000440)={0x0, 0x1ff, 0x2}, 0xc) 03:35:24 executing program 5: syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f00000009c0)={0x15, 0x110, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff, 0x3}}}, 0x118) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(r1, 0x0, 0x0, &(0x7f00000003c0)="3b58a920bf133167868ac62068fc4e462d4a07411fd71b0caed0cd834ee0dda2d8c7f84350d0f0417e40a74997367f288a17271e00d8d4b8dda68c21108edb69527a3c370d4e0f54ad77", 0x4a) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x0, 0x3ef, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) flock(r1, 0x8) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000640)={{0x8f, @multicast2, 0x4e21, 0x3, 'lblc\x00', 0x34, 0x4, 0x24}, {@multicast2, 0x4e21, 0x10000, 0x0, 0xd5, 0x2}}, 0x44) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000080)={0x15, 0xf, 0xfffffffffffffffe, "01a40c3b68511fb408ba75017fac6ee2ac8e65b6225b9c81245ccbd7d52ad387", 0x7f777f5f}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000005c0)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000440)={0x0, 0x1ff, 0x2}, 0xc) 03:35:24 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40, 0x0) ioctl$VT_WAITACTIVE(r0, 0x5607) 03:35:24 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0xff) io_setup(0x100000001, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000356ff0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0}]) 03:35:24 executing program 0: mknod$loop(0x0, 0x2000, 0x1) timer_create(0x0, 0x0, 0x0) timer_gettime(0x0, &(0x7f0000000280)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') r1 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) r2 = creat(&(0x7f0000000440)='./bus\x00', 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'veth1\x00'}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0x2, 0x10000}, 0x20) fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x2}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000480)=0xc) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff, 0x3}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) clock_getres(0x1, &(0x7f00000001c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000100)={0x1}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x8001) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x833, r5, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x10, r4, 0x4b) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f00000002c0)={0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000005c0)={0x38, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="03630840a41696e6c0ddc6966a277e0a7575e236f7dd2373b34a52ff74aed3cbddec731610cb86df645d0bc66692cff2", @ANYRES64=r7], 0x0, 0x0, 0x0}) sendfile(r0, r6, &(0x7f00000000c0)=0x202, 0xdd) 03:35:25 executing program 5: r0 = socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(r0, 0x10d, 0xa, &(0x7f0000000080), 0x4) 03:35:25 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x400, 0x80) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 03:35:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r1, &(0x7f0000005000)={&(0x7f0000000040)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@nested={0x0, 0x0, [@typed={0x0, 0x0, @fd}]}]}, 0x24c}}, 0x0) recvmmsg(r1, &(0x7f0000006780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:35:25 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 03:35:25 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:25 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x40000020) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='\x00\x00\x00\x00\x00', 0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x400, 0x7167, 0x9, 0x87f, 0x7ffffffffffffff9, 0xda73, 0x101, 0x9}, 0xf) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vfio/vfio\x00', 0x41, 0x0) r1 = accept(r0, &(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000480)=0x80) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e21, 0x1, @ipv4={[], [], @local}, 0x4b60}}}, &(0x7f0000000180)=0x84) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x101000, 0x0) ioctl$CAPI_GET_PROFILE(r3, 0xc0404309, &(0x7f00000003c0)=0x9) prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='\x00') setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f00000001c0)=r2, 0x4) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:25 executing program 5: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x8100, 0xffffca88}}}}}, 0x0) 03:35:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open$dir(0x0, 0x81, 0x0) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r3 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl$int_in(r3, 0x5452, 0x0) pipe2(0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000180)=':(,\xc2\x00') ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 03:35:25 executing program 0: mknod$loop(0x0, 0x2000, 0x1) timer_create(0x0, 0x0, 0x0) timer_gettime(0x0, &(0x7f0000000280)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') r1 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) r2 = creat(&(0x7f0000000440)='./bus\x00', 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'veth1\x00'}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0x2, 0x10000}, 0x20) fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x2}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000480)=0xc) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff, 0x3}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) clock_getres(0x1, &(0x7f00000001c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000100)={0x1}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x8001) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x833, r5, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x10, r4, 0x4b) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f00000002c0)={0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000005c0)={0x38, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="03630840a41696e6c0ddc6966a277e0a7575e236f7dd2373b34a52ff74aed3cbddec731610cb86df645d0bc66692cff2", @ANYRES64=r7], 0x0, 0x0, 0x0}) sendfile(r0, r6, &(0x7f00000000c0)=0x202, 0xdd) 03:35:25 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:25 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffffff}) accept$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f00000000c0)=0x10) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:25 executing program 0: mknod$loop(0x0, 0x2000, 0x1) timer_create(0x0, 0x0, 0x0) timer_gettime(0x0, &(0x7f0000000280)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') r1 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) r2 = creat(&(0x7f0000000440)='./bus\x00', 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'veth1\x00'}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0x2, 0x10000}, 0x20) fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x2}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000480)=0xc) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff, 0x3}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) clock_getres(0x1, &(0x7f00000001c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000100)={0x1}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x8001) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x833, r5, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x10, r4, 0x4b) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f00000002c0)={0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000005c0)={0x38, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="03630840a41696e6c0ddc6966a277e0a7575e236f7dd2373b34a52ff74aed3cbddec731610cb86df645d0bc66692cff2", @ANYRES64=r7], 0x0, 0x0, 0x0}) sendfile(r0, r6, &(0x7f00000000c0)=0x202, 0xdd) 03:35:26 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:26 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x80) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'L-', 0x400}, 0x28, 0x1) 03:35:26 executing program 0: mknod$loop(0x0, 0x2000, 0x1) timer_create(0x0, 0x0, 0x0) timer_gettime(0x0, &(0x7f0000000280)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') r1 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) r2 = creat(&(0x7f0000000440)='./bus\x00', 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'veth1\x00'}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0x2, 0x10000}, 0x20) fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x2}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000480)=0xc) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff, 0x3}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) clock_getres(0x1, &(0x7f00000001c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000100)={0x1}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x8001) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x833, r5, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x10, r4, 0x4b) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f00000002c0)={0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000005c0)={0x38, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="03630840a41696e6c0ddc6966a277e0a7575e236f7dd2373b34a52ff74aed3cbddec731610cb86df645d0bc66692cff2", @ANYRES64=r7], 0x0, 0x0, 0x0}) sendfile(r0, r6, &(0x7f00000000c0)=0x202, 0xdd) [ 1105.351463][ C0] net_ratelimit: 16 callbacks suppressed [ 1105.351476][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1105.363263][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1105.369184][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1105.375024][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1105.433514][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1105.439406][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1105.511328][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1105.517178][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1106.151365][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1106.157250][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:35:28 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 03:35:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:28 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x82fb, 0x1}) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open$dir(0x0, 0x81, 0x0) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r3 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl$int_in(r3, 0x5452, 0x0) pipe2(0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000180)=':(,\xc2\x00') ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 03:35:28 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:28 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000180)=0xffffffffffffffff, 0x4) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000001c0)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept(r1, 0x0, &(0x7f0000000280)) open(&(0x7f0000000240)='./file0\x00', 0x0, 0x18) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000100)=0xe8) mount$9p_virtio(&(0x7f0000000000)='\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x20000, &(0x7f0000000500)={'trans=virtio,', {[{@fscache='fscache'}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@fsname={'fsname'}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'security.SMACK64MMAP\x00'}}, {@permit_directio='permit_directio'}, {@subj_role={'subj_role', 0x3d, '\xd9\xc9\n[mime_type!],\'trusted)bdev{wlan1'}}, {@dont_appraise='dont_appraise'}, {@hash='hash'}]}}) 03:35:28 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:29 executing program 3: r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0x6e, 0x800) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000240)='./file1/../file0\x00', 0x1f9, 0x2) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:29 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 03:35:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open$dir(0x0, 0x81, 0x0) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r3 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl$int_in(r3, 0x5452, 0x0) pipe2(0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000180)=':(,\xc2\x00') ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 03:35:29 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x4) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:29 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:29 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x201, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x20000000) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = open$dir(0x0, 0x81, 0x0) futimesat(r2, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}}) r3 = accept4(r0, 0x0, &(0x7f0000000000), 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{&(0x7f0000001b00)=@l2, 0x80, &(0x7f0000001d00), 0x0, &(0x7f0000001d40)}}, {{&(0x7f0000002300)=@nl, 0x80, &(0x7f0000003740), 0x0, &(0x7f00000037c0)}}], 0x4000000000001eb, 0x0) ioctl$int_in(r3, 0x5452, 0x0) pipe2(0x0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000180)=':(,\xc2\x00') ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) 03:35:29 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:29 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x10000000000002) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:29 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:30 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) ioperm(0x0, 0x5, 0x1850) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='pstore\x00', 0x1000000000, 0x0) 03:35:30 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:30 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x802, 0x0) ioctl(r0, 0xffffffffcc190f54, &(0x7f00000000c0)="5280596d5777597ecc3f79235d08a1df5aba9e3b2adde47cbe45fd4e06d6ab2c63fd9a2e9f5a4b37b207b8da72c9ca035000c686810bdb671a56500871dc4dbeb78bc6") mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000004c40)='/dev/dsp\x00', 0x200, 0x0) sendto(r1, &(0x7f0000000000)="3ed573fbdf947e", 0x7, 0x24000000, &(0x7f0000000180)=@generic={0x2, "7880f5ffb8e256a1a30f81d396344461267cc2f16a6afc893b20ced1da01586c6f26bcf713520dac55eefff75f772af48b3b550f2ae5218b638ca1fa055ad24ed635e4a09114a2bde687da6e1ad784570ecd56d08971b4c525d9937e4e0a0afac350f84148eec11e45a925c6eaaefebbdcc721126d9460bccb94196c23c6"}, 0x80) setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000004c80)=0xfffffffffffff000, 0x4) inotify_add_watch(r1, &(0x7f0000000240)='./file1\x00', 0x0) [ 1110.478841][ C1] net_ratelimit: 24 callbacks suppressed [ 1110.478850][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1110.490473][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:35:32 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 03:35:32 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:32 executing program 3: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000004c0)='security.SMACK64EXEC\x00', 0x0, 0x0, 0x1) 03:35:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:32 executing program 4: mknod$loop(0x0, 0x2000, 0x1) timer_create(0x0, 0x0, 0x0) timer_gettime(0x0, &(0x7f0000000280)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') r1 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) r2 = creat(&(0x7f0000000440)='./bus\x00', 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'veth1\x00'}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0x2, 0x10000}, 0x20) fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x2}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000480)=0xc) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff, 0x3}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) clock_getres(0x1, &(0x7f00000001c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000100)={0x1}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x8001) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x833, r5, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x10, r4, 0x4b) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f00000002c0)={0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000005c0)={0x38, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="03630840a41696e6c0ddc6966a277e0a7575e236f7dd2373b34a52ff74aed3cbddec731610cb86df645d0bc66692cff2", @ANYRES64=r7], 0x0, 0x0, 0x0}) sendfile(r0, r6, &(0x7f00000000c0)=0x202, 0xdd) 03:35:32 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:32 executing program 4: mknod$loop(0x0, 0x2000, 0x1) timer_create(0x0, 0x0, 0x0) timer_gettime(0x0, &(0x7f0000000280)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') r1 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) r2 = creat(&(0x7f0000000440)='./bus\x00', 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'veth1\x00'}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0x2, 0x10000}, 0x20) fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x2}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000480)=0xc) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff, 0x3}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) clock_getres(0x1, &(0x7f00000001c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000100)={0x1}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x8001) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x833, r5, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x10, r4, 0x4b) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f00000002c0)={0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000005c0)={0x38, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="03630840a41696e6c0ddc6966a277e0a7575e236f7dd2373b34a52ff74aed3cbddec731610cb86df645d0bc66692cff2", @ANYRES64=r7], 0x0, 0x0, 0x0}) sendfile(r0, r6, &(0x7f00000000c0)=0x202, 0xdd) 03:35:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x90) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:32 executing program 4: mknod$loop(0x0, 0x2000, 0x1) timer_create(0x0, 0x0, 0x0) timer_gettime(0x0, &(0x7f0000000280)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xed}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000240)='./bus/file0\x00') r1 = socket$inet6(0xa, 0x800, 0xffffffff) ptrace$pokeuser(0x6, 0x0, 0xa, 0x1000) r2 = creat(&(0x7f0000000440)='./bus\x00', 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000280)={'veth1\x00'}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0x9) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r4 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x100800, 0x0, 0xff, 0x1, 0x1, 0x2, 0x10000}, 0x20) fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x2}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000400), &(0x7f0000000480)=0xc) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@local, 0x10000, 0x0, 0xff, 0x3}, 0x20) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000004c0)) clock_getres(0x1, &(0x7f00000001c0)) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x1, 0x3}, 0x20) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000100)={0x1}) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x8001) r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r6 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4, 0x833, r5, 0x0) mmap$binder(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x10, r4, 0x4b) ioctl$BINDER_GET_NODE_DEBUG_INFO(r4, 0xc018620b, &(0x7f00000002c0)={0x0}) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000005c0)={0x38, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="03630840a41696e6c0ddc6966a277e0a7575e236f7dd2373b34a52ff74aed3cbddec731610cb86df645d0bc66692cff2", @ANYRES64=r7], 0x0, 0x0, 0x0}) sendfile(r0, r6, &(0x7f00000000c0)=0x202, 0xdd) [ 1111.591346][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1111.599406][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1111.610159][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1111.619055][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1111.678279][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1111.684157][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1111.748292][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1111.754168][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:35:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f0000000380)=0x80, 0x4) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="480000001400190d09004beafd0d8c562c84ed7a80ffe0060f000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00000000000000", 0x48}], 0x1) 03:35:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = socket(0x2, 0x3, 0x3) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000540)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}}, 0xfd79}}, 0x0) 03:35:33 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x200, 0x0) write$P9_RLCREATE(r0, &(0x7f0000000100)={0x18, 0xf, 0x1, {{0x8, 0x4}, 0x8}}, 0x18) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) lsetxattr$security_smack_transmute(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x3) userfaultfd(0x80000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x80, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0x40a85323, &(0x7f0000000300)={{0x5, 0x3ff}, 'port0\x00', 0xa4, 0x20, 0x800, 0x3, 0x8, 0x7, 0xff, 0x0, 0x1, 0xa64}) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)={0x3210, 0x1}) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x2000, 0x1) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) 03:35:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000040000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000100)={0x2, 0x0, 0xa1, 0x74004c, 0xf7ffffff7ff0bdbe}) 03:35:33 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = socket$tipc(0x1e, 0x7, 0x0) vmsplice(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="150fc3ecc02851573c59da1029c85f5d4fdc09082ebbbd0fd710f7d73773bd31e2a106181e2fbcf6986cdc5102804011f841ef74431e553b104cb1f32e2777b7ee6c1129c32e7b9c3b7e6da59e92391d8112d500cfb43741d25c98bbd095a66acc56bc6cee9c6f74b2ee20c6605650afea442f11bcc2c54f90b088dd0cb63360b6f4", 0x82}, {&(0x7f00000003c0)="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", 0xfe}], 0x2, 0x1) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) [ 1112.114246][ T1977] usb usb5: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. 03:35:33 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) getsockname$unix(r0, &(0x7f00000000c0), &(0x7f0000000040)=0x6e) [ 1112.175192][ T1977] vhci_hcd: default hub control req: 0000 v0000 i0008 l0 03:35:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffffffffffe5a) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1000000000000002, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f00000000c0)={0x0, 0x1, 0xfffffffffffffffa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x19000000]}) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x80, 0x2000) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000140)=ANY=[], 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) r3 = open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) ioctl$EVIOCSABS0(r3, 0x401845c0, &(0x7f00000001c0)={0x90, 0x1, 0x5, 0x532, 0x70, 0xffffffffffffbab9}) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setsig(r2, 0xa, 0x19) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r3, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x100) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000540)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$sock_SIOCGPGRP(r4, 0x8904, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x40000000000009) r5 = syz_open_dev$sndseq(&(0x7f0000000580)='/dev/snd/seq\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000300)=0x6, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r7 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r7, 0x89e0, &(0x7f0000000100)={r0, r6}) 03:35:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = socket(0x2, 0x3, 0x3) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000540)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}}, 0xfd79}}, 0x0) 03:35:33 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8000000000a, 0x1) ioctl$FS_IOC_FSGETXATTR(r0, 0x8010550e, &(0x7f0000000080)) 03:35:33 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='cgroup2\x00G\x9b\x10\xf3\xeae\xe1-\x94]\xf8\xb8\xc8U\b\xd2\v&\xfc\x0e\xf7\xb0\x9e\xa0@\xef\xd9\x8aH\xc1\xd7\x8b]\xa8-eK\xf3\xac \x984F\x19\xc3 2\x7f>z@5\b\xda\x9f\xb0\x17c\xd3Ri\xb1X\xb1R\xf8\xf8\r\xbb\x1d\xeb\xb5\xd7r1L\xa7#m\x8d\xda\x96\'\xe1\x1cAK\xcf\xde\xe4\xa7\xdc+\xd0\xd5\xe8\x1f\xd2`\xf6\x0f\x0ff\x02\xb6\xd6,l\x8ff\x80\xf8\xaaP\xe2\xd4', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000040000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000100)={0x2, 0x0, 0xa1, 0x74004c, 0xf7ffffff7ff0bdbe}) [ 1112.567956][ T1999] usb usb5: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 1112.579040][ T1999] vhci_hcd: default hub control req: 0000 v0000 i0008 l0 03:35:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000040000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000100)={0x2, 0x0, 0xa1, 0x74004c, 0xf7ffffff7ff0bdbe}) 03:35:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000180), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000040), 0x4) 03:35:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = socket(0x2, 0x3, 0x3) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000540)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}}, 0xfd79}}, 0x0) 03:35:33 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) chmod(&(0x7f0000000000)='./file0\x00', 0x0) 03:35:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x805, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23}, 0x10) listen(r1, 0x3) sendto$inet(r1, &(0x7f0000000200)="f1", 0x1, 0x0, 0x0, 0x0) [ 1112.806459][ T2011] usb usb5: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 1112.833730][ T2011] vhci_hcd: default hub control req: 0000 v0000 i0008 l0 03:35:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = socket(0x2, 0x3, 0x3) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @loopback}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000005000)={&(0x7f0000000540)={0x10, 0xf0ffffff00000f00}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x48, 0x14, 0x207, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}}, 0xfd79}}, 0x0) 03:35:34 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) r2 = syz_open_dev$sndpcmp(0x0, 0x0, 0x0) dup2(r2, r1) 03:35:34 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x2000, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffff9c, 0x10, &(0x7f0000000040)={&(0x7f0000000500)=""/4096, 0x1000, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000100)={&(0x7f0000000300)=""/145, 0x91, r1}}, 0x10) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) accept4(r0, &(0x7f00000003c0)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f0000000280)=0x80, 0x800) socket$alg(0x26, 0x5, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x400000000, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000480)={r0, 0x10, &(0x7f0000000440)={&(0x7f0000001500)=""/129, 0x81, r2}}, 0x10) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000001c0), &(0x7f0000000240)=0x8) 03:35:34 executing program 1: dup(0xffffffffffffffff) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) clone(0x1000000000011, &(0x7f0000000180), 0x0, 0x0, 0x0) waitid(0x0, 0x0, 0x0, 0x401000004, 0x0) waitid(0x0, 0x0, 0x0, 0x100000b, 0x0) 03:35:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000040000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x802c550a, &(0x7f0000000100)={0x2, 0x0, 0xa1, 0x74004c, 0xf7ffffff7ff0bdbe}) 03:35:34 executing program 2: setrlimit(0x2, &(0x7f0000000780)={0x2000000, 0x20080000000}) prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) 03:35:34 executing program 0: socketpair$unix(0x1, 0x200000002, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'eql\x00', 0x2001}) dup2(r0, r1) 03:35:34 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) dup3(r0, r1, 0x0) geteuid() [ 1113.354892][ T2032] usb usb5: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 1113.366472][ T2032] vhci_hcd: default hub control req: 0000 v0000 i0008 l0 03:35:34 executing program 2: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000001140)='/dev/ion\x00', 0x802, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x80033d, 0x20000000209, 0x0, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000000)={0x9cf0000008, 0x9}) syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x802, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x77, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) socket$inet(0x10, 0x100000008000f, 0x0) 03:35:34 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x4) 03:35:34 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x5, &(0x7f0000caaffb), &(0x7f0000000000)=0xc) 03:35:34 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) dup3(r0, r1, 0x0) geteuid() 03:35:34 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0xfffffffffffffd76}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020100030e00000003000000000000000500061f000000000a0000000000000400000000000000000000002100004000000100000000000002000100010000000800000200fd000005000500000000000a004872bbb6896209000000000000009aec3f3f7710aa000000ff1700400000"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x8000000000000e3, 0x0) 03:35:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) connect$llc(r0, &(0x7f00000000c0)={0x1a, 0x33f, 0x7fff, 0x0, 0xfff, 0x4273, @local}, 0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:34 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x21, &(0x7f0000013e95), 0x4) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x64, 0x0, 0xff0f) close(r2) close(r1) 03:35:34 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) dup3(r0, r1, 0x0) geteuid() 03:35:34 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000004a80)=[{{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000180)=""/217, 0xd9}, {&(0x7f0000000280)=""/218, 0xda}, {&(0x7f0000000380)=""/222, 0xde}, {&(0x7f0000000480)=""/21, 0x15}, {&(0x7f00000004c0)=""/66, 0x42}, {&(0x7f0000000540)=""/240, 0xf0}], 0x6}}], 0x1, 0x0, 0x0) 03:35:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:35 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) dup3(r0, r1, 0x0) geteuid() 03:35:35 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x100, 0x2000) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32=r3, @ANYRES64=r2, @ANYRESOCT=r0], 0x0) getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r2, 0x0, 0x7, &(0x7f0000000300)='$\'self\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(r3, 0x8903, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='net/dev\x00') mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) fgetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000340)=""/144, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00', r3}, 0x10) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$FUSE_GETXATTR(r4, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, &(0x7f0000000100), 0x0) getegid() r6 = dup2(r0, r5) socket$nl_xfrm(0x10, 0x3, 0x6) r7 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x25, &(0x7f0000000100)=0x5aa, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xc2}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r6, 0x84, 0x17, &(0x7f0000000580)=ANY=[@ANYBLOB], 0x1) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000140)={r8, 0x2, 0x100000000, 0x1000}, &(0x7f0000000180)=0x10) syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0xf3be, 0x0) [ 1114.407664][ T2041] device team0 entered promiscuous mode [ 1114.416161][ T2041] device team_slave_0 entered promiscuous mode [ 1114.433320][ T2041] device team_slave_1 entered promiscuous mode [ 1114.455646][ T2041] 8021q: adding VLAN 0 to HW filter on device team0 [ 1114.673663][ T2080] device team0 left promiscuous mode [ 1114.679318][ T2080] device team_slave_0 left promiscuous mode [ 1114.685808][ T2080] device team_slave_1 left promiscuous mode [ 1114.817353][ T2081] device team0 entered promiscuous mode [ 1114.823664][ T2081] device team_slave_0 entered promiscuous mode [ 1114.846812][ T2081] device team_slave_1 entered promiscuous mode [ 1114.854332][ T2081] 8021q: adding VLAN 0 to HW filter on device team0 03:35:36 executing program 2: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000001140)='/dev/ion\x00', 0x802, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x80033d, 0x20000000209, 0x0, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000000)={0x9cf0000008, 0x9}) syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x802, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x77, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) socket$inet(0x10, 0x100000008000f, 0x0) 03:35:36 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x100, 0x2000) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32=r3, @ANYRES64=r2, @ANYRESOCT=r0], 0x0) getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r2, 0x0, 0x7, &(0x7f0000000300)='$\'self\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(r3, 0x8903, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='net/dev\x00') mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) fgetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000340)=""/144, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00', r3}, 0x10) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$FUSE_GETXATTR(r4, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, &(0x7f0000000100), 0x0) getegid() r6 = dup2(r0, r5) socket$nl_xfrm(0x10, 0x3, 0x6) r7 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x25, &(0x7f0000000100)=0x5aa, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xc2}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r6, 0x84, 0x17, &(0x7f0000000580)=ANY=[@ANYBLOB], 0x1) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000140)={r8, 0x2, 0x100000000, 0x1000}, &(0x7f0000000180)=0x10) syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0xf3be, 0x0) 03:35:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000005d40)={0x0, 0x0, &(0x7f0000005d00)={&(0x7f0000000880)=@newlink={0x5c, 0x10, 0xd07, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @ip6gre={{0x10, 0x1, 'ip6gre\x00'}, {0x18, 0x2, [@IFLA_GRE_LOCAL={0x14, 0x4, @mcast1={0xff, 0x1, [0xc, 0xf0ffff]}}]}}}, @IFLA_BROADCAST={0xc, 0x2, @local}, @IFLA_MASTER={0x8, 0xa, 0x33e0}]}, 0x5c}}, 0x0) 03:35:36 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x6001, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f0000000040)) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000100)=0x80000000, 0x4) syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x6, 0x4000) 03:35:36 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x4001, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000004ac0)=[{{&(0x7f0000004480)=@nfc={0x27, 0x0, 0x0, 0x7}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20000040}, 0x1}], 0x1, 0x4000040) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000002c0)={0xd, @raw_data="bccd1915535abcf9d70f28448dd98aa5f701d8ecd0e421d0bb9a25e92edaa73ab5cabd7fb4b64eb19e5312544a49bcb948fbf946ee33ff8721404ed85c1d03bf5822b341be99fa2f9b6b40c3dad5e180ad75695b7e17002c5d4bbceb73a166fb694d3430a0f3e02d0ac6244e7e596aff468c29cd8ca4c38a79ca606b0fa984a8454252ef1d0eef93aadabad135c4d448679de2d49f6b817de75491d39c03c5c798559152b892336c48b141404d522e994b68a4a5be96dbe80fe37eb65c11a8ce40fe83017a814be7"}) mlockall(0xfc) unshare(0x40000000) 03:35:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{0x0, 0x0, 0x0}, 0x7}], 0x1, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0x33, "d915bfdd6fab3c73dfdf9168e2191f2d736a529bfd8107a2a6379353a6606e44afcaf31f1adde1ed9be140df843687abd4448d"}, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x200000) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80), 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f0000001380)={0x77359400}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, 0x0) [ 1115.113935][ T2100] IPVS: ftp: loaded support on port[0] = 21 03:35:36 executing program 5: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000001140)='/dev/ion\x00', 0x802, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x80033d, 0x20000000209, 0x0, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000000)={0x9cf0000008, 0x9}) syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x802, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x77, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) socket$inet(0x10, 0x100000008000f, 0x0) 03:35:36 executing program 2: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000001140)='/dev/ion\x00', 0x802, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x80033d, 0x20000000209, 0x0, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000000)={0x9cf0000008, 0x9}) syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x802, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x77, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) socket$inet(0x10, 0x100000008000f, 0x0) 03:35:36 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$sock_int(r0, 0x1, 0x28, &(0x7f0000000000)=0x5, 0x16d) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x4000, 0x0) ioctl$SIOCX25GSUBSCRIP(r2, 0x89e0, &(0x7f0000000300)={'eql\x00', 0x837, 0x97d2}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{0x0, 0x0, 0x0}, 0x7}], 0x1, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0x33, "d915bfdd6fab3c73dfdf9168e2191f2d736a529bfd8107a2a6379353a6606e44afcaf31f1adde1ed9be140df843687abd4448d"}, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x200000) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80), 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f0000001380)={0x77359400}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, 0x0) [ 1115.565043][ T2113] device team0 left promiscuous mode [ 1115.586850][ T2113] device team_slave_0 left promiscuous mode [ 1115.613288][ T2113] device team_slave_1 left promiscuous mode 03:35:36 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{0x0, 0x0, 0x0}, 0x7}], 0x1, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0x33, "d915bfdd6fab3c73dfdf9168e2191f2d736a529bfd8107a2a6379353a6606e44afcaf31f1adde1ed9be140df843687abd4448d"}, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x200000) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80), 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f0000001380)={0x77359400}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, 0x0) [ 1115.746262][ C0] net_ratelimit: 16 callbacks suppressed [ 1115.746272][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1115.757889][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1115.763736][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1115.769597][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:35:37 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f00000038c0)=[{{0x0, 0x0, 0x0}, 0x7}], 0x1, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0x33, "d915bfdd6fab3c73dfdf9168e2191f2d736a529bfd8107a2a6379353a6606e44afcaf31f1adde1ed9be140df843687abd4448d"}, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x200000) bind$alg(r1, &(0x7f00000004c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha1\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003e80), 0x0, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1, 0x0, &(0x7f0000001380)={0x77359400}) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, 0x0, 0x0) [ 1115.827952][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1115.834313][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:35:37 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x100, 0x2000) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32=r3, @ANYRES64=r2, @ANYRESOCT=r0], 0x0) getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r2, 0x0, 0x7, &(0x7f0000000300)='$\'self\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(r3, 0x8903, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='net/dev\x00') mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) fgetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000340)=""/144, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00', r3}, 0x10) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$FUSE_GETXATTR(r4, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, &(0x7f0000000100), 0x0) getegid() r6 = dup2(r0, r5) socket$nl_xfrm(0x10, 0x3, 0x6) r7 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x25, &(0x7f0000000100)=0x5aa, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xc2}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r6, 0x84, 0x17, &(0x7f0000000580)=ANY=[@ANYBLOB], 0x1) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000140)={r8, 0x2, 0x100000000, 0x1000}, &(0x7f0000000180)=0x10) syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0xf3be, 0x0) [ 1115.885779][ T2100] IPVS: ftp: loaded support on port[0] = 21 [ 1115.906128][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1115.912050][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:35:37 executing program 1: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000001140)='/dev/ion\x00', 0x802, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x80033d, 0x20000000209, 0x0, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000000)={0x9cf0000008, 0x9}) syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x802, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x77, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) socket$inet(0x10, 0x100000008000f, 0x0) [ 1116.256211][ T2110] device team0 entered promiscuous mode [ 1116.261909][ T2110] device team_slave_0 entered promiscuous mode [ 1116.304297][ T2110] device team_slave_1 entered promiscuous mode [ 1116.327825][ T2110] 8021q: adding VLAN 0 to HW filter on device team0 [ 1116.341287][ T2111] device team0 entered promiscuous mode [ 1116.350840][ T2111] device team_slave_0 entered promiscuous mode [ 1116.370421][ T2111] device team_slave_1 entered promiscuous mode [ 1116.392490][ T2111] 8021q: adding VLAN 0 to HW filter on device team0 03:35:37 executing program 5: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000001140)='/dev/ion\x00', 0x802, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x80033d, 0x20000000209, 0x0, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000000)={0x9cf0000008, 0x9}) syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x802, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x77, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) socket$inet(0x10, 0x100000008000f, 0x0) [ 1116.459312][ T2134] device team0 entered promiscuous mode [ 1116.535362][ T2134] device team_slave_0 entered promiscuous mode [ 1116.577425][ T2134] device team_slave_1 entered promiscuous mode [ 1116.588046][ T2134] 8021q: adding VLAN 0 to HW filter on device team0 [ 1116.597797][ T2138] device team0 left promiscuous mode [ 1116.611380][ T2138] device team_slave_0 left promiscuous mode [ 1116.622901][ T2138] device team_slave_1 left promiscuous mode [ 1116.629104][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1116.629168][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1116.817217][ T2137] device team0 entered promiscuous mode [ 1116.822833][ T2137] device team_slave_0 entered promiscuous mode [ 1116.867680][ T2137] device team_slave_1 entered promiscuous mode [ 1116.876713][ T2137] 8021q: adding VLAN 0 to HW filter on device team0 03:35:39 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x4001, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000004ac0)=[{{&(0x7f0000004480)=@nfc={0x27, 0x0, 0x0, 0x7}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20000040}, 0x1}], 0x1, 0x4000040) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000002c0)={0xd, @raw_data="bccd1915535abcf9d70f28448dd98aa5f701d8ecd0e421d0bb9a25e92edaa73ab5cabd7fb4b64eb19e5312544a49bcb948fbf946ee33ff8721404ed85c1d03bf5822b341be99fa2f9b6b40c3dad5e180ad75695b7e17002c5d4bbceb73a166fb694d3430a0f3e02d0ac6244e7e596aff468c29cd8ca4c38a79ca606b0fa984a8454252ef1d0eef93aadabad135c4d448679de2d49f6b817de75491d39c03c5c798559152b892336c48b141404d522e994b68a4a5be96dbe80fe37eb65c11a8ce40fe83017a814be7"}) mlockall(0xfc) unshare(0x40000000) 03:35:39 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x3, &(0x7f0000000180)=[{&(0x7f0000000300)="2614517a2de41ddc3f9e3517b5bdab2cfc7fcbda796433b9659dcca55c614bc343cf9d99871cd539f15d2132c853719d30744813fc79fed27822b79cbcbcbe493540192da9da46819a63b46dcace26d0a42cd4bbb816faff581d6d13027383f9f016754dca1ed98c47858d6909bc68d81554a70c1b6d2b25649e0f15af51456fa8f87229b0f9518932b606fc5ca8c96df282af5eb89ff28a5df6496f020fa14f215470743e6d2eacff4ae455b41d97c6be93ea627313a9b75e4326450c103306d87bb9557fca23b5d775", 0xca, 0xcf9}, {&(0x7f0000000400)="749eaf8fd9117d0861e54c505457350e60ae52e38ec622e9d8bfd2367f5abfaf36be21fea9ab3130d66b17c8d63942a4a3250771e1f1cddd94cfd7a1c24552580ebe74e599c61de736c87ce561d4bbdbea56c9ca00cf13047c44ce250774bb7b717cc225707e739b61e182e62c1f2b248c4a4b0ddb5ae04e2b88bbb1a701c286af064786921e24162f3a608a42d34aea67ed00e2bc77e99fde5e95908110053cafd68a50f00a4389760fd55cb76c35309deb1bb0752f85644e78", 0xba, 0x5}, {&(0x7f00000000c0)="108336f9324c530a6d11055378bccadd0c0206f5213bd563e28566904730a4e93df3c4f194905a254496db7ae0497660041a4f0eab9d6eb86f922f6b0a7a1406c80d00318c10f074698720740771cb8c66c860bf84f25a2a728c608bbfbb038cf54ac9757ac9e8cf4c856d1326b0e7a2", 0x70, 0x3}], 0x20000, &(0x7f0000000500)={[], [{@obj_role={'obj_role'}}, {@dont_hash='dont_hash'}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@dont_measure='dont_measure'}, {@euid_lt={'euid<', r0}}]}) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:39 executing program 1: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000001140)='/dev/ion\x00', 0x802, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x80033d, 0x20000000209, 0x0, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000000)={0x9cf0000008, 0x9}) syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x802, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x77, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) socket$inet(0x10, 0x100000008000f, 0x0) 03:35:39 executing program 2: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000001140)='/dev/ion\x00', 0x802, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x80033d, 0x20000000209, 0x0, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000000)={0x9cf0000008, 0x9}) syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x802, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x77, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) socket$inet(0x10, 0x100000008000f, 0x0) 03:35:39 executing program 5: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000001140)='/dev/ion\x00', 0x802, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x80033d, 0x20000000209, 0x0, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000000)={0x9cf0000008, 0x9}) syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x802, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x77, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) socket$inet(0x10, 0x100000008000f, 0x0) 03:35:39 executing program 1: syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VT_RESIZE(0xffffffffffffffff, 0x5609, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000001140)='/dev/ion\x00', 0x802, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0x80033d, 0x20000000209, 0x0, 0xffffffffffffffff}) r2 = dup2(r0, r1) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000000)={0x9cf0000008, 0x9}) syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x11, 0x802, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x77, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) socket$inet(0x10, 0x100000008000f, 0x0) 03:35:39 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="ad565d562f90c20000000000000000000000000000000000", 0x18) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) [ 1118.502842][ T2154] device team0 left promiscuous mode [ 1118.541397][ T2154] device team_slave_0 left promiscuous mode [ 1118.549071][ T2154] device team_slave_1 left promiscuous mode 03:35:39 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x800, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x2) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x4000, 0x0) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f00000000c0)={0x2, 0x0, [{}, {}]}) 03:35:39 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4147, 0x0) [ 1118.721684][ T2160] device team0 left promiscuous mode [ 1118.732013][ T2160] device team_slave_0 left promiscuous mode [ 1118.755007][ T2160] device team_slave_1 left promiscuous mode [ 1118.939096][ T2155] device team0 entered promiscuous mode [ 1118.971926][ T2155] device team_slave_0 entered promiscuous mode [ 1119.032827][ T2155] device team_slave_1 entered promiscuous mode [ 1119.163740][ T2155] 8021q: adding VLAN 0 to HW filter on device team0 [ 1119.189093][ T2150] device team0 left promiscuous mode [ 1119.194591][ T2150] device team_slave_0 left promiscuous mode [ 1119.200670][ T2150] device team_slave_1 left promiscuous mode [ 1119.302379][ T2163] device team0 entered promiscuous mode [ 1119.308157][ T2163] device team_slave_0 entered promiscuous mode [ 1119.323087][ T2163] device team_slave_1 entered promiscuous mode [ 1119.331460][ T2163] 8021q: adding VLAN 0 to HW filter on device team0 [ 1120.783742][ C0] net_ratelimit: 22 callbacks suppressed [ 1120.783749][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1120.795503][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1120.863661][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1120.869529][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:35:42 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x100, 0x2000) r2 = perf_event_open(&(0x7f000001d000)={0x800000000001, 0xb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32=r3, @ANYRES64=r2, @ANYRESOCT=r0], 0x0) getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0x0, r2, 0x0, 0x7, &(0x7f0000000300)='$\'self\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_FIOGETOWN(r3, 0x8903, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='net/dev\x00') mprotect(&(0x7f0000107000/0x3000)=nil, 0x3000, 0x0) fgetxattr(0xffffffffffffffff, 0x0, &(0x7f0000000340)=""/144, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000200)='/exe\x00\x00\x00\x00\x00\x00\x0f\x1c\xe3\x00', r3}, 0x10) r5 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) write$FUSE_GETXATTR(r4, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_PIT2(r5, 0x4040ae77, &(0x7f0000000500)) getsockopt$bt_l2cap_L2CAP_OPTIONS(r4, 0x6, 0x1, &(0x7f0000000100), 0x0) getegid() r6 = dup2(r0, r5) socket$nl_xfrm(0x10, 0x3, 0x6) r7 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x25, &(0x7f0000000100)=0x5aa, 0x4) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r4, 0x84, 0x71, &(0x7f0000000040)={0x0, 0xc2}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r6, 0x84, 0x17, &(0x7f0000000580)=ANY=[@ANYBLOB], 0x1) getsockopt$inet_sctp6_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000140)={r8, 0x2, 0x100000000, 0x1000}, &(0x7f0000000180)=0x10) syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0xf3be, 0x0) 03:35:42 executing program 3: syz_mount_image$minix(&(0x7f0000000000)='minix\x00', &(0x7f0000000040)='./file0\x00', 0xffffffff, 0x6, &(0x7f0000001500)=[{&(0x7f00000000c0)="80891c46002922d9601fa98c5985107bad123d0bdde7ad06d0008032a99cbe93d32dcc42200cc24247b5c2feb1b7911d99ae9f1721303db531283374e0d80c5a2463343e48e6db757d0595fbc2c2ca3a497efe9a168e1cab3021ed65e48c297fee1dc14dc0fe", 0x66, 0x101}, {&(0x7f0000000180)="3fb737896d993dd779a323652a6a7ff1255708f3f46acbc1aeb4fc33f971bba14a145acf7d0567134301fd8824fb4bcd0877fe8d9fe4080984e75a65f78b1c30f04ad521d4728cc8e5d05e281f2ab4779a69", 0x52, 0x6}, {&(0x7f0000000240)="487b450b0e73ee697e3ba93ac5257f92979135a7ec8a8f38763de67ea21fce15", 0x20, 0x4}, {&(0x7f0000000300)="1e88a3f4f470b760142718518aafdfb27c4e41b06ca250c1c831c5e9981a1866a635938d998acf4f294d1b9b1a091bab80fa21ad9eec60cdda25fc240c7cf5a99aeeb37cf7cadcbe6943093b7205f93d243bbdc5cf5182bb7f887c139a62e1bbc8d20e02129cde775d85824245d14d12ba458d0874aaecead41865518a51003c9fae74820fc5cc057bcf7cb5a43b918d4b71038b93daaa422af260ed43366c86e64792dd57d7ef3252f6e5a01c36647f93dea4b4f5c19b438d244b74e928169bdbb4156d450f7637748e616f6cbf991d617d5bc5953df9ad3dec412ab5", 0xdd, 0x1f}, {&(0x7f0000000500)="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", 0x1000, 0x4}, {&(0x7f0000000400)="5b9721f31ad7fe76e5fcfa6be5647baed3ec1a4446e8346c42e7b97a10cd64a07c583751e0fb5fa04844fad4857dc0773f482979313d166ba0f4fa645058070e61af7fd5268ee656b3c32703648df24371a4cd6f81998b276f4740739d31e5c2d6da654d5c37129e89a4ac8c2d07b6b9553ef553", 0x74, 0x80000000000000}], 0x0, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) syz_mount_image$minix(&(0x7f00000015c0)='minix\x00', &(0x7f0000001600)='./file0\x00', 0xd183, 0x7, &(0x7f0000002980)=[{&(0x7f0000001640)="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", 0x1000, 0x2}, {&(0x7f0000002640)="184bd581a49f71cbc7b4c2f3d1a08ad9158914ab98d6326b5b587e1b4aa1644eef782b26", 0x24, 0x7ff}, {&(0x7f0000002680)="f61c0c5f861f8d1b1bb022000bcd091e6b315f584bf0ec4e757bf06d9dc6dd1545c9a01e62c462ec1423b4983ed04f8fcc6bec2c9cfe1de6fabc31725aa5d4acfe493e3abcddce07ccb1877f190451d97af9c162", 0x54, 0x101}, {&(0x7f0000002700)="3c4efe953570540ea7f62e363057c735612f3bdb30c881e3a0d2ec4d1527160b8bcf524b972008036f206db45199853a5ad3dcb3462dfdcd1ee96577b90ac69cb3ea73c524b55cb9c7deea80540c7b3fee1923c4fdb556860aedef63b72f27f0f96c06eff3c8c5f34a45321bff52d512eecff4eb87b03a58e3723595d8cde5614974d48f0bfb91e14de8f424e1525c9ea097b3b3ae0085c7dec0c3086608d425071c7c15be3c5751fc000ba8627eebaff5815d2a07e68299", 0xb8, 0x7}, {&(0x7f00000027c0)="6c493ac0f2980644df829cfa18c505f950b43af971da83a2ca9cba303cafdda0b2117fb129221cfa6487cf1137989517007a3ed28ff091fda7338d71b896ef07d641b0ca44d9b61626e9d794d66927c79598ec8f7bc107b09be487b62cda979faf8fd656990e96d290c9c55e723a064e7cbfa359178055db282e155526da67f3b2719dd9d4f5013f48380c3216db4434c1ff10ec34e40816b1f29c61af796072f04134311743fe9095b70f1c3bbcf86f3d5074966842cc5c48a5a028e7a27d8387c1fbba560980eab63411f2413e026bbde6ff43f9a08ee01da460ab480db38c0ad027c1a169ee37a8199637", 0xec, 0x1}, {&(0x7f00000028c0)="99ffdaa6fdf831ed94dba49eecc04f99dc0b2ee24d407a8ac06f233cab9f4aa3fc5317b1521961263b6ce48db9bb4486da834bf00db676349163", 0x3a}, {&(0x7f0000002900)="1295268a963e12087940ee97ce34ef9c4f181c344fa921db97fbd5e0601cfba331020612384c10c7d6c58d72ad31591cdf6a75fed19cd9e073d56ffe1fa3c2853b32d1aeb0c01aa3ac61f3506ca2a256bb12b8f636e107ad5a80f8044a17d3955851da7aa3bda01eacfc7010fea521a43916bda821d39107", 0x78, 0x10000}], 0x20000, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) symlink(&(0x7f0000000280)='./file0\x00', &(0x7f0000000480)='./file0\x00') 03:35:42 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x4001, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000004ac0)=[{{&(0x7f0000004480)=@nfc={0x27, 0x0, 0x0, 0x7}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20000040}, 0x1}], 0x1, 0x4000040) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000002c0)={0xd, @raw_data="bccd1915535abcf9d70f28448dd98aa5f701d8ecd0e421d0bb9a25e92edaa73ab5cabd7fb4b64eb19e5312544a49bcb948fbf946ee33ff8721404ed85c1d03bf5822b341be99fa2f9b6b40c3dad5e180ad75695b7e17002c5d4bbceb73a166fb694d3430a0f3e02d0ac6244e7e596aff468c29cd8ca4c38a79ca606b0fa984a8454252ef1d0eef93aadabad135c4d448679de2d49f6b817de75491d39c03c5c798559152b892336c48b141404d522e994b68a4a5be96dbe80fe37eb65c11a8ce40fe83017a814be7"}) mlockall(0xfc) unshare(0x40000000) 03:35:42 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4147, 0x0) 03:35:42 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) fdatasync(r0) socket$nl_generic(0x10, 0x3, 0x10) socket$can_raw(0x1d, 0x3, 0x1) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={0x0}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000100)=0x8, 0x4) syz_open_dev$audion(0x0, 0xffffffffffffff80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x80001, 0x0) 03:35:42 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) read$alg(0xffffffffffffffff, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) [ 1121.224749][ T2180] IPVS: ftp: loaded support on port[0] = 21 03:35:42 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/packet\x00') recvfrom$unix(r0, &(0x7f00000000c0)=""/105, 0x69, 0x2, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e24}, 0x6e) setxattr$security_smack_entry(&(0x7f0000000240)='./file0\x00', &(0x7f0000000040)='security.SMACK64MMAP\x00', 0x0, 0xffffffffffffffa5, 0x0) 03:35:42 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4147, 0x0) 03:35:42 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000a40)='cgioup2\x00\xd4\x7f\x81lE5aR]c0\x8eV\xe4\x96b\xb0\xc8\x94\xb6\x06\x1f\xf9x9V#\xd0\x84\xec\xaaq\xda.\xf3\xb0fO\xcc\x83\xc2\xc9\xaa\xe3\xfb\xdb\xa4.\xb5\x86W\x9a;q\r\xed\xf7e\xa1\xaf\x85\x00ukZ\xd1\x87\x881r\xc1\xdf\x97u\xf6e\x93\x91\x85\xd9M;;\xcb\xc1\n\x150\xfe7JF\x1eP\xf7b\x1d\xa5\xa6\xdf\xdf \x1b\xa4\xbb3\x18\xfb\xb0\x03~\x8f\x06\xde\x10\xcd\x97\xbf7\x04\x934\xe3\x82\x1e4\x1f=\xd6\xc2\xb6\x89\xd4\xf4pT\\\xeeJ\xb0%\xcdG\xdaw4\xa7\x1dg\x0f\x03M\xf7\xe4\xf8\xc8\'\t\xc6\xdco\xad\x84qR\x8aO\xab\xec\xd8\xeb\x16\x02|]\x97Ib8\xdb\"L\xa7\xc8g\xa2\x86\xb7\xfdz\xde\"\x9c\v\xec\x92%\x94]\x94\xd8p\xf6$\xac\x8cf\x9f\x98\x8d(\xa4\x80\xaf\xe3\x9a\x05\x87B.\xaf\x03v\xcd\xb7\x9fD\xb6\x0f\xd7u7\x11L\xd6\x02Z\xf5\xaa7|\xea\x8e/\xf2v\xed\xf9\xa8\xc5\xbfo=+}\x0e?Q\xc6\xed&\'\xb1\xbdL\x11\t+\xe2\xb9t\xb6\xda\aC\x833@\xa64\xdc\x90K\xbd\x88I\x9e\xf5\xd4^[1\x91J2\xbb\x16\xb6\xec=a\xd47\xf2N\xadYq\xf7D\x11\x95\xec\x95\x04a\xca\x11\xd7\xd2\xcf\xb28\xda1L\x16\xf7\\\x1a\\\'D\xbe\x94\x19\xb9\xf0\x7fq\xcf7\xb9\xe9\xf3\xd6\x14\x1el\xb2.Pr},M\xf1?\v\x84\tL\x94', 0xb21882, 0x0) r0 = open(&(0x7f0000000000)='.\x00', 0x40002, 0x102) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000540)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x138, 0x278, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000500), {[{{@arp={@rand_addr, @empty, 0xff, 0xff, @mac=@dev={[], 0x23}, {[0x0, 0x0, 0x0, 0xff, 0xff, 0xff]}, @mac=@broadcast, {[0xff, 0x0, 0xff, 0x0, 0xff, 0xff]}, 0x55f4, 0x0, 0x6, 0x9, 0x8, 0x4, 'batadv0\x00', 'bpq0\x00', {}, {0xff}}, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xb330, 'syz1\x00', 0x3f}}}, {{@arp={@rand_addr=0x401, @multicast1, 0xff000000, 0xffffff00, @empty, {[0x0, 0x0, 0xff]}, @empty, {[0x0, 0xff, 0xff, 0x0, 0xff, 0xff]}, 0x4, 0xd9e, 0x1, 0x4, 0x6, 0xfffffffffffff746, 'sit0\x00', 'caif0\x00', {0xff}, {0xff}, 0x0, 0x200}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @empty, @multicast2, @multicast1, 0x4, 0x1}}}, {{@arp={@remote, @empty, 0xffffffff, 0xffffffff, @mac=@local, {[0xff, 0xff, 0x0, 0x0, 0xff, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x81, 0x9, 0x33b1, 0x3, 0x1ff, 0x6, 'gretap0\x00', 'nr0\x00', {}, {}, 0x0, 0x40}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4c8) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendfile(r1, r1, &(0x7f0000000140)=0x8800, 0x8800000) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000440)={0x0}, &(0x7f0000000480)=0xc) perf_event_open(&(0x7f00000003c0)={0x5, 0x70, 0x10000, 0x6, 0x4cb, 0x8, 0x0, 0x0, 0x2, 0x1, 0x80000000, 0x39b, 0x8, 0x72fa, 0x5, 0x0, 0x100000000, 0xd0, 0x341, 0x35, 0x4, 0xacfa, 0x8001, 0x1, 0x20, 0x401, 0x2, 0x3ff, 0xc00, 0xd, 0x6, 0xa5, 0x4, 0x69aae43, 0x9, 0x8000, 0x20, 0x3, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000380), 0xb}, 0x4000, 0x1, 0xffffffff, 0x0, 0x29, 0x9, 0x5}, r3, 0x8, r0, 0x8) bind$isdn_base(r0, &(0x7f0000000180)={0x22, 0x7ff, 0x0, 0x0, 0x4}, 0x6) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f00000000c0)=0x1e) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x1}, &(0x7f0000000280)=0x8) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000bc0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f0000000c00)={0x8, 0x120, 0xfa00, {0x3, {0x0, 0xfffffffeffffffff, "bf80bd53434fda2ebcaec95e2be61dcf632a28774401750b4c8c2ad9da8733fb071ceaac617e31c1470eebd9f917762cd43e0af6d96f496e896682cf970bb149c23a68242942a534d0878696403b96b1fd7a8d0a9627fb39d98c20ff2a39631ba30571152c89d77a04fbd53cc51d991e1ebf78ff3c5af10df8393b2a0e51b71eef4af9e12a566083d9008a914801af0d38a8a13ec0d73da267c0fb0f6b188d8bc1f7b9b246c5f5ae77897f09bbee4bebb737a453cccbc1f585cd104638242c1569688830ac5a0ce2f1de4add8d91f247a2425324645bce0508cfd302fbd33546d630ed1ab0b3bfd3ec4faac0827ebb72a5d7fcdc7aed3cfa1c17153947d5af55", 0xa8, 0x2, 0x7fffffff, 0x800, 0x7f, 0x6000000000, 0x100000000, 0x1}, r5}}, 0x128) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000300)=ANY=[@ANYRES32=r4, @ANYBLOB="0d000000511215c02679c86b1f12dcbeaa"], &(0x7f0000000340)=0x15) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000d40)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:42 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4147, 0x0) 03:35:43 executing program 1: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = dup2(r0, r0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000180)=0x20, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) 03:35:43 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) read$alg(0xffffffffffffffff, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:43 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x4001, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) sendmmsg(r0, &(0x7f0000004ac0)=[{{&(0x7f0000004480)=@nfc={0x27, 0x0, 0x0, 0x7}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x20000040}, 0x1}], 0x1, 0x4000040) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, 0x0, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f00000002c0)={0xd, @raw_data="bccd1915535abcf9d70f28448dd98aa5f701d8ecd0e421d0bb9a25e92edaa73ab5cabd7fb4b64eb19e5312544a49bcb948fbf946ee33ff8721404ed85c1d03bf5822b341be99fa2f9b6b40c3dad5e180ad75695b7e17002c5d4bbceb73a166fb694d3430a0f3e02d0ac6244e7e596aff468c29cd8ca4c38a79ca606b0fa984a8454252ef1d0eef93aadabad135c4d448679de2d49f6b817de75491d39c03c5c798559152b892336c48b141404d522e994b68a4a5be96dbe80fe37eb65c11a8ce40fe83017a814be7"}) mlockall(0xfc) unshare(0x40000000) [ 1121.983091][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1121.988987][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1121.994905][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1122.000706][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:35:43 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x20) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$bt_rfcomm(0x1f, 0x1, 0x3) r2 = dup(r1) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) utimes(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={{r3, r4/1000+30000}}) ioctl$VIDIOC_G_OUTPUT(r2, 0x8004562e, &(0x7f0000000240)) r5 = getgid() mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x20000, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=unix,uname=security.SMACK64MMAP\x00,dfltgid=', @ANYRESHEX=r0, @ANYBLOB=',cache=none,dfltgid=', @ANYRESHEX=r5, @ANYBLOB="2c63616368656461673d2c736d61636b6673666c6f6f723d2c00e8a6431aff4f6407e6892043fdab766d7ba452e68e61c1d1997b7fd29ee2eca56cfbdc2e2e348d1d6702ede6da5842de85"]) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:43 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000003440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="14000000000000000000000002"], 0xd}}], 0x1, 0x0) r0 = socket$inet(0x2, 0x100000000000003, 0x2) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000380)}}, {{&(0x7f0000000400)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000480), 0x21}}], 0x2, 0x0) [ 1122.063086][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1122.068921][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:35:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x2) 03:35:43 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'bpq0\x00\x00\x00\x00\xaa\x1e\x00\x00\x00\x00 \x00', 0x1}) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000040)=r0) 03:35:43 executing program 4: mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x1000044031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 1122.295467][ T2213] IPVS: ftp: loaded support on port[0] = 21 03:35:43 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x7, 0x20000) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000100), &(0x7f0000000180)=0x8) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xea3a, 0x100) accept4$unix(r1, 0x0, &(0x7f0000000040), 0x800) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:43 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)={0x82, 0x7, 0x8000}, 0xffffffffffffffe2) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000000)) 03:35:44 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(0xffffffffffffffff, 0x4010ae94, 0x0) r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioprio_set$pid(0x3, r1, 0x0) 03:35:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffc) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000040)={0x7, 0x0, 0x2, 0xfff}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f00000000c0)={0x3c954d6e, r1, 0x10002, 0x62}) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:44 executing program 4: mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x1000044031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:35:44 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) read$alg(0xffffffffffffffff, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:44 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)={0x82, 0x7, 0x8000}, 0xffffffffffffffe2) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000000)) 03:35:44 executing program 3: removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_default\x00') lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_default\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x15, 0x3) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x100, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, &(0x7f0000000240)=0xb8) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:44 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x227d, &(0x7f0000000000)) 03:35:44 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)={0x82, 0x7, 0x8000}, 0xffffffffffffffe2) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000000)) 03:35:44 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x101000, 0x0) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0xfffffffffffffff7) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x4002) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r1, 0x111, 0x5, 0x4, 0x4) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:44 executing program 0: r0 = socket$inet(0x2b, 0x801, 0x0) connect$inet(r0, 0x0, 0x0) 03:35:44 executing program 4: mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x1000044031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:35:44 executing program 0: r0 = socket$kcm(0xa, 0x3, 0x87) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x7fffffffff, 0x4) sendto$inet(r1, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000240), 0x13f698e4b9e296e3, 0x1f4, 0x0, 0xffffffffffffff06) 03:35:44 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sched_rr_get_interval(0x0, &(0x7f0000000100)) 03:35:44 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xc2, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', r1}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:44 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000000)={0x82, 0x7, 0x8000}, 0xffffffffffffffe2) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000000)) 03:35:45 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'wp256-generic\x00'}, 0x58) read$alg(0xffffffffffffffff, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) 03:35:45 executing program 4: mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x1000044031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 03:35:45 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap$binder(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000002, 0x12, r0, 0x0) 03:35:45 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x101000, 0x0) socket(0x9, 0x5, 0x400) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000040)={0x6, 0x508, 0xffff, 0x75a94569, 0x8, 0x7}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) recvfrom(r0, &(0x7f0000000500)=""/4096, 0x1000, 0x20, &(0x7f00000000c0)=@ipx={0x4, 0x6d, 0x1, "308a7e547364", 0x3}, 0x80) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f00000003c0)) mount$overlay(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000400)={[{@index_on='index=on'}], [{@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@appraise='appraise'}, {@hash='hash'}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<', r1}}]}) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x2c, r1, 0x605, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x2c}}, 0x0) [ 1123.824279][ T2287] overlayfs: unrecognized mount option "rootcontext=sysadm_u" or missing value 03:35:45 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc0605345, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) tkill(r1, 0x1000000000013) 03:35:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffcbe) ioctl$FS_IOC_SETVERSION(r0, 0x6611, 0x0) fchown(r1, 0x0, 0x0) [ 1123.869327][ T2287] overlayfs: unrecognized mount option "rootcontext=sysadm_u" or missing value 03:35:45 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x8080, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_open_dev$radio(&(0x7f0000005a40)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000700)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000140)=0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 03:35:45 executing program 0: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:35:45 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x10) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:45 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x2080, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x84}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000100)={r1, 0x4}, &(0x7f0000000180)=0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@ipv4={[], [], @multicast2}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0xe8) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000440)={0x3, @bcast, r2}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='security.SMACK64EXEC\x00', &(0x7f0000000280)='security.SMACK64MMAP\x00', 0x15, 0x1) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:45 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffcbe) ioctl$FS_IOC_SETVERSION(r0, 0x6611, 0x0) fchown(r1, 0x0, 0x0) 03:35:46 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x80, 0x0) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000180)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40500, 0x0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000040)=0xffffffffffffffff) write$nbd(r0, &(0x7f0000000300)={0x67446698, 0x1, 0x4, 0x2, 0x3, "4486a213a617eba36eb2a7780125653a8acfdc72cd6d1e2f2779ab1d6ac84fc1c758e6bed87b18d3de4760d833c9f53820d3bb3fd3b14fc7ca9e20cff0f1631e99c4c1bb1dd5df48fcc01d90d1cdf6e6748cf7931423fd743759f4b80207661b8d54612539958f29ae6acb0f0a4d1c98a461d3cfb1f1914bab61f7327e1a2c2491f862fe1df90149213494bfe93391bdf606d731a85116119bc9584d98cc568372d52eb35d625942ff413823f26489cc1c6385efd51f1a5fc09a4755267badd1f6a4da3c503ad09a902f69ea644c84f4553853e8505924134d"}, 0xe9) 03:35:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0x66, &(0x7f0000000100)={@link_local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff3a, 0x0, @ipv4={[0x3580], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 03:35:46 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x8080, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_open_dev$radio(&(0x7f0000005a40)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000700)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000140)=0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 03:35:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffcbe) ioctl$FS_IOC_SETVERSION(r0, 0x6611, 0x0) fchown(r1, 0x0, 0x0) 03:35:46 executing program 0: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:35:46 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) 03:35:46 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc0605345, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) tkill(r1, 0x1000000000013) 03:35:46 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x9, 0x100) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000100)={0x1}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)=""/45, 0x2d) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:46 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc0605345, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) tkill(r1, 0x1000000000013) 03:35:46 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfffffcbe) ioctl$FS_IOC_SETVERSION(r0, 0x6611, 0x0) fchown(r1, 0x0, 0x0) 03:35:46 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) mknodat(r0, &(0x7f0000000000)='./file1\x00', 0x8000, 0x10001) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) bind$isdn(r0, &(0x7f00000000c0)={0x22, 0x7, 0x8001, 0x7, 0x5}, 0x6) 03:35:46 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc0605345, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) tkill(r1, 0x1000000000013) 03:35:46 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x2) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='64MMAP\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0xffffffffffffffba, 0x4000002) 03:35:46 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x8080, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_open_dev$radio(&(0x7f0000005a40)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000700)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000140)=0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 03:35:46 executing program 0: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:35:46 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc0605345, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) tkill(r1, 0x1000000000013) 03:35:46 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x200, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000040)=0x3ff, 0x4) 03:35:46 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc0605345, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) tkill(r1, 0x1000000000013) 03:35:47 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc0605345, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) tkill(r1, 0x1000000000013) 03:35:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x21000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid\x00') setns(r1, 0x0) 03:35:47 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = getuid() mount$9p_rdma(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)='9p\x00', 0xc010, &(0x7f0000000300)={'trans=rdma,', {'port', 0x3d, 0x4e20}, 0x2c, {[{@rq={'rq', 0x3d, 0x7}}, {@rq={'rq', 0x3d, 0x80000000}}, {@rq={'rq', 0x3d, 0x81}}], [{@fowner_lt={'fowner<', r0}}, {@seclabel='seclabel'}, {@audit='audit'}]}}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x200, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0xc0, 0x0) r3 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x0, 0x200000) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000500)={r2, r3, 0x100000000, 0xb6, &(0x7f00000003c0)="da8455a945c9fcb0524c345ead4adedf055ec377b17e6df85e2f421e9034a1c2cc165f91c83f334f4f6123b3cdfc6d6983a96517e310df0cc881f9602060a07f353f80222293ace8ac554d2757736c8510f5ff3ab9bfa604a77b7d952d72b5bbe3c96799c28431380a34af3bfe5e37ee4196bbd29b5fa2d8213ef767c27fecd489464d3c568d3990b00b287865d39f47f7e3f202f7237051400cf155c832e861a84d2c69ccb65fa8e758a60d7fb96ce1d325d1b66447", 0x401, 0x0, 0x25d4, 0x8, 0x7f, 0x2, 0x6, 'syz0\x00'}) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:47 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc0605345, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) tkill(r1, 0x1000000000013) 03:35:47 executing program 0: mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:35:47 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) 03:35:47 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x8080, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_open_dev$radio(&(0x7f0000005a40)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000700)='/dev/usbmon#\x00', 0x8, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(0xffffffffffffffff, 0x40045532, &(0x7f0000000140)=0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 03:35:47 executing program 3: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x4, 0x2040) r1 = getuid() r2 = getegid() lchown(&(0x7f0000000040)='./file0/file0\x00', r1, r2) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f00000000c0)) socket$inet6_dccp(0xa, 0x6, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) [ 1126.151101][ C0] net_ratelimit: 18 callbacks suppressed [ 1126.151110][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1126.162610][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1126.168471][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1126.174285][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:35:47 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc0605345, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) tkill(r1, 0x1000000000013) [ 1126.220969][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1126.226792][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:35:47 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x8) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x0) [ 1126.300924][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1126.306806][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:35:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000240), 0xfffffffffffffd92) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x3f42e532e5989fe3, 0x0, 0x4000, 0x1000, &(0x7f0000fff000/0x1000)=nil}) 03:35:47 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000000040)="6f9fa68eaf310710c7605627282239528e5f06e7bb6cd54ed1fed98fa43ca8b190dfbaee2dae86efbed1a67552103d", 0x2f}, {&(0x7f0000000180)="7f5b09da2d4decec70808ffc10b8", 0xe}, {&(0x7f0000000300)="e2bd2671f37f04d93fe3815682f30f2857bec53bb81daa6f8c7c6393bdf01113b6f309ceb1ab0707c8c67ba6a60a6aa0cd0c7ef9815b34626750d2eb7e41a09948435e01cac89c3dcc2adaba5958dffcef43417cb90829186a94dcba00593d7c3712612c278a10ce9ab891ab721084a8c8beb784f6273fe4f77223a037aeba85a4c4c84c673dfff17b", 0x89}, {&(0x7f00000003c0)="874fc5a082098bf3bf73d4c19d428543d7e51a32c4d7af3bb2fc2f29e6ce13eaeeac4c85aef8f2fa813acddd9fde307b1fd42874ad858206fb2465dee267438ddc3266c217dff03ef86690933e89d07066bc5a156690a3c47c5c51b7467178627968f527dce26bc617a7853a405ba5be157f015400fda07382eac58c58ac513476215a11a5ff515747b25b9549", 0x8d}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000000240)="93665fd85032dd0428b01cb64c3b9dbc3fb829a0567055ce44c5f0bdbe50c487d80cdf5a6854716af1e2f8e96cbde55031c6c9088c47ef9686f42920b6439aa512e329d27fc3c3857015bbc3173501fd2e394210cb3579d33831ad762ac78d3cdceaab3ee9d458e9e0f6f263044bfa0f077f2dbb0950badf690c", 0x7a}, {&(0x7f0000001500)="9458ce672eaada889c6e88a8d489e4326456beb3ae1cdab11ed7d8e3cb1330cd9123904d390b4b75d9a8a86c8652f02979be08f0f706906a50956f43de8d3c532cfa5a5f8b87c321ea572ffe4c36cee04b08", 0x52}], 0x7, &(0x7f0000001600)=ANY=[@ANYBLOB="500000000000000007010000ff7f00005fa41eb5749ba2f4780903a5cedcb2c0e468cee399dc71fc89b96fd192e4b0737e52eed5e2fbaec5203f8af7a85c4b910a37f5f2df59f31988d2cb1000000000f0000000000000000000000001000000f859f5409e8e1a822bdc90a775918f23486f271a4d3dcf98589b04ce4c2280332f0c41ef9c2244224b93d0533c7c4c0d07d217a4ab469404ef67917da202c80a59189cd20d5076617b9611f160db578175ca1ed7e73b95cea74ff051e8f2cf5f4ab7e5efc4b4b871317241bfea65b741860486c5fe0d318d8873c55d378aae0a5cbfd3aabfa36087ee19b2447b6ec2da7ae2d700b9257055fb01b1e803361ac426f53a80a3ca898e964a2b7346c3848decafee31808eff3f89abc4dd81802aedaf1d75ea1e3366bd63893c6f00dfdd9387b2bed8342b425f3b12674b9000000010000000000000009701000008000000d8000000000000000e01000008000000b27e966f4845d0f46ffe3098e2261491bc3278c7400e5abd29ca29c2275ecf000192ae374be72437d506d90c33edc0151ef8fdc7b6faf39f3a93bc24a75aa33ffbe6cced1a9cdff92f2c8cae2a113082335bf78132c02f20bb1ef9721dd99ddd8c90cca13be853a3f14bc92fc8ec67ad17c054f87b1fd916ba5a7539bff5d1ac0e107bf7531643566b9169297ac7f61942881643328bb7ad076d03c027de94f18120ea6bedc4cb045e83654394c45ad8c963be706b640280dea30c86d4a49002420000000000000060000000000000000000000009000000ce5ff31694847815b2f356fd3c5ae1b7329f01c692e8891aecc4894db1c248ba75b8863bf43910c95da500672c096edbfa10b4c435e723bc045a46fc0d44cc558070efd04483f7805ee277d5973b0000100100000000000001000000000000008033194bb96247809e5dc952480904377c14fda809a0a4ea72e8a4e94acf8eca90ab666d71f228689e205620c47e86de744a652ee930241e6c071d2bb854fe6b0529fd1f000c574fd66b76cfdd7b1baa4ecd1779fa1882dbed78381382fb5490ed501623a862dddba968cb37c04831549d42e6e69792e7de76314cde9bc5881d1a339a1c354f0a350d193f7b67ffd2964be684d5bc6439dae7b8e5e231c004f98d18ba555469d0736cd18c897fc6f67c678f549ebd633c0510e5f79d5a838547407ccac29a926c653dfbc1993ca82d7a74b3a300f53eb67d50326813f4f33639b3a00219140da4f6bf37aaffb58aed4593f19128808a8fd90d5d9fbf76030000"], 0x398}, 0x800) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f00000000c0)={0x1, 0xffffffffffffffc0, {0x55, 0x5, 0x7, {0xfff, 0x6}, {0x2, 0x1}, @const={0x1f, {0x5, 0xfffffffffffffff7, 0x9, 0x400}}}, {0x0, 0x8, 0x5, {0x0, 0x6}, {0x4b, 0x9}, @cond=[{0x9, 0x0, 0x4, 0x3, 0x6, 0xaf}, {0x6, 0x3, 0x8001, 0xff, 0xffffffff, 0xffffffff}]}}) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f0000000480), 0x8) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:48 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000400)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bf}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc0605345, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)) r1 = gettid() timer_create(0x0, &(0x7f00000002c0)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x0, 0x0) tkill(r1, 0x1000000000013) 03:35:48 executing program 0: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='hfsplus\x00', 0x0, 0x0) 03:35:48 executing program 1: mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) connect$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) r0 = socket$vsock_dgram(0x28, 0x2, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, 0x0) connect$bt_sco(r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, 0x0, 0x0) 03:35:48 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)={0x1, 0x0, 0x0, '['}) 03:35:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000240)={0x2, 0x0, [{0x73a3cc165a39e272, 0x0, 0x7fff}, {0xeaf, 0x0, 0x80000001}]}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='vxfs\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000280)) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x10) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000300), &(0x7f0000000340)=0x4) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f00000001c0)={'rose0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x29}}}) 03:35:48 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x4, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x71, 0x30}]}, &(0x7f0000000240)='GPL\x00', 0x2, 0x2e6, &(0x7f00001a7f05)=""/251}, 0x48) 03:35:48 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_ports\x00\b\xb7\xcbV0\xce\xe6\xdf\xf9\x80Xw\r\xb8b\x17\xb5\xc2\x18m\xe4\xf8\x84L7\x11\x1au\x86\xba+\xcd\xd9\xbc\x85\xc8b\x19\xfb%t\x17\x9d\x85\x022\xe7\xdeE\xa3W\xf2\x96\xfa\xc7\xf3)\xc7v\x18\xff\xe7\xb3`\x8c\xd3\x84\x9d7\x04MT\xdf%lQ\xd9\xf4@\x04RM\xddS \xfd\x19\xadu\r\x93\x95\xe6\xe3\xaee\xe1f\x8f\x1b\xbdV?\x03\xe1\xfbso\x8c\x14\xe2\xe9\xf4\xb7\xf4\xde8\xa1\xc2\x1c/\r\xea\xefa\xf6\x7f\x8f\x9fm\xb6\xb3\xc3\x88~\xf3\xaa\xd8\xbb\xe4U\x92\xc5e*\xc5\x87O\xd2\xee\xd6\xd7\xfbK`\xa1\x8f\xc6\x94gy\xc0~\x02\x02\xa9\x98\x8d`)\xe9\xba\xb4\xbe\xe9\xf31\x9d\x8c<\xda\x8d\x16\xa2wJ\x97V\x1eEJ\x1e\xe4\xcb\xdaHy\xbe\xb0S\xaf\xb9\v\xf6\xfd\f\xcd#\x9e\xe7\xb7\x9e\x8a~\x8aw\xdd\xb7\xffd\x1e\x89*\x03R\xee&A\xafd\xe4\\_\xed\xe9\x98Ac\xae0\xe7\xebY\xf7\xc3\xe9\x12\x16\xf5\x8dD\"\x94\xf0', 0x2, 0x0) sendfile(r0, r0, 0x0, 0x9) 03:35:48 executing program 4: r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000000)=0x752, 0x4) listen(r0, 0x11000000000b) listen(r0, 0x0) [ 1127.021981][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1127.028451][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:35:48 executing program 1: r0 = memfd_create(&(0x7f0000000240)='\x00\xc30\xd6\xc0$\b\xdfV\xe1;', 0x4) fcntl$addseals(r0, 0x40a, 0x0) 03:35:48 executing program 0: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x2b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:35:48 executing program 3: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) ptrace$setregs(0xf, r0, 0x7fff, &(0x7f0000000180)="a282f8b81a2bca64c7ac4178804c27efee0afecf59efcc24") r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000240)={0xffffffffffffffff}, 0x113, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000300)={0x5, 0x10, 0xfa00, {&(0x7f0000000500), r2, 0x2}}, 0x18) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2000, 0x0) getsockname(r3, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x80) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:48 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80, 0x0) readv(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000000)=""/43, 0x2b}], 0x1) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) r3 = syz_open_pts(0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000200)={0x3, 'syz1\x00'}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_open_dev$rtc(0x0, 0x0, 0x300) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) getsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000180), &(0x7f0000000240)=0x4) connect$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) ioctl$UI_BEGIN_FF_UPLOAD(r3, 0xc06855c8, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x8, 0x0, {0x4}, {0x0, 0x100000000}, @rumble={0x2}}, {0x0, 0x0, 0x0, {0x0, 0xe3}, {0x0, 0x7c79}, @ramp={0x0, 0x0, {0x0, 0x0, 0x7}}}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r5 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x7, 0x200) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x10000004001fc) fanotify_mark(0xffffffffffffffff, 0x80, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000003) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000000)='\x00\x00\x04\x00\x00\x00\xfd\xfd\xff\xff\xa5,\xd0\xfdOp\x95\x00\xd7\xf4\xda\xa6\x1f\x8c\x82\x81\xbf\xb1\xe2G\xc3\x00\x80\x00\x00[Pu \xa8\x8b\x911\f\x8a\x15\xbb\xc7)\x06\tN\x19\xder?\xc4%\xbbS\xe8\x91\x134~\x9f=/a\x04\x01\xe8*s\x0eV\xf2B\xa9t:\x9f7\xaf\xc2\x02\\\x19:5V\x19\x9b\xa1\x05\xf9D\xff2\xf0m0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$jfs(&(0x7f0000000100)='jfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)={[{@resize_size={'resize', 0x3d, 0x2}}]}) [ 1128.090398][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 1128.090414][ T26] audit: type=1800 audit(2000000149.304:906): pid=2486 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17341 res=0 03:35:49 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x80, 0x0) readv(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000000)=""/43, 0x2b}], 0x1) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) r3 = syz_open_pts(0xffffffffffffffff, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$IMSETDEVNAME(0xffffffffffffffff, 0x80184947, &(0x7f0000000200)={0x3, 'syz1\x00'}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) syz_open_dev$rtc(0x0, 0x0, 0x300) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) getsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000180), &(0x7f0000000240)=0x4) connect$bt_l2cap(r4, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) ioctl$UI_BEGIN_FF_UPLOAD(r3, 0xc06855c8, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x8, 0x0, {0x4}, {0x0, 0x100000000}, @rumble={0x2}}, {0x0, 0x0, 0x0, {0x0, 0xe3}, {0x0, 0x7c79}, @ramp={0x0, 0x0, {0x0, 0x0, 0x7}}}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)) r5 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x7, 0x200) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x10000004001fc) fanotify_mark(0xffffffffffffffff, 0x80, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000003) prctl$PR_SET_SECUREBITS(0x1c, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087707, &(0x7f0000000000)='\x00\x00\x04\x00\x00\x00\xfd\xfd\xff\xff\xa5,\xd0\xfdOp\x95\x00\xd7\xf4\xda\xa6\x1f\x8c\x82\x81\xbf\xb1\xe2G\xc3\x00\x80\x00\x00[Pu \xa8\x8b\x911\f\x8a\x15\xbb\xc7)\x06\tN\x19\xder?\xc4%\xbbS\xe8\x91\x134~\x9f=/a\x04\x01\xe8*s\x0eV\xf2B\xa9t:\x9f7\xaf\xc2\x02\\\x19:5V\x19\x9b\xa1\x05\xf9D\xff2\xf0m0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f00000000c0)=0xc) mount$9p_fd(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x0, &(0x7f0000000740)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_uid={'access', 0x3d, r4}}]}}) [ 1130.938985][ T26] audit: type=1800 audit(2000000152.156:911): pid=2546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17377 res=0 03:35:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@broadcast, @in, 0x0, 0xffffffff, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@loopback}}, 0xe8) connect$inet6(r0, &(0x7f0000000000), 0x1c) [ 1131.002865][ T26] audit: type=1804 audit(2000000152.186:912): pid=2546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir521148956/syzkaller.94vEjX/1025/file0" dev="sda1" ino=17377 res=1 03:35:52 executing program 3: mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0x4) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@broadcast, @in, 0x0, 0xffffffff, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@loopback}}, 0xe8) connect$inet6(r0, &(0x7f0000000000), 0x1c) [ 1131.154043][ T26] audit: type=1800 audit(2000000152.186:913): pid=2546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17377 res=0 [ 1131.178479][ C0] net_ratelimit: 22 callbacks suppressed [ 1131.178488][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1131.188207][ T2565] 9p: Unknown uid 00000000004294967295 [ 1131.190083][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1131.243471][ T2566] 9p: Unknown uid 00000000004294967295 [ 1131.246598][ T26] audit: type=1800 audit(2000000152.276:914): pid=2557 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=17345 res=0 [ 1131.259549][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1131.276279][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:35:52 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0xffffffff, 0x101001) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000280)=[0x4, 0x1], 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000080)=0xe8) setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x1, 0x9}, {0x2, 0x5}], r1}, 0x18, 0x1) [ 1131.324350][ T26] audit: type=1804 audit(2000000152.346:915): pid=2548 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir237943214/syzkaller.M6aWjR/79/file0/file0" dev="sda1" ino=17345 res=1 [ 1132.388077][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1132.394018][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1132.410778][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1132.416548][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1132.457913][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1132.463727][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:35:55 executing program 1: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 03:35:55 executing program 0: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) tkill(r0, 0xe) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x2b}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:35:55 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@broadcast, @in, 0x0, 0xffffffff, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in=@loopback}}, 0xe8) connect$inet6(r0, &(0x7f0000000000), 0x1c) 03:35:55 executing program 3: r0 = dup(0xffffffffffffff9c) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000000)={0x10003, 0x2, 0x3000, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030ffffff7f0000000030303037312c6d6f6465c14530303030303030303030303f4f303030303030303030342c726f6f7478743d73797374656d5f752c646f60745f681573682c0050bc4a636c3053455a8201124fbc95587bca1b6489277f3621f929ab072ff58360a994e2fd87495beadfbe"]) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000001c0)={@local}, &(0x7f0000000240)=0x14) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', 0x0, 0xffffffffffffff55, 0x1) 03:35:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x80000001, 0x4) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1e0001ac1414aa0000000003000000ac141414ff0900ffe0000002efffffffe0000002000000f0e0000002e0"], 0x1) symlink(0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r3) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f00000003c0)="20d60bef4898686d679e3e516242ef59905c35894c7562825858a2d59561399aea03f04a6affe4fe9d98") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() getpgid(0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r4, &(0x7f0000000400)="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", 0x200) sendfile(r4, r5, 0x0, 0x10000) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) 03:35:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x80000001, 0x4) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1e0001ac1414aa0000000003000000ac141414ff0900ffe0000002efffffffe0000002000000f0e0000002e0"], 0x1) symlink(0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r3) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f00000003c0)="20d60bef4898686d679e3e516242ef59905c35894c7562825858a2d59561399aea03f04a6affe4fe9d98") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() getpgid(0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r4, &(0x7f0000000400)="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", 0x200) sendfile(r4, r5, 0x0, 0x10000) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) 03:35:55 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x802) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000100)=""/6, 0x6}], 0x1) 03:35:55 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc\x00', 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000004c0)='/dev/dmmidi#\x00', 0xfffffffffffffffc, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) semget(0xffffffffffffffff, 0x0, 0x10) r2 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f00000003c0)={0x0, 0xffff}, &(0x7f0000000780)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000007c0)=@assoc_id=r4, &(0x7f0000000d40)=0x4) getgroups(0x1, &(0x7f0000000480)=[0xee01]) preadv(r0, &(0x7f0000000bc0)=[{&(0x7f0000000400)=""/77, 0x4d}, {&(0x7f00000005c0)=""/232, 0xe8}, {&(0x7f00000008c0)=""/221, 0xdd}, {&(0x7f0000000200)=""/6, 0x6}, {&(0x7f0000000340)=""/18, 0x12}, {&(0x7f00000009c0)=""/241, 0xf1}, {&(0x7f0000000500)=""/97, 0x61}, {&(0x7f0000000ac0)=""/239, 0xef}, {&(0x7f00000006c0)=""/35, 0x23}], 0x9, 0x0) fstat(r0, &(0x7f0000000800)) r5 = geteuid() mount$fuse(0x0, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000700)='fuse\x00', 0x1000020, &(0x7f0000000c80)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}]}}) mkdirat(r3, &(0x7f0000000740)='./file0\x00', 0x0) mkdirat(r3, &(0x7f0000000580)='.//ile0\x00', 0x0) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f0000000140)='./file0/../file0\x00') [ 1134.001374][ T26] kauditd_printk_skb: 1 callbacks suppressed [ 1134.001389][ T26] audit: type=1800 audit(2000000155.217:917): pid=2586 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17403 res=0 03:35:55 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x440, 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000380)={0x15}) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U+', 0xfff}, 0x28, 0x3) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000600)=@req={0x28, &(0x7f00000005c0)={'veth0\x00', @ifru_flags=0x1000}}) prctl$PR_SET_THP_DISABLE(0x29, 0x1) lsetxattr$security_ima(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.ima\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="dea74bd0885c967884"], 0x9, 0x2) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x410800, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000008}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)={0xa0, r2, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x80000001, @mcast2, 0x7ff}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x9, @empty}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_team\x00'}}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x40}, 0x1) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f00000001c0)={{0x6}, 0x1}, 0x10) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0) dup2(r3, r3) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f0000000040)) [ 1134.123785][ T26] audit: type=1804 audit(2000000155.247:918): pid=2586 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir521148956/syzkaller.94vEjX/1026/file0" dev="sda1" ino=17403 res=1 03:35:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x80000001, 0x4) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1e0001ac1414aa0000000003000000ac141414ff0900ffe0000002efffffffe0000002000000f0e0000002e0"], 0x1) symlink(0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r3) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f00000003c0)="20d60bef4898686d679e3e516242ef59905c35894c7562825858a2d59561399aea03f04a6affe4fe9d98") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() getpgid(0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r4, &(0x7f0000000400)="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", 0x200) sendfile(r4, r5, 0x0, 0x10000) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) 03:35:55 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x20, 0x0) [ 1134.252933][ T26] audit: type=1800 audit(2000000155.247:919): pid=2586 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17403 res=0 03:35:55 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x3, 0x2000) recvfrom(r0, &(0x7f0000000040)=""/21, 0x15, 0x41, &(0x7f00000000c0)=@isdn={0x22, 0x4, 0x5, 0x6, 0x3ff}, 0x80) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:55 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0xc00c55ca, &(0x7f0000008e00)) [ 1136.535863][ C0] net_ratelimit: 18 callbacks suppressed [ 1136.535874][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1136.547588][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1136.553510][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1136.559320][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1136.615794][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1136.621662][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1136.695772][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1136.701652][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:35:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000004540)=[{{0x0, 0x0, &(0x7f0000002f80)=[{&(0x7f0000003500)=""/4096, 0x1000}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/sockstat\x00') preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) syz_genetlink_get_family_id$tipc(0x0) 03:35:58 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, 0x0, 0x8040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb)={'\x00\x00\f', 0xffffffffffffffff, 0x4c00000000006874}, &(0x7f0000001fee)='R\trist\xe3cusgrVid:De', 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000200)=""/64) membarrier(0x40, 0x0) r1 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) bpf$MAP_CREATE(0x4, &(0x7f0000000080)={0x3, 0x0, 0x73fffe, 0x0, 0x20820000, r1, 0x0, [0x20000000000000]}, 0x2c) 03:35:58 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x3, 0x20000) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000180)={0xc292, 0x2, 0x56, @dev={[], 0xf}, 'nlmon0\x00'}) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='cgroup2\x00', 0x40000000, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000040)={0x10000}, 0x4) 03:35:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x80000001, 0x4) request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffc) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="ac1e0001ac1414aa0000000003000000ac141414ff0900ffe0000002efffffffe0000002000000f0e0000002e0"], 0x1) symlink(0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x400480) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000640)={0x0, @in6={{0xa, 0x4e24, 0x9, @local, 0x100000001}}, 0x2, 0x5}, &(0x7f0000000240)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_KEY(0xffffffffffffffff, 0x84, 0x17, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r3) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f00000003c0)="20d60bef4898686d679e3e516242ef59905c35894c7562825858a2d59561399aea03f04a6affe4fe9d98") ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) gettid() getpgid(0x0) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(&(0x7f0000000600)='./file0\x00', 0x4000, 0x0) write(r4, &(0x7f0000000400)="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", 0x200) sendfile(r4, r5, 0x0, 0x10000) ioctl$TIOCLINUX7(r1, 0x541c, &(0x7f0000000200)) 03:35:58 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) connect$can_bcm(r2, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b7028a889a73f1803a08092ccde170ff6041a9ca844e75a67c86d665069cfc07128e5a406634aae87d13ed0d5fb62d3f2ed2eea2480d6525417bd176b15974760833140803ed3080cb1ea09851b99c30ad32b6388ca48e6", 0x159, 0x10000}], 0x0, 0x0) close(r0) 03:35:58 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x100000000031) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="3982190dd2db7592004b371e4c4e6106007000000000000088c63fe3f2f48639a007f395f4b565c8d18995fffffffffffc000000ff0000ad58"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1137.083550][ T26] audit: type=1800 audit(2000000158.299:920): pid=2628 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17428 res=0 03:35:58 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0xfffffffffffffca6, 0x0) 03:35:58 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000040)='./file0\x00', 0x0, r0) chown(&(0x7f00000003c0)='./file0\x00', 0x0, r0) [ 1137.257944][ T2639] BTRFS: device label >ÐÕûbÓòí.ê$€ÖRT½k—G`ƒ1@€>Ó ±ê …™Ã [ 1137.257944][ T2639] Ó+cˆÊHæ devid 17487635432702809553 transid 756082810144684242 /dev/loop4 [ 1137.269465][ T26] audit: type=1804 audit(2000000158.339:921): pid=2628 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir521148956/syzkaller.94vEjX/1027/file0" dev="sda1" ino=17428 res=1 03:35:58 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000180)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x8}}) 03:35:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) mlock2(&(0x7f0000a76000/0x3000)=nil, 0x3000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') mkdir(&(0x7f0000000140)='./file0\x00', 0x0) read$eventfd(r0, &(0x7f0000000080), 0xff97) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='tracefs\x00', 0x0, &(0x7f0000000140)) read$eventfd(r0, 0x0, 0x0) [ 1137.417176][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1137.424022][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1137.429936][ T26] audit: type=1800 audit(2000000158.339:922): pid=2628 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17428 res=0 [ 1137.454146][ T2639] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 1137.490848][ T2639] BTRFS error (device loop4): superblock checksum mismatch 03:35:58 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x20000, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [{0x20, 'cgroup2\x00'}, {0x20, 'security.SMACK64MMAP\x00'}, {0x20, '#nodev'}, {0x20, 'security.SMACK64MMAP\x00'}], 0xa, "24b0435d17cab72972432cdedb203e3642ca31e6e0dc9465f535"}, 0x61) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001540)=0x0) fcntl$setown(r0, 0x8, r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r2, &(0x7f0000001500)={&(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/98, 0x62}, {&(0x7f0000000040)=""/3, 0x3}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000000300)=""/142, 0x8e}], 0x4, &(0x7f0000000400)=""/180, 0xb4}, 0x10000) 03:35:58 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) [ 1137.534258][ T2639] BTRFS error (device loop4): open_ctree failed 03:35:58 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000180)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x8}}) 03:35:58 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x100000073) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) 03:35:59 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) connect$can_bcm(r2, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) close(r0) 03:35:59 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security.SMACK64EXEC\x00', 0x0, 0xfffffffffffffcff, 0x0) 03:35:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000180)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x8}}) 03:35:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 03:35:59 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) connect$can_bcm(r2, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="8da4363ac0ed0000000000000000004d01000000000000000000000000000000ecf6f2a2299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4dd2f873574f257e0a01e2a6a02f5e071383fa5a669a53f2fe9eb4eb7918628af41b035fd98372e7c2a6970f550441f0b263dca46c12ce6aaa994fbb4b3493ca901878bb330d2db8e953fc883f9c754f419e963874199295a945ec867b4f224fde52268a81e1154b80f7076f32b6eb8614e3fde3bfa0e0207e1ca9b4c71d59da30f3d115c9c7c58fb0f2b1e52135ce1a7df330a74f25a3625e9f11ab0df9f071a8429992605ecde181c3cf7a8e08f6ca875e8259a985ff0989837b7028a889a73f1803a08092ccde170ff6041a9ca844e75a67c86d665069cfc07128e5a406634aae87d13ed0d5fb62d3f2ed2eea2480d6525417bd176b15974760833140803ed3080cb1ea09851b99c30ad32b6388ca48e6", 0x159, 0x10000}], 0x0, 0x0) close(r0) [ 1138.088306][ T2690] BTRFS error (device loop4): unsupported checksum algorithm 22813 03:35:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) [ 1138.142873][ T2690] BTRFS error (device loop4): superblock checksum mismatch 03:35:59 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000180)={'bridge0\x00', &(0x7f0000000000)=@ethtool_cmd={0x8}}) 03:35:59 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64MMAP\x00', 0x0, 0xfffffffffffffe18, 0x0) [ 1138.199877][ T2690] BTRFS error (device loop4): open_ctree failed 03:35:59 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) connect$can_bcm(r2, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) close(r0) 03:35:59 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) connect$can_bcm(r2, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) close(r0) 03:35:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x2, 0x3, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x68}}, 0x0) 03:35:59 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f00000004c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) 03:35:59 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x100000073) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) 03:35:59 executing program 5: getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x10000000000001f7, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:35:59 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x2, 0x4000000000072, 0xffffffffffffffff, 0x0) ioctl(r0, 0x40044103, &(0x7f0000001f64)) 03:35:59 executing program 3: mkdir(&(0x7f0000000140)='./file0\x00', 0x80000) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) getresgid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000240)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) mount$9p_tcp(&(0x7f0000000000)='127.0.0.1\x00', &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='9p\x00', 0x1, &(0x7f0000000400)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r0}}, {@access_client='access=client'}, {@afid={'afid', 0x3d, 0x8}}, {@version_u='version=9p2000.u'}], [{@context={'context', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@euid_gt={'euid>', r1}}, {@obj_type={'obj_type', 0x3d, 'cgroup2\x00'}}, {@defcontext={'defcontext', 0x3d, 'user_u'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@obj_role={'obj_role', 0x3d, 'cgroup2\x00'}}, {@fsname={'fsname', 0x3d, 'security\xaeQMAG\x9c~f|\x04\xbb\xad\x17\xda\xca\x05\x9fu\xc6$\x92\":\x1e\x02\xd8\xe1g['}}]}}) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='security\xaeQMAG\x9c~f|\x04\xbb\xad\x17\xda\xca\x05\x9fu\xc6$\x92\":\x1e\x02\xd8\xe1g[', 0x0, 0x3d7, 0x2) 03:35:59 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) connect$can_bcm(r2, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) close(r0) [ 1138.634911][ T2736] BTRFS error (device loop4): unsupported checksum algorithm 22813 [ 1138.680153][ T2736] BTRFS error (device loop4): superblock checksum mismatch 03:35:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x8000}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_getrule={0x1b, 0x22, 0x201}, 0x20}}, 0x0) [ 1138.733525][ T2736] BTRFS error (device loop4): open_ctree failed 03:36:00 executing program 5: getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x10000000000001f7, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:36:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x33, 0x403fc) close(r2) 03:36:00 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup2(r1, 0xffffffffffffffff) r3 = semget$private(0x0, 0x6, 0x1) semtimedop(r3, &(0x7f0000000800)=[{0x0, 0x0, 0x1000}, {0x0, 0x1}], 0x2, &(0x7f0000000840)={0x77359400}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000240)={0x0}, 0x10) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f0000000140)) connect$can_bcm(r2, 0x0, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000400)=[{&(0x7f00000008c0)="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", 0x159, 0x10000}], 0x0, 0x0) close(r0) 03:36:00 executing program 0: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/userio\x00', 0x0, 0x0) poll(&(0x7f00000001c0)=[{r0}], 0x1, 0x7ff) 03:36:00 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x100000073) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) 03:36:00 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x200000022d, 0x0, 0x0, 0x4}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 03:36:00 executing program 5: getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x10000000000001f7, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1139.150095][ T2772] BTRFS error (device loop4): unsupported checksum algorithm 22813 03:36:00 executing program 2: syz_open_dev$loop(0x0, 0x4, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) r0 = syz_open_dev$media(0x0, 0x0, 0x0) io_cancel(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x5, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, 0x0) write$P9_RGETLOCK(r0, &(0x7f0000000080)={0x20, 0x37, 0x2, {0x1, 0x1, 0x6, 0x0, 0x2, '),'}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f00000001c0)) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r4, r3) io_setup(0x8, &(0x7f0000000140)=0x0) io_submit(r5, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x2, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000640)="41b2af0fc5a66d7eff82c7a4f704860a215943e94a3bf6793069cc53f592b7d1dd3506892ed212993e02ed337c1a6d78d35f30042e659ed39a9fbbe4f5d54e9a934380b3e8cb3350b7c17ac7c7563c234c2b3692ab17d58e9b29f40e20b0a8ec7c19830aef44d89795ffa7944f46dd1bc8ebc31b76bb5dc5a3efc587cbd8a8fae8f71f4d40c08b8cc71efec69cb51c2b286b0ea0df85679460d54dbc15ee1216fa45f4b5c8a1c10f5e5d07128d8c918e9085c564caf3271e0a4e3ae628cb4b3eab448cac27bf", 0xc6}]) [ 1139.198742][ T2772] BTRFS error (device loop4): superblock checksum mismatch [ 1139.215614][ T2772] BTRFS error (device loop4): open_ctree failed 03:36:00 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f00008a7000)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000000070502ff0080fffdffff2e0a0000000c000100030000007d0a00010c000500000022ff02f10000"], 0x2c}}, 0x0) [ 1139.478282][ T2791] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 1139.551722][ T2747] 9pnet: p9_fd_create_tcp (2747): problem connecting socket to 127.0.0.1 [ 1139.551731][ T2753] 9pnet: p9_fd_create_tcp (2753): problem connecting socket to 127.0.0.1 03:36:00 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sigaltstack(&(0x7f0000ff9000/0x4000)=nil, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x40) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000600)={0x9, 0x4, [], {0x0, @reserved}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$netlink(r0, 0x0, 0x0) 03:36:00 executing program 5: getpid() recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') preadv(r0, &(0x7f00000017c0), 0x10000000000001f7, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:36:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000180)=@fragment, 0x8) 03:36:00 executing program 2: syz_open_dev$loop(0x0, 0x4, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) r0 = syz_open_dev$media(0x0, 0x0, 0x0) io_cancel(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x5, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, 0x0) write$P9_RGETLOCK(r0, &(0x7f0000000080)={0x20, 0x37, 0x2, {0x1, 0x1, 0x6, 0x0, 0x2, '),'}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f00000001c0)) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r4, r3) io_setup(0x8, &(0x7f0000000140)=0x0) io_submit(r5, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x2, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000640)="41b2af0fc5a66d7eff82c7a4f704860a215943e94a3bf6793069cc53f592b7d1dd3506892ed212993e02ed337c1a6d78d35f30042e659ed39a9fbbe4f5d54e9a934380b3e8cb3350b7c17ac7c7563c234c2b3692ab17d58e9b29f40e20b0a8ec7c19830aef44d89795ffa7944f46dd1bc8ebc31b76bb5dc5a3efc587cbd8a8fae8f71f4d40c08b8cc71efec69cb51c2b286b0ea0df85679460d54dbc15ee1216fa45f4b5c8a1c10f5e5d07128d8c918e9085c564caf3271e0a4e3ae628cb4b3eab448cac27bf", 0xc6}]) 03:36:00 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="071f080000000000972e00c6fe76cf075768acd251e36def2300020000", 0x1d) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, &(0x7f0000000000)) 03:36:00 executing program 1: r0 = perf_event_open(&(0x7f0000000300)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8090, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) mmap(&(0x7f000094f000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0x100000073) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) 03:36:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(0x0, 0x0, 0x40000000000, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 03:36:01 executing program 2: syz_open_dev$loop(0x0, 0x4, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) r0 = syz_open_dev$media(0x0, 0x0, 0x0) io_cancel(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x5, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, 0x0) write$P9_RGETLOCK(r0, &(0x7f0000000080)={0x20, 0x37, 0x2, {0x1, 0x1, 0x6, 0x0, 0x2, '),'}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f00000001c0)) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r4, r3) io_setup(0x8, &(0x7f0000000140)=0x0) io_submit(r5, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x2, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000640)="41b2af0fc5a66d7eff82c7a4f704860a215943e94a3bf6793069cc53f592b7d1dd3506892ed212993e02ed337c1a6d78d35f30042e659ed39a9fbbe4f5d54e9a934380b3e8cb3350b7c17ac7c7563c234c2b3692ab17d58e9b29f40e20b0a8ec7c19830aef44d89795ffa7944f46dd1bc8ebc31b76bb5dc5a3efc587cbd8a8fae8f71f4d40c08b8cc71efec69cb51c2b286b0ea0df85679460d54dbc15ee1216fa45f4b5c8a1c10f5e5d07128d8c918e9085c564caf3271e0a4e3ae628cb4b3eab448cac27bf", 0xc6}]) 03:36:01 executing program 4: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x100, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000040)) 03:36:01 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x7) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, 0x0) 03:36:01 executing program 4: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x100, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000040)) 03:36:01 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sigaltstack(&(0x7f0000ff9000/0x4000)=nil, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x40) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000600)={0x9, 0x4, [], {0x0, @reserved}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$netlink(r0, 0x0, 0x0) 03:36:01 executing program 2: syz_open_dev$loop(0x0, 0x4, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) r0 = syz_open_dev$media(0x0, 0x0, 0x0) io_cancel(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x5, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, 0x0) write$P9_RGETLOCK(r0, &(0x7f0000000080)={0x20, 0x37, 0x2, {0x1, 0x1, 0x6, 0x0, 0x2, '),'}}, 0x20) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r2, 0x40045532, &(0x7f00000001c0)) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000000)=0xffffffffffffffff) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r4, r3) io_setup(0x8, &(0x7f0000000140)=0x0) io_submit(r5, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x2, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000640)="41b2af0fc5a66d7eff82c7a4f704860a215943e94a3bf6793069cc53f592b7d1dd3506892ed212993e02ed337c1a6d78d35f30042e659ed39a9fbbe4f5d54e9a934380b3e8cb3350b7c17ac7c7563c234c2b3692ab17d58e9b29f40e20b0a8ec7c19830aef44d89795ffa7944f46dd1bc8ebc31b76bb5dc5a3efc587cbd8a8fae8f71f4d40c08b8cc71efec69cb51c2b286b0ea0df85679460d54dbc15ee1216fa45f4b5c8a1c10f5e5d07128d8c918e9085c564caf3271e0a4e3ae628cb4b3eab448cac27bf", 0xc6}]) [ 1140.217165][ T2824] sp0: Synchronizing with TNC 03:36:01 executing program 4: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x100, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000040)) [ 1140.270636][ T2824] sp1: Synchronizing with TNC 03:36:01 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000240)) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000200)={0x18, 0x0, {0x0, @broadcast, 'ip6_vti0\x00'}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$media(&(0x7f0000000300)='/dev/media#\x00', 0x5, 0x42c080) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000340)={0x3f3e, 0x1, 0xffffffff, 0x7, 0x9}, 0xc) connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0xfffffffffffffffd) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) getgid() r3 = accept(r1, 0x0, 0x0) sendmsg$rds(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000000c0)=""/250, 0xfa}, {0x0}], 0x2}, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mISDNtimer\x00', 0x80000, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3ff, 0x2) 03:36:01 executing program 2: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") setxattr$security_ima(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000240)=@v2={0x0, 0x0, 0x0, 0x0, 0x3b, "d655c78c47a8449e1dac0cdd9c46786a22f3f3aff449bc303f94e391ced3484fc511fe30162069fac13f954a12062ac9adaffa547cc865ea9fa14e"}, 0x45, 0x0) lremovexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='security.ima\x00') 03:36:01 executing program 4: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x100, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000040)) 03:36:02 executing program 1: r0 = syz_open_dev$media(0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000025c0)=0x204, 0x4) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x3, 0x7) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r4, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x9, 0x5, 0x4}, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) ioctl$SIOCAX25GETINFOOLD(0xffffffffffffffff, 0x89e9, 0x0) close(r3) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000300), &(0x7f0000000380)=0xb) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:36:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 03:36:02 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sigaltstack(&(0x7f0000ff9000/0x4000)=nil, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x40) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000600)={0x9, 0x4, [], {0x0, @reserved}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$netlink(r0, 0x0, 0x0) 03:36:02 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) getsockname(r0, 0x0, 0x0) 03:36:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000f9ff00000280000085000000ffffffe495"], 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="ba58d6fcaccb7ffce16e1bcfe23b", 0x0, 0x319}, 0x28) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) 03:36:02 executing program 4: setrlimit(0x2, &(0x7f0000000040)={0x2, 0x4000000007}) mprotect(&(0x7f00001bc000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f00001ba000/0x4000)=nil, 0x4000, 0xe) 03:36:02 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000240)) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000200)={0x18, 0x0, {0x0, @broadcast, 'ip6_vti0\x00'}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$media(&(0x7f0000000300)='/dev/media#\x00', 0x5, 0x42c080) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000340)={0x3f3e, 0x1, 0xffffffff, 0x7, 0x9}, 0xc) connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0xfffffffffffffffd) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) getgid() r3 = accept(r1, 0x0, 0x0) sendmsg$rds(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000000c0)=""/250, 0xfa}, {0x0}], 0x2}, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mISDNtimer\x00', 0x80000, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3ff, 0x2) 03:36:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000f9ff00000280000085000000ffffffe495"], 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="ba58d6fcaccb7ffce16e1bcfe23b", 0x0, 0x319}, 0x28) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) 03:36:02 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sigaltstack(&(0x7f0000ff9000/0x4000)=nil, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x40) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000600)={0x9, 0x4, [], {0x0, @reserved}}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x33}, 0x0, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}}, 0xe8) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) bind$netlink(r0, 0x0, 0x0) [ 1141.435468][ T2887] mmap: syz-executor.4 (2887): VmData 18411520 exceed data ulimit 2. Update limits or use boot option ignore_rlimit_data. 03:36:02 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffbfffffffffffc) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000000)={{0x2, 0x4e22, @broadcast}, {0x0, @dev={[], 0x1b}}, 0x0, {0x2, 0x0, @multicast1}, 'bridge_slave_0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigpending(&(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000140)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0xf4010000, 0x0, 0x51}, 0x98) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x8, 0x10080) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) [ 1141.573336][ C0] net_ratelimit: 22 callbacks suppressed [ 1141.573358][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1141.584921][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1141.653311][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1141.659153][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:36:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000f9ff00000280000085000000ffffffe495"], 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="ba58d6fcaccb7ffce16e1bcfe23b", 0x0, 0x319}, 0x28) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) 03:36:03 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000240)) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000200)={0x18, 0x0, {0x0, @broadcast, 'ip6_vti0\x00'}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$media(&(0x7f0000000300)='/dev/media#\x00', 0x5, 0x42c080) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000340)={0x3f3e, 0x1, 0xffffffff, 0x7, 0x9}, 0xc) connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0xfffffffffffffffd) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) getgid() r3 = accept(r1, 0x0, 0x0) sendmsg$rds(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000000c0)=""/250, 0xfa}, {0x0}], 0x2}, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mISDNtimer\x00', 0x80000, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3ff, 0x2) 03:36:03 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xc, &(0x7f0000000180)=0x80000000, 0x4) 03:36:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 03:36:03 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @dev}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000080)={0x1}, 0x8) sendto$inet6(r0, 0x0, 0x1100, 0x24000080, 0x0, 0x0) 03:36:03 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f0000000240)}}], 0x0, 0x0, 0x0}) 03:36:03 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffbfffffffffffc) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000000)={{0x2, 0x4e22, @broadcast}, {0x0, @dev={[], 0x1b}}, 0x0, {0x2, 0x0, @multicast1}, 'bridge_slave_0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigpending(&(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000140)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0xf4010000, 0x0, 0x51}, 0x98) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x8, 0x10080) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 03:36:03 executing program 3: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000500)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000280)='./file0/file1/file0\x00') 03:36:03 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x800000008, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x43}]}, &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\a\x00\x00\x00\x00\x00\x00\x00\t.\xc3\t\xa4\xd5\x99\x02_2\x01\x81\xeb\xecxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x4, 0x3c9, &(0x7f00001a7f05)=""/251}, 0x48) 03:36:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000f9ff00000280000085000000ffffffe495"], 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="ba58d6fcaccb7ffce16e1bcfe23b", 0x0, 0x319}, 0x28) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, 0x0) 03:36:03 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f00000001c0)={0x18, 0x0, {0x100003, @local, 'ip6_vti0\x00'}}, 0x1e) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000240)) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000200)={0x18, 0x0, {0x0, @broadcast, 'ip6_vti0\x00'}}) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$media(&(0x7f0000000300)='/dev/media#\x00', 0x5, 0x42c080) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000340)={0x3f3e, 0x1, 0xffffffff, 0x7, 0x9}, 0xc) connect$bt_rfcomm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x11, 0x3, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0xfffffffffffffffd) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) getgid() r3 = accept(r1, 0x0, 0x0) sendmsg$rds(r3, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000000c0)=""/250, 0xfa}, {0x0}], 0x2}, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000380)='/dev/mISDNtimer\x00', 0x80000, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x1) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3ff, 0x2) 03:36:03 executing program 1: r0 = socket(0x1e, 0x4, 0x0) syz_genetlink_get_family_id$tipc(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc}, 0x10) 03:36:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000100)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/159}, {&(0x7f00000013c0)=""/4096}], 0x120, 0x0) close(0xffffffffffffffff) [ 1142.749496][ T2935] overlayfs: filesystem on './file0' not supported as upperdir [ 1142.772697][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1142.778519][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1142.784430][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1142.790203][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:36:04 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x9, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000100)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) rt_sigprocmask(0x0, &(0x7f0000000080)={0x3}, 0x0, 0x8) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x307, {0x100, 0x0, 0x0, 0x0, 0x6}}, 0xe) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) [ 1142.852643][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1142.858526][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:36:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffbfffffffffffc) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000000)={{0x2, 0x4e22, @broadcast}, {0x0, @dev={[], 0x1b}}, 0x0, {0x2, 0x0, @multicast1}, 'bridge_slave_0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigpending(&(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000140)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0xf4010000, 0x0, 0x51}, 0x98) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x8, 0x10080) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 03:36:04 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 03:36:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x4) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) write$FUSE_OPEN(0xffffffffffffffff, &(0x7f0000000000)={0x20, 0x0, 0x8}, 0x20) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:36:04 executing program 5: capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000000000)) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x0, 0x0, @scatter={0x0, 0x200000, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 03:36:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000100)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/159}, {&(0x7f00000013c0)=""/4096}], 0x120, 0x0) close(0xffffffffffffffff) 03:36:04 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x9, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000100)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) rt_sigprocmask(0x0, &(0x7f0000000080)={0x3}, 0x0, 0x8) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x307, {0x100, 0x0, 0x0, 0x0, 0x6}}, 0xe) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) 03:36:04 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x9, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000100)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) rt_sigprocmask(0x0, &(0x7f0000000080)={0x3}, 0x0, 0x8) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x307, {0x100, 0x0, 0x0, 0x0, 0x6}}, 0xe) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) 03:36:04 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x9, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000100)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) rt_sigprocmask(0x0, &(0x7f0000000080)={0x3}, 0x0, 0x8) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x307, {0x100, 0x0, 0x0, 0x0, 0x6}}, 0xe) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) 03:36:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000100)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/159}, {&(0x7f00000013c0)=""/4096}], 0x120, 0x0) close(0xffffffffffffffff) 03:36:04 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffbfffffffffffc) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) ioctl$sock_inet_SIOCGARP(r2, 0x8954, &(0x7f0000000000)={{0x2, 0x4e22, @broadcast}, {0x0, @dev={[], 0x1b}}, 0x0, {0x2, 0x0, @multicast1}, 'bridge_slave_0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigpending(&(0x7f0000000080), 0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f0000000140)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0xf4010000, 0x0, 0x51}, 0x98) syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x8, 0x10080) mremap(&(0x7f00003fb000/0x400000)=nil, 0x400000, 0x800000, 0x3, &(0x7f00007fb000/0x800000)=nil) 03:36:04 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x9, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000100)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) rt_sigprocmask(0x0, &(0x7f0000000080)={0x3}, 0x0, 0x8) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x307, {0x100, 0x0, 0x0, 0x0, 0x6}}, 0xe) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) 03:36:04 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000100)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/159}, {&(0x7f00000013c0)=""/4096}], 0x120, 0x0) close(0xffffffffffffffff) 03:36:04 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x9, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000100)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) rt_sigprocmask(0x0, &(0x7f0000000080)={0x3}, 0x0, 0x8) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x307, {0x100, 0x0, 0x0, 0x0, 0x6}}, 0xe) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) 03:36:05 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x35}, 0xb) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$rds(r0, &(0x7f0000000040)={&(0x7f0000000300)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1a}}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)=""/112, 0xfea1}], 0x1, &(0x7f00000008c0)=[@mask_fadd={0x58, 0x84, 0x8, {{}, &(0x7f0000000540), &(0x7f0000000580)}}], 0x58}, 0x0) 03:36:05 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) gettid() timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r1, 0x0) tkill(r1, 0x14) bind$inet(0xffffffffffffffff, &(0x7f0000003980)={0x2, 0x0, @multicast1}, 0x10) fcntl$addseals(r0, 0x409, 0x4) 03:36:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x5, 0x0) socket$kcm(0x2, 0x2000000000000001, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 03:36:05 executing program 3: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) connect$inet(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vcsa(0x0, 0x9, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000100)) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0x7) rt_sigprocmask(0x0, &(0x7f0000000080)={0x3}, 0x0, 0x8) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r1, &(0x7f0000000000)={0x1f, 0x307, {0x100, 0x0, 0x0, 0x0, 0x6}}, 0xe) write$FUSE_WRITE(0xffffffffffffffff, 0x0, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_LOG_STATUS(r2, 0x5646, 0x0) 03:36:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f0800000004b06c0200883795c0c54c1960dbb7d553b4a421556b3d5df5000000000000000000", 0x39}], 0x1}, 0x0) 03:36:05 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = creat(&(0x7f0000000880)='./file0/f.le.\x00', 0x0) r1 = open(&(0x7f0000000080)='.//ile0\x00', 0x0, 0x11) stat(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000500)) getsockname$llc(0xffffffffffffffff, 0x0, &(0x7f0000000480)) fstat(r0, &(0x7f0000000a80)) stat(0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_DQBUF(r1, 0xc0585611, &(0x7f00000006c0)={0x0, 0xa, 0x4, 0x400000, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, "0f603f3e"}, 0x0, 0x0, @fd, 0x4}) ioctl$IMHOLD_L1(0xffffffffffffffff, 0x80044948, 0x0) 03:36:05 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) mmap$binder(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) 03:36:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f0800000004b06c0200883795c0c54c1960dbb7d553b4a421556b3d5df5000000000000000000", 0x39}], 0x1}, 0x0) 03:36:05 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) r3 = socket(0x11, 0x80002, 0x0) bind$packet(r3, &(0x7f0000000480)={0x11, 0x15, r2, 0x1, 0x0, 0x6, @local}, 0x14) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @multicast2}, @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:36:05 executing program 2: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x3fc}, 0xfe1e) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000000)=@req={0x3fc, 0x0, 0x0, 0xfffffffffffffff7}, 0x10) write$binfmt_misc(r1, 0x0, 0x0) close(r0) 03:36:05 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setresuid(0x0, 0xee01, 0x0) r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) setresuid(0x0, 0x0, 0x0) keyctl$setperm(0x5, r0, 0x1000002192c04) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r1) setgroups(0x1, &(0x7f00000000c0)=[0x0]) add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, r0) 03:36:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f0800000004b06c0200883795c0c54c1960dbb7d553b4a421556b3d5df5000000000000000000", 0x39}], 0x1}, 0x0) 03:36:06 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="0f6ffcf8d28e630bddb9bffd"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:36:06 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmdt(0x0) 03:36:06 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000000)="39000000140081ac00002c000500018701546f0800000004b06c0200883795c0c54c1960dbb7d553b4a421556b3d5df5000000000000000000", 0x39}], 0x1}, 0x0) 03:36:06 executing program 3: getsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000600), 0x0) r1 = openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bind$inet(r1, &(0x7f0000000540)={0x2, 0x4e24, @multicast2}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f00000001c0)={0x0, 0x8}, 0x8) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') fchdir(r2) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:36:06 executing program 5: r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e22, @broadcast}}}, &(0x7f0000000000)=0x84) 03:36:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e20, @dev}, 0x10) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0f01"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 03:36:06 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace(0x4207, r1) tgkill(r1, r1, 0x2c) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x4013}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000100)={0x0}) 03:36:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r1, 0x800000c0045009, 0x0) 03:36:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) capset(&(0x7f0000000280)={0x20071026}, &(0x7f00000002c0)) 03:36:06 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) clock_gettime(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getpgid(0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x80, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000440), 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) socket(0x0, 0x0, 0x0) 03:36:06 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, 0x0) 03:36:06 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) clone(0x802102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000200)=""/5, 0x5}], 0x1, 0x0) 03:36:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x2a) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="6332e709d7be923523d9c4390040d5d497dc2a57d1fe6ec1c9814ad868c1efc20ab57b42ab2834720000a54073731d8cd0d509f969efd70d6a"], 0x39) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 1145.257977][ T3070] capability: warning: `syz-executor.1' uses deprecated v2 capabilities in a way that may be insecure 03:36:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r1, 0x800000c0045009, 0x0) 03:36:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f00000001c0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000012000/0x2000)=nil, &(0x7f000000f000/0x4000)=nil, 0x2000}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 03:36:06 executing program 1: mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000004780)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fdatasync(r0) 03:36:06 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000180)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 03:36:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r1, 0x800000c0045009, 0x0) 03:36:06 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000240)='./file0\x00', 0x0) 03:36:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) r2 = dup3(r1, r0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x85) 03:36:06 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f0000000580)="a3", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="858a030000000000000057ac008f6f4a34328382df63dd7b58d057d483c391c600c6fa0688a69404ba734e91f3813956096a5fb2bf3f35be7ac08e0cd1d437da199701800000000000000000e89bcbdd527b6d20602febf51a3c8ed0b2e8ebb8fc704b21856fa38356434b0ca7a8a800dd567d6e75250490540dab3c98836e20dd8181a2610ad4df0000000000000000000038ce7a2d53c877400f18d3358dcbf721d17ee438a394598d9469d8490509fa933b0ad5fafb7954d9a87ad8a42b5b507288f2d2d81676d4"], 0xc9) sendto$inet(r0, &(0x7f0000000740)="df7a8d1b13fa1153baddf8b7da757b0dc8d96f032e10c79ee7f6ef297406b31e48bd2d9b0c0f5c59953c2ca8d7816b1933c6fefc7e1cd0ea106f78b5fb90a375bff348562274cb76035c2ca44b57861c7571a660ebc2678f2de889c5c9ee352e366fef307cfc9a0392b08a6481a9e1a2b1dfba3bf5a39c67076acb62dbfb2d1f139e03c9ddfcfbb4c4cce9ae78865976141e6161b4df506e34addc1a0714eaf67d26c438d66773a42e4747153e39e858d52c252dacdea8506b0f7d8aedab4a7bebb06f89d717c6a2b0abafe7bd5b0673da5a25c82f1bae0998ee1a295800996a45241983932d0bbd95ef6bedcd0f74cc2689db79fc173f8198451bfca4e73e4781221065b3bcff6f5f787f6ddd2bbf7eef4fd3259b05e87b1011f2fe05cfba5da6b0f822080433409f938df3e89637f86722f21840df1a5f516e40b7f8c5b9a486f3b1eaa1a0106f97e62248ef4fde8cc91f1366a846c3b8d85cc51a95b36c837a8677079da77fbd405598a24eda1e2a8768fc6c649f4bec5f508b6076a0ca59fa2bc9510def6fe7804fa891d36bd2ca9065e9bf51e53a8afee27e86d97050974d94fd5b83e4ded97953f0966d79781bda4fb9ddce04651d4fd14d58c184081ca19b87bd5822eb519ca1635b5e97aef7c25fa17f2bb15679e33d7a756598d40a5700ea7ed6231a7b8246dfb37b37c6136fd60d468b8c4d2762fcabf0b74e0033e69ff2f64ec413d2f1a15ad45d166e8c7103b7708ffc0f7c989eb6c25358feff17471486b00e12830fd0f7e6d027808f3fce4dfe44a9a9e06b4a84d5e4575c4862efd5a5a10fc2221164a3ee3db7c76d92f8207768a557d23eb917ac59147cbd07563b2660ba9a7e95d0139f8f10c0355dea89a618654566b32f7f0da902f967e8b504087cc0f8e0288cf963e2e1bafe20f827486dddd98057f904a32177e191bdd8bb0c331d5c3de72a87cade5f8cc509f4f4e91deb730bc10219ba84a2a8ae8bca8035da6907f7ceda36ce02a326b9fc5bd77d60f589f3bc68033e578cb6c196c5297e7b27651b46cdecf2fcbe0ee928b8629f5e26914f295f60e7c8652e4339340ee3adfe317c6fa912e929a0a7d6600bcd9ed5f6147ee26e2b4780a792593ce18c8f87559fc0274785731d5accd85a3c1043a15e18aa7129f950e66a91c6b45951e02b50663ecfd73751e5582382d13e69d2bde0915b682c6048d57bfe4890a25ed3336714b64bbd27f5d719936b0ddb7cd62b4935aa8f87cf196f496e67e6550c92ab4ba5e5fa402267a3e1fb6189dacd45e89720494f6944f2289b8540f2d2e3c9e97e4d71667942f4f30003aab1d03f6352f6d5349aac441c7d4be3074c81fc91909ca9b3615aa56894a3cd30178837e5d525556747593aad6eccfd21e5c5ade46cd0dd0a4265f9d7aa2957462680847a64b6b163fdc554c6634c565c7e2613e6833cff0ba31af5ce6041810993", 0x411, 0x0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000001b80)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfc) [ 1145.673423][ T3115] overlayfs: filesystem on './file0' not supported as upperdir 03:36:07 executing program 5: io_setup(0x1000, &(0x7f0000000240)=0x0) r1 = eventfd(0x0) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) r2 = dup(r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 03:36:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000001c0)={0x18, 0x0, {0x4, @dev, 'lo\x00'}}, 0x1e) ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000080)) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, 0x0) 03:36:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r1, 0x800000c0045009, 0x0) 03:36:07 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffe}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000021ff8)={0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) writev(r2, &(0x7f000000b000)=[{&(0x7f0000000900)="2c267e242481c30c666d158d944f0d89d0b24c02deea35d5f9772f8dae1cd41446cde1fbd5331eb8ac66abe4cabe3d1e42910a6a97054224ebde680a2c55c3eb196263fff503b9a83e01ec52bb3c81701958db38fabf47e496cf0a9432989b7476733757dc1062021181e6ac4f656a7b7be4ace9d1d96fb9cf322fa1916986285493f75f8787212d0ccbd4c3fa28fda762b68fbf35cc9e334d419c9d9fab1b0a5fd501e429ef862e908502d31b442c89b8e728b222c35ef07ca658b0c27225da062e195f29b1b2ba25d4099813dcd2f613c79466432b6c36fa3b2e7822aa51458c4d5cea7abdba8e2f129daff37f27487e477a5c5ba0f214c0ba7845e146c8689525e3a923e35014b6ddb9b85e35ad7590abaf67c006c4b1feb963d9eab378801359edbcdd410f113b39b11b5f7a420a080df102df54c169372e0e045640619942d91cf198369418515e484ee19965db6d9ff1b76561d8b60216afb1b236d5b56cbdfe8a3166c2cb934bd953d7d4989e899f871d0892bc9cebe86962d59c65881ebf3edcfb52180ff5795d2b5abefefbc7d122a20dc5b32465da34213a0c623d7a9b2f3339fa63ddc561a45ac96a68c4f21423a05ea2235b6df0ed19019d07d9b0e9cda2f58709b494a46ebe64722863d67a846b829f3e3ce4c9f0ce5a37d93fb1d07a420bde1c678ab8ad546c5a1f295baf92e543c4da2dabfb9b15b89e2875c06d7dfcb2994a68fefbdfa07991c1222403482c5b09928214d1d4369ab817d15838538566a0176cc12e72bdac913ea4ad953e4ef72e338c9abb074e45389d831d29eb0c2147ccf7cd404c7c71e77fa9e44a1dcd4bb893211bfd9a2c25214e9202ebc41539286e3f2417a34400bfbfa668b8c0dc75673bbb42c3d88870ace8de6b6b9b5d51264a690396cc342012bba7192829d5e13d7603ed5e8489811daa185e2ad017a5c66df226512cef5ebc7d7b9556d42af281defaadcff6d6f264dedf38296b00b0c1a534dc539c3c7f6b1882be5cd29f7c6541d9efc446ff28ea9a7cf7ced90bf2a3cd4b08b98debf758df3bf64090af0fa91269a827554d0088657fff5d93bcd5c9f26ab2aeceb659e427e05ce81fa0bf118ac60e56aca2129e6bc8513e6372de0ec4b7561d69e7126daf2a98ed9f96b0d3d611a8f0a69468fed7caf20980b80cb2bd629e376aface6d811ccb978546ac135b8cb146862ec33a4f14cec8f340b09bcc49fed4b5f861d397de3eb153841bfeda6cf888f18df77940d2ff55759d1e7c7976f5f4de3803b3b6f1eb5d6e7bb1138f8198119a237482acfe813619c20b7656c76236ad6622e6f917b74fe13679677d7008d603de253372e93994e10590b44c71468723cdaa8a0368c04773926d5d901d46b671d9e5f43641fd39cef19474375343f0a0be26e5614d1970e7d1a6c832253cdbc7f859955ad62674c9a97287d7cb4d811fb7694d579322fdf25ff824605aa0c8cf5460bed8ca2a8b1527c9c51f6b7c1510143b024142d6a9e5111c4aa98147ecc41febad60fb132faa75cc3b61ca564412ef8827327a85efc37ce6df695d394c2399f6e24189499438e0f77b598891e6ffbf855d741817f44f4a431ee11ad30a50b178a5ef179137ba24336b9b9a6a459d1f361eed683da46ccc51081331fc422471a136d31ad7698fc27d0a5cc2e48d0c0af32c91489e03647a9e9771c4fc62d3877079fb037b641a5fe7bda287ab1a049ee5dadaa2f971566dcb708e351e0f937993696fd31a1d999addd76127e97ad684948d0d5e6bd21b0b68986295d7cc71be683e448b1e3016ae3e98ee83512c398376d52bb0ab50674a886d34a7c123748396498581ff22aeb3052d01b3f6dc473b6ce27d359dc9077a68a2abe4b17c3dfbaeb7f90f1be19c89de6753620f33e31cfe27a3a18b333e548836e38920a3459b5407268f0d41c58c6f5091172cf0a508c1d73f2aa9e953496bbe8ab03533f89e2b4dafb37b89d25e0efb75ff84bb1cbd60a33dddb627e88efb44138b40ffad9bf70111f7e8f6b01e89b3a74b9cf71191f2bd026ba01e16a21d0abca2491351475a08fb593cdfb40047e896457af4c3a61f4fb7ad570080193954b62a7839127ddfb8d93018978fd3e642658213571246308454cc4195cead295f6f72c10def5930930e44782edd916230fa99423def58b780f6936d55aa952baea0c58630526df65f0ebf91b0e01c97f9b3bbca8fceff87ffc945c972b51b11954a476967b52c2fa3247a6e6bba9cef9ff5efd4523a64e11005128003b34251108d8f3dd62c3db158fec915546db1db5f02300b3f5baee8ac9a498d00a1bdb1cfab31dffc4506c799a269b6be101c0e8a2907c5464733a06d8f855c619befa9b77cbceb48da086ac09e510c609cb5c95d0f69d053ef35c32a7b96e6ab7297fdf211e198bf90087433474bffd8fe0d1e77934d8848d2d6a5ce21124e8c2af71e28026950caa63c4b0f6648e41225b384d5ee21701659489ccc2017d48463e0dcf97361c538c8b47d049f2b36d0584cb786215400ce18e285c1dbad47dda87c28d3f5f7fb15c560d1b28472f787b4915300364ce08acf3747d0020731e81dac8c252ed2cb5e096268f6d3e363620d92f272bd34c240eb4aba3d01904d897723345234ccbc4610a3a2259b244397b1f1db4094dfbc765aa212dd09a9197c9ff51e0f07c3547fc3f2f86e2d996b3bb4a6ebb282a10e2738b1e945ce3f33bd3979bfba6edb830341f6eb997cab67f9eb7a57fc1a8bf0ce64d9300e622a144bb424ecace72f0d16ef443de9ba89d8ac38e2e88f0a3ed23ec851dfb45df034532169cca827c88081e7fd2354819d9c20ea39f2932787246d8806e089ec1c70cca020f898602f211eb2504aadc3090d85a3ec9483451058d6caba71806f3f494d73755774296a67511572eb801b188dfbddf065be196febbfbce5af895fdc7278a1ede609f9af86f208aeef20001a9fc0bc04eef1a84229dda539e6bcc31479321036f162e57f41b1991cddc88179be2b1ada532eeb770aab9ec82399b80879ed2cdda07b061b0f0ee35002209d9b5afa9836efd2cad153227f4af2c1b4f60c21573c35faec09c45467540dbf3cabee5a2918b4a9432ebe672306f1acfdae1a3c3d8be48c58621c0b16312ed7777f81fc9084eeddf26e68c5d7f0d83347897a69e9b293c1e93b17448fea811d13af456f30f4f5b0ed0ec8b5876ab2dadeff381093f16f5013cfff76f2c77fdaf87d0d82697e070131831054757ac544aab5801ca1dfa665ded0e9de3eedb8cb6f17485a92eceac1b2b33927bb410c9369a4b7f3fc186828693a92fc07f415d244ee972b25c2d42b69c5e03ba57a1037d59f02a098fe62536e7af192233d86e8fae5d17fc7bd13b6e54d59941edeb975c85667a743ad4825e68cd00c707ba80bb0902d7f7fabd7c8e6a6df462b210528ce8378a6255c1da496305c84e741c5a5175919b44938f969bc2cf50e0ea4569e0dc523118e7b4d8165893f610a49a215f0945f0c177d1fc348cfbdbe1ef33bd8f1f41f761b9f8bb23172315bbd451d729f823d20559b3535d01173c92dd4b8c151d1e9be2eeb62d133f050bea021e75e41d8eab2678f0bfb40e134d8a60029a9ee4332316e1665360f477255915f344e1c56ed620431e9e4371c983abef24ba800c239b2273b14b342339a374a0fc3aa30898ef0e69040ef4dd6c298dc90e03242118eb824bd23044c87783085533e19445b43ef341c4372ac4545ac03a3adc532475947d63ce67e1e3763cc7f9ff9d103c434570c02c7b811a648b5bbfadb847d29311b6589a4864fd8af8e354b221fc78e407c95160460cd74d5966ba405da1f496950a6ac1e79ab6dc511ecd726d05d38e0fd65bd66c58c11280785a302aa00ddc03cad93833bd357b30ec13e91d632ec8d5565ed6a5d0554f17b4d7efa147fc0d9035d8a96213e9465da1d3b94f56d3f2b12d7e394a5fff25873c591cee50c5c14273d4b1c645d5ded4a0ad5d8a1296f40c2b65cf457a5780c4a4569927bd896c0d71498f2d31f4f61282540105f5845326aa61ceb01c10be922a2fdeaa1a9689922e255e053be4c4cb45f5c6bd8af4f93f8362bbf54875ddbedab4b97e8cec478e4ceda8121439523839abb6e1cdc7ba2eb34c1fe9931585e1e0d8c326276bab83170752a30f2a3a250aad1cc1f72155457dd3ab40e4c2f1454084683f8bfc92fd87af76a73dbbf06f8d4f18dffbff0c8310eb96303c60401e4efa54def27c4e023aaaee24d525d1d98822eaeb33bbc5d40e8845b6ae1b29ede30c6675f5aab93b2b28391008e62d9d9bd1224116d9874233c57f3524e34a2737f74daa1bb9051ba8e2564fa2f3e5462bd67a7be796c682ba55d0f64331b1c0c3e45aec99548e65b61420f25cad6d3ca9063db31fe16b7157249cdc2e592188efddd0161314104615509ee1ff212c98a448a5b2b7a931b01b1ed502135f324f3b58906591ce181010e9c62ce9cfab26d4ddf9ab43fbc277d15b8bfb93edbcfe276e5646fde162dc926487440cdcc90a92ed03662ec04ab9ec1b1647707b43c7fe18a030e3001cd7915013e0196c4609aa8475fc85302b963f4be6a16b8206b099c81b6bf4619389f6df538813a2ad08183e97750b35b1ced267166f4f39b13d9925db22bdc6dd7c3ca8d0aab439040d42952e62eee9a2728c9b7e45f7463f8447ec2ec435bd7e91bd05ad09ec013468f4ba54437da9b8db677f4eaf10c5746da05bf12359b3aa915be2999e2bce629dd4ad01ce0b6229e4b49cca0157abb5221488a785af2d71a149f096b0c564a6d36ca92d36ea15c54dc44eaafed114a858f1c126f68888eba594dcd52ae7f233e2ec88d2a2fc95da3385e02f30746a844f8d6e05b724aff933c15088cde099f04f4228745bdb51180d4e6114a364cb6ef32a71872dfcb86278df4a20423c354699cdb4c63b35dc4fa04a5d456c65e72b20be53f302e8ccbe6873e76e0adabdca405c50a9d933be9046c616c8e6ada9949de0db64bed0b6c8c8d6250a2589896ebbdaa5e7d254130c4b5fd7e9b57da57e5491aad4aa5f81d73a220332abf1e7a5ccc360bc1ac342408f8d5335e97a3c2f8353498946bfbbabf386459423c4e2af0c908b4724df1f97b92991a937a955ac45aa3b130768c49d550cfdacd2e7753950f336d9ce6f367fb566c935bb940f9beedaaa4348efff216e201a9e5de2c65ac43f6c3d0e8d5f0b960b65c3285c99b2f7d747657bf77afb9057a6d28bede1a72d45cb2125a8902150685e3ca7171212e01d224e876feb972d5ded4313c48164034bc0244ec73e687d87b44c33a16e8471e25e1a58094dfc509a007a3f2c010dfffeb80f36febb448fc40fe301e897bbe1aeb2a7a7ca968b22bb5d5ad5b366a4377ae441937f2b60a4e3ec6c8a90dd415cc47ae6dad270eaadab63c7f321b3af28d9079759da8b18167608a4ae2e08a84f84eeccb08c56cc476ed0db598c174437c1eace848c717a7e5aaca4e35d861038326bae04ebac9bc451fa4c5d60bd52eeeac89e01e11b3719f07b33a4192709713d120b0f7bddd82cbb13c321ccd87880993eedb0e2a8ca88dd7ec9af1367240b20209f96c237e067889503fee6bf3787a4d90570de215fb02d11a82a379303bbb5ed40d0432a317b50ff1ef21bcdf57f894a6938ad35396b6bf8dc24287cea55c472b6bcd7a2e3fd4a6cdf3435e54170fac4f116fdd3817240c940fea9b0509b5e047f23e6f7ef05d04ccdd39bd8d70e1a130e72fdf6c1e", 0x1001}], 0x1) dup2(r0, r1) 03:36:07 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000240)='./file0\x00', 0x0) 03:36:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f0000000580)="a3", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="858a030000000000000057ac008f6f4a34328382df63dd7b58d057d483c391c600c6fa0688a69404ba734e91f3813956096a5fb2bf3f35be7ac08e0cd1d437da199701800000000000000000e89bcbdd527b6d20602febf51a3c8ed0b2e8ebb8fc704b21856fa38356434b0ca7a8a800dd567d6e75250490540dab3c98836e20dd8181a2610ad4df0000000000000000000038ce7a2d53c877400f18d3358dcbf721d17ee438a394598d9469d8490509fa933b0ad5fafb7954d9a87ad8a42b5b507288f2d2d81676d4"], 0xc9) sendto$inet(r0, &(0x7f0000000740)="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", 0x411, 0x0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000001b80)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfc) 03:36:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f0000000580)="a3", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="858a030000000000000057ac008f6f4a34328382df63dd7b58d057d483c391c600c6fa0688a69404ba734e91f3813956096a5fb2bf3f35be7ac08e0cd1d437da199701800000000000000000e89bcbdd527b6d20602febf51a3c8ed0b2e8ebb8fc704b21856fa38356434b0ca7a8a800dd567d6e75250490540dab3c98836e20dd8181a2610ad4df0000000000000000000038ce7a2d53c877400f18d3358dcbf721d17ee438a394598d9469d8490509fa933b0ad5fafb7954d9a87ad8a42b5b507288f2d2d81676d4"], 0xc9) sendto$inet(r0, &(0x7f0000000740)="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", 0x411, 0x0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000001b80)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfc) 03:36:07 executing program 1: socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newrule={0x28, 0x20, 0x1, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x4}, [@FRA_DST={0x8, 0x1, @local}]}, 0x28}}, 0x0) 03:36:07 executing program 4: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000d4b000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x5, [{{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @mcast1}}]}, 0x310) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000dbd000)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 03:36:07 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000240)='./file0\x00', 0x0) 03:36:07 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffe}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000021ff8)={0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) writev(r2, &(0x7f000000b000)=[{&(0x7f0000000900)="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", 0x1001}], 0x1) dup2(r0, r1) [ 1146.346433][ T3156] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1146.382540][ T3166] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 03:36:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x0) 03:36:07 executing program 5: r0 = socket$inet(0x2b, 0x801, 0x1) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10) 03:36:07 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000140)=0x1, 0x398) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f00000002c0)=0x3f7, 0x4) bind$inet6(r0, &(0x7f0000f65000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f000006ffe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000180)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) 03:36:07 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f0000000580)="a3", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="858a030000000000000057ac008f6f4a34328382df63dd7b58d057d483c391c600c6fa0688a69404ba734e91f3813956096a5fb2bf3f35be7ac08e0cd1d437da199701800000000000000000e89bcbdd527b6d20602febf51a3c8ed0b2e8ebb8fc704b21856fa38356434b0ca7a8a800dd567d6e75250490540dab3c98836e20dd8181a2610ad4df0000000000000000000038ce7a2d53c877400f18d3358dcbf721d17ee438a394598d9469d8490509fa933b0ad5fafb7954d9a87ad8a42b5b507288f2d2d81676d4"], 0xc9) sendto$inet(r0, &(0x7f0000000740)="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", 0x411, 0x0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000001b80)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0xfc) 03:36:07 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffe}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000021ff8)={0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) writev(r2, &(0x7f000000b000)=[{&(0x7f0000000900)="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", 0x1001}], 0x1) dup2(r0, r1) 03:36:07 executing program 3: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file1\x00', 0x0) renameat2(r1, &(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000240)='./file0\x00', 0x0) 03:36:07 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="d7ca"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:36:07 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) request_key(0x0, &(0x7f0000000380)={'syz'}, 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xffffffff, 0x28082) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x9) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) unshare(0x100) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x264000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f0000000080)={0x3, 0x6, 0x6, 0x3, 'syz0\x00', 0x8000}) creat(&(0x7f0000000140)='./file0\x00', 0x0) 03:36:07 executing program 0: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffe}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000021ff8)={0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) writev(r2, &(0x7f000000b000)=[{&(0x7f0000000900)="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", 0x1001}], 0x1) dup2(r0, r1) 03:36:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000340)='hfs\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:36:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x10001, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x18) 03:36:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x802, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x208000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x3f00000000000000, 0x80, &(0x7f0000000080)=@nat={'nat\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x19b, [0x20000680, 0x0, 0x0, 0x200006b0, 0x200006e0], 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x213) r2 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4) inotify_rm_watch(r1, r2) getsockname$ax25(r0, &(0x7f0000000080)={{}, [@netrom, @null, @null, @rose, @remote, @remote, @netrom, @null]}, &(0x7f0000000100)=0x48) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\xff'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\x80\x00\x03\x03\x00\xff', 0x4bfd}) [ 1146.938012][ T3211] device team0 left promiscuous mode [ 1146.943591][ C0] net_ratelimit: 18 callbacks suppressed [ 1146.943600][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1146.943834][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1146.945755][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1146.947014][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1146.995521][ T3211] device team_slave_0 left promiscuous mode [ 1147.011595][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1147.019861][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1147.023200][ T3211] device team_slave_1 left promiscuous mode [ 1147.101516][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1147.108444][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:36:08 executing program 1: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000540)='/proc/capi/capi20\x00', 0x0, 0x0) fanotify_init(0x0, 0x0) pipe(&(0x7f0000000180)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1200008912, &(0x7f00000001c0)="0adc1f123c12a41d88b070") pselect6(0x40, &(0x7f00000000c0)={0x3}, 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) 03:36:08 executing program 0: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000002c0)={0x0, 0x10, "aff626d1a032b3a3ed20d8c84bf4a78a"}, 0x0) 03:36:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x10001, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x18) 03:36:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x4b73) capget(0x0, &(0x7f0000000880)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) prctl$PR_GET_CHILD_SUBREAPER(0x25) stat(0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)='nfs\x00', 0x0, &(0x7f0000000000)) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0xb5) write$RDMA_USER_CM_CMD_CONNECT(r1, 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000380)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}], [], 0x42c}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='hybla\x00', 0x6) 03:36:08 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) request_key(0x0, &(0x7f0000000380)={'syz'}, 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xffffffff, 0x28082) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x9) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) unshare(0x100) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x264000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f0000000080)={0x3, 0x6, 0x6, 0x3, 'syz0\x00', 0x8000}) creat(&(0x7f0000000140)='./file0\x00', 0x0) 03:36:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket(0x15, 0x80005, 0x0) getsockopt(r1, 0x114, 0x1000000002715, 0x0, &(0x7f000033bffc)) 03:36:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x10001, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x18) [ 1147.456297][T16573] rpcbind: RPC call returned error 22 03:36:08 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) request_key(0x0, &(0x7f0000000380)={'syz'}, 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xffffffff, 0x28082) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x9) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) unshare(0x100) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x264000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f0000000080)={0x3, 0x6, 0x6, 0x3, 'syz0\x00', 0x8000}) creat(&(0x7f0000000140)='./file0\x00', 0x0) 03:36:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x4b73) capget(0x0, &(0x7f0000000880)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) prctl$PR_GET_CHILD_SUBREAPER(0x25) stat(0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)='nfs\x00', 0x0, &(0x7f0000000000)) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0xb5) write$RDMA_USER_CM_CMD_CONNECT(r1, 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000380)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}], [], 0x42c}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='hybla\x00', 0x6) 03:36:08 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x10001, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x18) 03:36:08 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x4b73) capget(0x0, &(0x7f0000000880)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) prctl$PR_GET_CHILD_SUBREAPER(0x25) stat(0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)='nfs\x00', 0x0, &(0x7f0000000000)) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0xb5) write$RDMA_USER_CM_CMD_CONNECT(r1, 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000380)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}], [], 0x42c}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='hybla\x00', 0x6) [ 1147.803370][ T3260] FS-Cache: Duplicate cookie detected [ 1147.809047][ T3260] FS-Cache: O-cookie c=00000000677bc609 [p=000000005c5c3e5c fl=222 nc=0 na=1] [ 1147.818400][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1147.818690][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1147.830678][ T3260] FS-Cache: O-cookie d=000000009bf227b3 n=00000000df532236 [ 1147.832318][ T8686] rpcbind: RPC call returned error 22 [ 1147.837998][ T3260] FS-Cache: O-key=[10] '02000200000002000000' [ 1147.849758][ T3260] FS-Cache: N-cookie c=000000004b00788a [p=000000005c5c3e5c fl=2 nc=0 na=1] [ 1147.858745][ T3260] FS-Cache: N-cookie d=000000009bf227b3 n=000000007913c036 [ 1147.866054][ T3260] FS-Cache: N-key=[10] '02000200000002000000' [ 1148.018699][ T3216] device team0 entered promiscuous mode [ 1148.033504][ T3216] device team_slave_0 entered promiscuous mode [ 1148.049358][ T3216] device team_slave_1 entered promiscuous mode [ 1148.069648][ T3216] 8021q: adding VLAN 0 to HW filter on device team0 [ 1148.183059][ T3258] device team0 left promiscuous mode [ 1148.188720][ T3258] device team_slave_0 left promiscuous mode [ 1148.195694][ T3258] device team_slave_1 left promiscuous mode [ 1148.290790][ T3257] device team0 entered promiscuous mode [ 1148.296675][ T3257] device team_slave_0 entered promiscuous mode [ 1148.313866][ T3257] device team_slave_1 entered promiscuous mode [ 1148.331665][ T3257] 8021q: adding VLAN 0 to HW filter on device team0 03:36:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x802, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x208000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x3f00000000000000, 0x80, &(0x7f0000000080)=@nat={'nat\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x19b, [0x20000680, 0x0, 0x0, 0x200006b0, 0x200006e0], 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x213) r2 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4) inotify_rm_watch(r1, r2) getsockname$ax25(r0, &(0x7f0000000080)={{}, [@netrom, @null, @null, @rose, @remote, @remote, @netrom, @null]}, &(0x7f0000000100)=0x48) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\xff'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\x80\x00\x03\x03\x00\xff', 0x4bfd}) 03:36:09 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) request_key(0x0, &(0x7f0000000380)={'syz'}, 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0xffffffff, 0x28082) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xae44, 0x9) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r2) unshare(0x100) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x264000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r3, 0x40405514, &(0x7f0000000080)={0x3, 0x6, 0x6, 0x3, 'syz0\x00', 0x8000}) creat(&(0x7f0000000140)='./file0\x00', 0x0) 03:36:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x4b73) capget(0x0, &(0x7f0000000880)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) prctl$PR_GET_CHILD_SUBREAPER(0x25) stat(0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)='nfs\x00', 0x0, &(0x7f0000000000)) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0xb5) write$RDMA_USER_CM_CMD_CONNECT(r1, 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000380)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}], [], 0x42c}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='hybla\x00', 0x6) 03:36:09 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x4b73) capget(0x0, &(0x7f0000000880)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) prctl$PR_GET_CHILD_SUBREAPER(0x25) stat(0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)='nfs\x00', 0x0, &(0x7f0000000000)) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0xb5) write$RDMA_USER_CM_CMD_CONNECT(r1, 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000380)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}], [], 0x42c}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='hybla\x00', 0x6) 03:36:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x7b, 0x0, [0x200000488]}) 03:36:09 executing program 0: rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x40000100000003, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 1148.527511][ T3285] FS-Cache: Duplicate cookie detected [ 1148.533296][ T3285] FS-Cache: O-cookie c=000000006008430c [p=000000005c5c3e5c fl=222 nc=0 na=1] [ 1148.542328][ T3285] FS-Cache: O-cookie d=000000009bf227b3 n=000000005b7e8f86 [ 1148.549561][ T3285] FS-Cache: O-key=[10] '02000200000002000000' [ 1148.555823][ T3285] FS-Cache: N-cookie c=000000001e2c5a89 [p=000000005c5c3e5c fl=2 nc=0 na=1] [ 1148.564725][ T3285] FS-Cache: N-cookie d=000000009bf227b3 n=00000000fe2bed57 03:36:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x802, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x208000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x3f00000000000000, 0x80, &(0x7f0000000080)=@nat={'nat\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x19b, [0x20000680, 0x0, 0x0, 0x200006b0, 0x200006e0], 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x213) r2 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4) inotify_rm_watch(r1, r2) getsockname$ax25(r0, &(0x7f0000000080)={{}, [@netrom, @null, @null, @rose, @remote, @remote, @netrom, @null]}, &(0x7f0000000100)=0x48) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\xff'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\x80\x00\x03\x03\x00\xff', 0x4bfd}) 03:36:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000500), 0xda0) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x8}}, 0x30) [ 1148.572026][ T3285] FS-Cache: N-key=[10] '02000200000002000000' [ 1148.592456][ T3286] device team0 left promiscuous mode [ 1148.597926][ T3286] device team_slave_0 left promiscuous mode 03:36:09 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r0, 0x0, 0x2, 0x5) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(0xffffffffffffffff, 0xc1105518, &(0x7f0000000440)={{0x0, 0x0, 0x401}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 'syz1\x00', 0x0, 0x0, [], [0x0, 0x0, 0xffffffffffff7fff]}) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$SHM_LOCK(0x0, 0xb) r2 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x7, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, &(0x7f0000000800)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0x93, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8340, 0x36, 0x0, 0x93d]}, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) r3 = creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) flistxattr(r3, &(0x7f0000000a80)=""/186, 0xba) ioctl$TCSETS(r4, 0x40045431, &(0x7f00003b9fdc)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000240)=""/148, 0x94}, {&(0x7f0000000400)=""/27, 0x1b}], 0x2, &(0x7f0000000300)=""/198, 0xc6}, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x0, 0x0) [ 1148.680108][ T3286] device team_slave_1 left promiscuous mode 03:36:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000500), 0xda0) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x8}}, 0x30) [ 1148.881612][ T7932] rpcbind: RPC call returned error 22 [ 1148.931993][ T3303] overlayfs: missing 'lowerdir' 03:36:10 executing program 0: semctl$IPC_RMID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) getsockopt$nfc_llcp(r0, 0x118, 0x4, &(0x7f0000000600)=""/4096, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x0) write(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, &(0x7f00000004c0)='\xf8\x1d)\n\x89\f\xe0R\xa5\xe8X\xec\x84\xd8\x8a\x83p\x84l\xfc/\t\x8f\xd5!:\x96\xeb\x8c\x18\xd73S\\\x16<\xfb\xc7\xe3\xb5\xd1V\xfc+5\x863\t\xc8\x9c\x92\xe5\xe1}\xfbp\xe0\xcb\xa2N\xefnZ=\x86\x90\x85A I\xd1Q\xedB\xa0\xda{\x91\xe2\x90\xb0\xfb\x1d\x88\x87\x9e\xcc\x00\xce\xf3t\xa2\xf8\x9a\x95\x1d/\xff;\xc4\xff\x15\x9d\xe0\x88\xc0\xcf\xd6\x85\xab0GI\x17\xb1\x03\x89%\xf7\x9eh\xab\x7f\xf2\xde\x92\xa6\xd9\x857\xa7\xbfg\x10\x97\xf7\xbb[k\x0eW\x066\x01\xf5p\xea\x7f\x92\xfe\xf5\x1d7Z4?\xd9\x1f\xe7O\xe0\xd8\x03%%\xe2n\x18\x91\x88\xa7ZYpv\"\xce=9\x88\xa4\xb4\xe7\xbd\xb4O5z\x9e\x19\xb3\xefifk,\ts\x02\xd2\xb6\xe2*\xee\x9aq\xd0\x9cb\xfa^\x8eX\xf7\xe2b\x9f\x1c\xee\xd6\xe0|\xa6u\x03T\xea\xd1\x16x\xcc/\x7f[\xa7\xb4\x1e:~\xef\x10\xd5\xedm\xe2#nb\xbe\x94\xa1#\xc6\xad\xe8\x1c@YM\xddx*\xd9\x91\xd1Y') 03:36:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x4b73) capget(0x0, &(0x7f0000000880)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) prctl$PR_GET_CHILD_SUBREAPER(0x25) stat(0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)='nfs\x00', 0x0, &(0x7f0000000000)) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0xb5) write$RDMA_USER_CM_CMD_CONNECT(r1, 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000380)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}], [], 0x42c}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='hybla\x00', 0x6) [ 1149.266699][ T3314] autofs4:pid:3314:autofs_fill_super: called with bogus options [ 1149.275236][ T3313] autofs4:pid:3313:autofs_fill_super: called with bogus options [ 1149.408119][ T3289] device team0 left promiscuous mode [ 1149.423720][ T3289] device team_slave_0 left promiscuous mode [ 1149.437149][ T3289] device team_slave_1 left promiscuous mode [ 1149.543066][ T3292] device team0 entered promiscuous mode [ 1149.552396][ T3292] device team_slave_0 entered promiscuous mode [ 1149.566006][ T3292] device team_slave_1 entered promiscuous mode [ 1149.577617][ T3292] 8021q: adding VLAN 0 to HW filter on device team0 [ 1149.591817][ T3291] device team0 entered promiscuous mode [ 1149.597489][ T3291] device team_slave_0 entered promiscuous mode [ 1149.613067][ T3291] device team_slave_1 entered promiscuous mode [ 1149.635919][ T3291] 8021q: adding VLAN 0 to HW filter on device team0 03:36:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x802, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x208000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x3f00000000000000, 0x80, &(0x7f0000000080)=@nat={'nat\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x19b, [0x20000680, 0x0, 0x0, 0x200006b0, 0x200006e0], 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x213) r2 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4) inotify_rm_watch(r1, r2) getsockname$ax25(r0, &(0x7f0000000080)={{}, [@netrom, @null, @null, @rose, @remote, @remote, @netrom, @null]}, &(0x7f0000000100)=0x48) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\xff'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\x80\x00\x03\x03\x00\xff', 0x4bfd}) 03:36:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0xffffffffffffffff) socket$inet(0x2, 0x0, 0x4b73) capget(0x0, &(0x7f0000000880)) stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) prctl$PR_GET_CHILD_SUBREAPER(0x25) stat(0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000740)='nfs\x00', 0x0, &(0x7f0000000000)) write$P9_RXATTRCREATE(0xffffffffffffffff, &(0x7f0000000140)={0x7}, 0xb5) write$RDMA_USER_CM_CMD_CONNECT(r1, 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000001c0)) clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000200)='./bus\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000380)={[{@upperdir={'upperdir', 0x3d, './bus'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}], [], 0x42c}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='hybla\x00', 0x6) 03:36:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000500), 0xda0) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x8}}, 0x30) 03:36:10 executing program 3: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00\x00\x00\x8c\x00\x01\xfc\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, &(0x7f0000000140)=0x54) 03:36:10 executing program 0: semctl$IPC_RMID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) getsockopt$nfc_llcp(r0, 0x118, 0x4, &(0x7f0000000600)=""/4096, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x0) write(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, &(0x7f00000004c0)='\xf8\x1d)\n\x89\f\xe0R\xa5\xe8X\xec\x84\xd8\x8a\x83p\x84l\xfc/\t\x8f\xd5!:\x96\xeb\x8c\x18\xd73S\\\x16<\xfb\xc7\xe3\xb5\xd1V\xfc+5\x863\t\xc8\x9c\x92\xe5\xe1}\xfbp\xe0\xcb\xa2N\xefnZ=\x86\x90\x85A I\xd1Q\xedB\xa0\xda{\x91\xe2\x90\xb0\xfb\x1d\x88\x87\x9e\xcc\x00\xce\xf3t\xa2\xf8\x9a\x95\x1d/\xff;\xc4\xff\x15\x9d\xe0\x88\xc0\xcf\xd6\x85\xab0GI\x17\xb1\x03\x89%\xf7\x9eh\xab\x7f\xf2\xde\x92\xa6\xd9\x857\xa7\xbfg\x10\x97\xf7\xbb[k\x0eW\x066\x01\xf5p\xea\x7f\x92\xfe\xf5\x1d7Z4?\xd9\x1f\xe7O\xe0\xd8\x03%%\xe2n\x18\x91\x88\xa7ZYpv\"\xce=9\x88\xa4\xb4\xe7\xbd\xb4O5z\x9e\x19\xb3\xefifk,\ts\x02\xd2\xb6\xe2*\xee\x9aq\xd0\x9cb\xfa^\x8eX\xf7\xe2b\x9f\x1c\xee\xd6\xe0|\xa6u\x03T\xea\xd1\x16x\xcc/\x7f[\xa7\xb4\x1e:~\xef\x10\xd5\xedm\xe2#nb\xbe\x94\xa1#\xc6\xad\xe8\x1c@YM\xddx*\xd9\x91\xd1Y') 03:36:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x802, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x208000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x3f00000000000000, 0x80, &(0x7f0000000080)=@nat={'nat\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x19b, [0x20000680, 0x0, 0x0, 0x200006b0, 0x200006e0], 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000faffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000300000000000000000000000000000000000000000000000000000000ffffffff01000000030000000000000000006361696630000000f7ffffff00000000627071300000000000000000000000006263736830000000000000000000000065727370616e30000000000100000000000000000000000000000000aaaaaaaaaa000000000000000000a8000000a8000000e00000007265616c6d0000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000006172707265706c7900000000000000000000000000000000000000000000000010000000000000000180c200000000000000000000000000e12c730e67c9eeb1109cd3329d2462297891aa06d9c38503ac92545578eb6b83d471232172b34d86cd1769"]}, 0x213) r2 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4) inotify_rm_watch(r1, r2) getsockname$ax25(r0, &(0x7f0000000080)={{}, [@netrom, @null, @null, @rose, @remote, @remote, @netrom, @null]}, &(0x7f0000000100)=0x48) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\xff'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\x80\x00\x03\x03\x00\xff', 0x4bfd}) [ 1149.777988][ T3327] IPVS: ftp: loaded support on port[0] = 21 [ 1149.792729][ T3335] device team0 left promiscuous mode [ 1149.814617][ T3335] device team_slave_0 left promiscuous mode 03:36:11 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000500), 0xda0) write$FUSE_INIT(r0, &(0x7f0000000240)={0x50, 0x0, 0x2}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x8}}, 0x30) [ 1149.851827][ T3335] device team_slave_1 left promiscuous mode [ 1149.856245][ T3330] autofs4:pid:3330:autofs_fill_super: called with bogus options [ 1149.874507][ T7932] rpcbind: RPC call returned error 22 03:36:11 executing program 0: semctl$IPC_RMID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) getsockopt$nfc_llcp(r0, 0x118, 0x4, &(0x7f0000000600)=""/4096, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x0) write(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, &(0x7f00000004c0)='\xf8\x1d)\n\x89\f\xe0R\xa5\xe8X\xec\x84\xd8\x8a\x83p\x84l\xfc/\t\x8f\xd5!:\x96\xeb\x8c\x18\xd73S\\\x16<\xfb\xc7\xe3\xb5\xd1V\xfc+5\x863\t\xc8\x9c\x92\xe5\xe1}\xfbp\xe0\xcb\xa2N\xefnZ=\x86\x90\x85A I\xd1Q\xedB\xa0\xda{\x91\xe2\x90\xb0\xfb\x1d\x88\x87\x9e\xcc\x00\xce\xf3t\xa2\xf8\x9a\x95\x1d/\xff;\xc4\xff\x15\x9d\xe0\x88\xc0\xcf\xd6\x85\xab0GI\x17\xb1\x03\x89%\xf7\x9eh\xab\x7f\xf2\xde\x92\xa6\xd9\x857\xa7\xbfg\x10\x97\xf7\xbb[k\x0eW\x066\x01\xf5p\xea\x7f\x92\xfe\xf5\x1d7Z4?\xd9\x1f\xe7O\xe0\xd8\x03%%\xe2n\x18\x91\x88\xa7ZYpv\"\xce=9\x88\xa4\xb4\xe7\xbd\xb4O5z\x9e\x19\xb3\xefifk,\ts\x02\xd2\xb6\xe2*\xee\x9aq\xd0\x9cb\xfa^\x8eX\xf7\xe2b\x9f\x1c\xee\xd6\xe0|\xa6u\x03T\xea\xd1\x16x\xcc/\x7f[\xa7\xb4\x1e:~\xef\x10\xd5\xedm\xe2#nb\xbe\x94\xa1#\xc6\xad\xe8\x1c@YM\xddx*\xd9\x91\xd1Y') 03:36:11 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/hwrng\x00', 0x509102, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, 0x0, &(0x7f0000000640)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e24}}}, &(0x7f0000000740)=0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000140)=""/123) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x8d5af}], 0x10000000000000db, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) ioctl$VT_DISALLOCATE(r1, 0x5608) ioctl(0xffffffffffffffff, 0x2000001000008912, &(0x7f0000000100)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001500)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001540)={'syzkaller0\x00', r4}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000001400)={'nat\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000380)=[{}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, 0x0, &(0x7f00000002c0)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1150.240841][ T3351] autofs4:pid:3351:autofs_fill_super: called with bogus options 03:36:11 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="5500000018007f1412fe01b2a4a280930a06000000a84306910000000b000f0035020000060000001900154002000001d40000dc1338d54400009b84136ef75afb83de44110016000d0001400000060cec4faba7d4", 0x55}], 0x1}, 0x0) 03:36:11 executing program 0: semctl$IPC_RMID(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) getsockopt$nfc_llcp(r0, 0x118, 0x4, &(0x7f0000000600)=""/4096, 0x1000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x0) write(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f00000002c0)='autofs\x00', 0x0, &(0x7f00000004c0)='\xf8\x1d)\n\x89\f\xe0R\xa5\xe8X\xec\x84\xd8\x8a\x83p\x84l\xfc/\t\x8f\xd5!:\x96\xeb\x8c\x18\xd73S\\\x16<\xfb\xc7\xe3\xb5\xd1V\xfc+5\x863\t\xc8\x9c\x92\xe5\xe1}\xfbp\xe0\xcb\xa2N\xefnZ=\x86\x90\x85A I\xd1Q\xedB\xa0\xda{\x91\xe2\x90\xb0\xfb\x1d\x88\x87\x9e\xcc\x00\xce\xf3t\xa2\xf8\x9a\x95\x1d/\xff;\xc4\xff\x15\x9d\xe0\x88\xc0\xcf\xd6\x85\xab0GI\x17\xb1\x03\x89%\xf7\x9eh\xab\x7f\xf2\xde\x92\xa6\xd9\x857\xa7\xbfg\x10\x97\xf7\xbb[k\x0eW\x066\x01\xf5p\xea\x7f\x92\xfe\xf5\x1d7Z4?\xd9\x1f\xe7O\xe0\xd8\x03%%\xe2n\x18\x91\x88\xa7ZYpv\"\xce=9\x88\xa4\xb4\xe7\xbd\xb4O5z\x9e\x19\xb3\xefifk,\ts\x02\xd2\xb6\xe2*\xee\x9aq\xd0\x9cb\xfa^\x8eX\xf7\xe2b\x9f\x1c\xee\xd6\xe0|\xa6u\x03T\xea\xd1\x16x\xcc/\x7f[\xa7\xb4\x1e:~\xef\x10\xd5\xedm\xe2#nb\xbe\x94\xa1#\xc6\xad\xe8\x1c@YM\xddx*\xd9\x91\xd1Y') 03:36:11 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/hwrng\x00', 0x509102, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, 0x0, &(0x7f0000000640)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e24}}}, &(0x7f0000000740)=0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000140)=""/123) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x8d5af}], 0x10000000000000db, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) ioctl$VT_DISALLOCATE(r1, 0x5608) ioctl(0xffffffffffffffff, 0x2000001000008912, &(0x7f0000000100)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001500)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001540)={'syzkaller0\x00', r4}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000001400)={'nat\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000380)=[{}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, 0x0, &(0x7f00000002c0)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1150.713336][ T3361] autofs4:pid:3361:autofs_fill_super: called with bogus options [ 1150.823309][ T3338] IPVS: ftp: loaded support on port[0] = 21 [ 1150.990808][ T3341] device team0 left promiscuous mode [ 1150.996336][ T3341] device team_slave_0 left promiscuous mode [ 1151.026558][ T3341] device team_slave_1 left promiscuous mode [ 1151.339500][ T3344] device team0 entered promiscuous mode [ 1151.347615][ T3344] device team_slave_0 entered promiscuous mode [ 1151.374768][ T3344] device team_slave_1 entered promiscuous mode [ 1151.399984][ T3344] 8021q: adding VLAN 0 to HW filter on device team0 [ 1151.407740][ T3345] device team0 entered promiscuous mode [ 1151.417931][ T3345] device team_slave_0 entered promiscuous mode [ 1151.444665][ T3345] device team_slave_1 entered promiscuous mode [ 1151.466722][ T3345] 8021q: adding VLAN 0 to HW filter on device team0 [ 1151.484391][ T3359] netlink: 'syz-executor.5': attribute type 15 has an invalid length. 03:36:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x802, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x208000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x3f00000000000000, 0x80, &(0x7f0000000080)=@nat={'nat\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x19b, [0x20000680, 0x0, 0x0, 0x200006b0, 0x200006e0], 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x213) r2 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4) inotify_rm_watch(r1, r2) getsockname$ax25(r0, &(0x7f0000000080)={{}, [@netrom, @null, @null, @rose, @remote, @remote, @netrom, @null]}, &(0x7f0000000100)=0x48) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\xff'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\x80\x00\x03\x03\x00\xff', 0x4bfd}) 03:36:12 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") write$binfmt_elf64(r1, 0x0, 0xa7) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000940)="580000001500add427323b470c458c5602067fffffff81004e220000ac1414aa0b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 03:36:12 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/hwrng\x00', 0x509102, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, 0x0, &(0x7f0000000640)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e24}}}, &(0x7f0000000740)=0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000140)=""/123) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x8d5af}], 0x10000000000000db, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) ioctl$VT_DISALLOCATE(r1, 0x5608) ioctl(0xffffffffffffffff, 0x2000001000008912, &(0x7f0000000100)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001500)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001540)={'syzkaller0\x00', r4}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000001400)={'nat\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000380)=[{}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, 0x0, &(0x7f00000002c0)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1151.500030][ T3359] netlink: 'syz-executor.5': attribute type 21 has an invalid length. [ 1151.508734][ T3359] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 1151.643444][ T3380] device team0 left promiscuous mode [ 1151.652621][ T3380] device team_slave_0 left promiscuous mode [ 1151.669956][ T3380] device team_slave_1 left promiscuous mode [ 1151.969465][ C0] net_ratelimit: 22 callbacks suppressed [ 1151.969497][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1151.981502][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1152.048114][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1152.054174][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1152.518490][ T3382] device team0 entered promiscuous mode [ 1152.524095][ T3382] device team_slave_0 entered promiscuous mode [ 1152.548660][ T3382] device team_slave_1 entered promiscuous mode [ 1152.556587][ T3382] 8021q: adding VLAN 0 to HW filter on device team0 [ 1153.167533][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1153.173464][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1153.179562][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1153.185348][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1153.247495][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1153.253332][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:36:15 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x42, &(0x7f0000000000), 0x4) 03:36:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x802, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x208000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x3f00000000000000, 0x80, &(0x7f0000000080)=@nat={'nat\x00\x00\x00\x00\a\x00', 0x19, 0x1, 0x19b, [0x20000680, 0x0, 0x0, 0x200006b0, 0x200006e0], 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x213) r2 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f0000000140), &(0x7f0000000180)=0x4) inotify_rm_watch(r1, r2) getsockname$ax25(r0, &(0x7f0000000080)={{}, [@netrom, @null, @null, @rose, @remote, @remote, @netrom, @null]}, &(0x7f0000000100)=0x48) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\xff'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\x80\x00\x03\x03\x00\xff', 0x4bfd}) 03:36:15 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x4b564d03, 0x1, 0x561]}) 03:36:15 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/hwrng\x00', 0x509102, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, 0x0, &(0x7f0000000640)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000680)={0x0, @in={{0x2, 0x4e24}}}, &(0x7f0000000740)=0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000140)=""/123) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x8d5af}], 0x10000000000000db, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r3, 0x1000000000016) ioctl$VT_DISALLOCATE(r1, 0x5608) ioctl(0xffffffffffffffff, 0x2000001000008912, &(0x7f0000000100)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001500)={'team0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001540)={'syzkaller0\x00', r4}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000001400)={'nat\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000380)=[{}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x80800) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, 0x0, &(0x7f00000002c0)) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) request_key(&(0x7f0000000440)='id_legacy\x00', &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:36:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12a41d88b070") syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x4, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8}}}}}, 0x0) 03:36:15 executing program 2: sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x12, &(0x7f000002eff0)={0x0, 0x0}, 0x10) 03:36:15 executing program 0: msgctl$MSG_INFO(0x0, 0xd, &(0x7f0000000080)=""/103) [ 1154.395944][ T3392] device team0 left promiscuous mode 03:36:15 executing program 2: creat(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x3}]}}, @icmp=@timestamp_reply}}}}, 0x0) 03:36:15 executing program 3: syz_open_dev$video4linux(0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "7c70ee3800d5ab5f2036f872e0ac57cbd592bca0d671633f50a3102066d6e765f5a64731e3fb8d90d250eda2cc33b60a7ff98074cdc3f1dd1a2df26a381d95974e0925d521c6b48c3dee0d430d398884316091aff6adb6153dc3c92549957d3488efc02d6f6fb172524b095c30c1bd35aae04236bdd42694d613eb54c0b65a338c48dc4c8bad70754fc81d9928e4a1b81f9c77075258a0805b4494867247966b24a023311fd91ef3754b98d3acde6f2ef0617f123c22fccb81c11389fdfa2e21c2365aabfc8916e02151d8643ae21cab7fcbec6142186d3bb57546c106484bc4c28a48da2b75dd82aabe99464558e60cd101f6b65856fabee614d271741a68dd550c8772f06a93cf8e5c0de549c3b75a72f8a590bd50b2af5f64009c969ed7596f0192b0f98b1afac0e8c5f4c653f611b4a71776400a9ae3f18e75f856788c97195749042510735880b9bb0ccb23210832a4f1c6f134d68f8e299837c426e0c9a45d5d2c959446cc363f370c67cd01a063c91254d692fe35abee92fabda4f66d93228c979ebe036c5c2e0028ec76562d67d0919ca28258fec0ed60603142b5c57c4cfb1ea1e892d0fd2f33970142b179c415d6bea344fbcc82d133052e848a885160737c69eb02ca9f544831c8e3ffcf40cb7b415d24795fc8aaeb8e76bec262aea5e28fe5d6495c4b5895a612b1cc2122286add66356f3ecd309f970634f1b09da1507964d35575167317f13c7fd9f11af27ceea86e9a5b3494a27ba98ba38dd1fb72ef2c6163664fd8f7c946935cd4833121f505ff277c03d959d9a12f3389e9eb6701a8b29f72c20c6abb7bd8349dd2e120bdd59dca9f1a2a877f1677b59d7920ddf29b9d94f7c6879b78e31cf1b65b60fe349ef9d4976f46609ee34e33f647aafbf64f6323d18598905f2e73af75661397595b8f9c1e9a4e993946820da5378ca5b363560e95edce316e99bac6e6250efcf1cb58fdcf94c7557c2d7f763a688543462d54b64e178c2e64c6ebba356894973051907fd8de8ba908e822168b171c1707efcd9ac827e64313721876e2ff26ac34e88557a4a0dfde08eda81cf0c1465a89b68429e48966044c767563e1121db48c9b619fd7362afd15ec6aa19b28759d7977be4fbcad0cf8dd5dc5362259bd5cb5089a9d18db969afe1192571f5fcc0c4d6be281d23b9c1f9f32873c058adfa1bf57a3718686957edfd6e4b58aa959541127696d59fb2810d042ced227961eb19a424e4cf45bc6243217bb7561b7ee11f8c0b8f39480343a26f2da5fe79d5e213c01ea47155ffa91e7d7ba0bc8ccb018bd69cfe71dd8565a645d678b404a295397e83ae69dbf8505f6947a836b44823a92861124330fccd4bc4a2e20d9047bd919d82c89623caa87eb09bd584d58f42b35ef55fddc06dfb3957f3f507e5ca9b8b98947cc5bb68846755527ddf32ffa444e1c7a5654d4d377e04a9f22e1069804fdcdb251acb6bd6b32d100feb44286991d779d2b3e2b7f5cc5f8eb3ae166a3b6fb9df11e1867989a6f9b2028e4c73b4d418b51f6e870713cadafddb47a48c9a97283da214f02db3326d42438d9a7db580693ad1887f99d86bb5fafd6d07c2647fc80c2c5a1ed9ea3b95be65ca422080ddefca5b49ccd538f6bc67390f892d9e416f7e835f76dd90edc56256348d20560caeea05c0922cab60dbf0b57ddaaed6ded5a336e01485fd571dc12050461271cee347c31ac245bfee9128630dfcc43b6d88b5ba9937a6f6ab70b7d256784ff72297cfcfd0ffacd09b55fb832bf60f04d87c48c74972b9f18fa178ce4880b025d1c1097ddb929e8f7e02f1c0e03012bec0fa61a49eb1c2a50a45fc0d98b6649de325184006938e421321e8b366649d9b6ebadf77509c9d48844e80f7752fd7daaa5c938b946feaaac0d871203270a747035c7e2f697c84e792a55cbce76c0a25360f7acbeaab60627aa9c37064af75b67f46732844eb2f6b37226004afe451a9fbfbbcf7e72ade67b017e9209b5627fbe16789abd90326751a1fd1d93efc59f2650f979ba71938d784064922bee2874c4b76d5f26e39ea0a98cf175950137feff9456c88c6a295830183fae3a9c2312c25f3d81708d73488d15a587e7e7cdde3b77917eef29c8b5965c916a65c3c5a53b7313c3115d0a8bb4e16f6b80ff6f78adb756aba94ced86047562a2cd2fb25e9a4656f6359c3f2fde8b5ab38852853cbd7221cb4d59b7f0e79bd37f9ade073f62b75edbe63c13c0d02bf076d88f5b750ea640aad47ce97d6a0783398dd3fbb63734ed969470cf45200235650532224fc28caf1e36ca6b402ec4c978add40fc59f2113485875682139f8aa9aeb48d09178de919370b0cd0ebcab5e60e1b0a2fc153db0dae8e50b48561622a677d0f1afc149676f832e016e14007fb298dcb96f11a92a1ac8bd4cc7b34d659d6cd2c9817b586585e72080255b083bc84512277ffb7f561c6a7a08cd128bfe9b525da531f0bf04f11d3de102b3538835807ac0b2f4325fc6765d02d692ec82f5b338c8257029136fcd3427c09874ecc7492becdd6608eac4adf1abc3f7e08868a72e57ce4dcfc288a25af73d19f1118a9254963c1548cdca5fc7c921a7f218f8e71edd7969dfb35beae1091d7530e32236397fa9fcd232b441ff1b0177829468c198d659d247ccca4fbd58c625501e4368075d0e5e69a6f90952f5bbe48e85a303131dedf7f1a513b291598a545784e1013521877c25d6069d3a855652a4bad5b2df2e4da2de756a20e790b756dd2925ce824561e5892b5e064c7c7b996acc4e29597e0cd00956e9c57ec374714f846be7632d3075e38bead499163498810886c78a2cc73fb64fd48e186083ce911e0751b4dc63476859c2824fa532a4b1711c244619e702eeab19380aeb7b17f67fade3dcad8ddddd893a526cd5d04d8ae982c88029ec71bdd0772fd74adbdb378fc204ca411a2d8a50331516a28552be78f9725f32d1b3a6c7bdf3277c5f7e385c7ebbacc419ec7ca3c5b8f46dbefee59b6422a6b22d60527edc012f852077d925619874f7709f283e01678fed36528003a696ee431a817f34f453c143dc56b70e1f810a5380a555cc8c4fc6522ab544ce5d715caa302ebdd0aa8286b7ef5dd6dd48a8ad9566818f7509daf02db0b98b432f57f1d107ee95a86228728cab4062e27922381e1e2ee351af5e2ea0fd6d1cea70b3b8f4a50f0776fc9aa2a7d2dff6e1ea3769864104f09137b99960b69af13895d842649eacaed8ddf183beba3323640af8deb52b902c0974d685d19fc87c93eb80ad5d28e54363705ad39231d989522e94f000256bc8d93af138a45d67dad3e21fa9fb31d9327c6e71f61956d9daf4f97333112704136d3d1bf6fe0e4c002e10b684d2344300ec70fae0b50532ebace58f0e8318354a172cceacf27d01ff41cc8fef42443f62b0e15b5fcc0728630b96fb2c2b59634f4993bb1ce2eace6fb0f53e5f84bc5f58b1b66d59e3c75a98670496f105a703607211aa9e882e72f13e9fe07f0767ad4e5ac5c732b65301d8ceab36b5ff2f71958fb1b51d2e703ac506e68d4026160fd3f60440b8b8f554f1feeba5d53f71cbe60d143620f8fa779acb94c965b729207a5ab11f4a51b694c31606171da44a28d80cde296dff5724ff718d6377eb8534e616cff39af943ee4ce87b4fadded30c702d370a71072ab3e20f19b8c1b73fdbbb9c675352bb73ee85e22597fc0c439a33f5febe1629bd084af7193f8d1a1415b02ca54706711505cbae11ec6411b012cc3a3eddcfb002901b6e7565b9fbf4d605c147031888ceb590c14697d00970ce9095c6f7fee41ec6a15d7ef52dfedfff2a0d3dbb387b61232aee6ca202787038021e6aabda18e2adf6fd89aa491e65f9813d73412fbfff089752d713d7efa690ec4fc254b56908d3057f65997acf81aea589e272f8fa852849e488f1e0c0cb6cdb5f46ca92e36d39224e704850056d2e9b91909aed0f55d054e274415ecc39b8958335a14cfb0a42d7f26ef8e82592dfd03b3550b5193fba077994c682951968869574fd94976760d9bd9b334353eeda836cc8dab244e72095cc46833f02bb2f6df35601b3085664261abb67fc9ab9f27210e6827cd15ce16c55f0f7f5b8ab401f24032b19a53a9299b62ebf4a8cf7f4753d95126f008a8ce349036666de66bcaf40b27fa875efa98873e1ef9302e2a24bfe07bd1054bdf9ba9ad1b1075402f26d682833b947c762513ba5f07537bb712473184a60e04ace5adb8d982d6153b011ae0b2034adc0ff4a64e2c6561c2e0840cdab2120bc916cde9b7a92c4d332d0f83945fe55e3c8f4d93f22e7759c20241d92cca0ae5a3d06a127e5614df708cea1ad3b2f231c81460ff4c3f349c67a87135a4b67589ffce311832923f71796276e81f0537e265404c0ee06d5ed98a5ec5f8ad62db589eb585fc4627173b51fd4e897a3e8d2acbb82ec2996ac3a6823368a1e12a0536a9d1a7b2d31d80c46c292ff51395481d4f65c53fab867e27bec9156ee189d245d94877a1405dc9e1e996822ad47071a9ab36c9bfd02c41ea5ba21591793053b1b64758bae0addfcd69d169849bc1ee6ce5c08f0d3da5ecc1b6ab31e13af2fa5ce4d921163270901264a88ac6350e8fb6371663dd04146932238597258b123a8036250c190fbb3cfc6ebbf9e06c4a9053e8332c95c91a890a3d35ddd35f47e7ab606f3e345e12560e6d52243883da7b8910834042ad12e7fb3f08a0b14ef6aee22251999e6079be2ef5666d7d5ae00d161720262761da3f378c63cb151f4e94d034e9de949dfe796b905804ca555691023c30ea7cf0cb276e1e3ba65793291f8287d1064606bf5787421b9b9bfc05e9c5eac750de92519fe9e2592cd34a2ef6ec18efed5e7c13bfcfce47327cbecac358bbe6d44164849308cf91cd5ea87fa4b02ba4939e28141c7dad42714b019470d91808a8f46150677b6c90f267ecb39ef42afc95de0cbd016775c89d8213ec9d4e061e6493f237296f91abfc64176c0e885ef54af4136a724fadfe89a25d7599998acebc4a27f8fb5b26936bda5c3d5fec3373dcd9a0e99fc939641c50669adc54119582e8835575d1c57fa955cd29d870360620f91c3ff90d264013816352317ae226f7d7bad5db711f8973382f6cebd63cd519ddd08e1772649be75f64f4acc15f828dc0b305584b6dd2213194603c44e2964358d305aa97fb08568a0a955ad7a6f8d042754b4bbf2fb3414052719fd9841bef8360d1d3195c69414be882115c2c64fecdcbdaed3a2e943fdfef9a13520e41d32a787bcfe4f61e2b378d35aa70784a772cf8ebcaaeb105e4627516db2ababfcb8c11f224c3a48c86160d34d0ee59f02c31648ae4b0309b378f0bf63266967dcfb4f1cc1902f613c6d0d48915a9cf28a52b106544cde1b38ff2e2a1275fd0d3899ce7f7c6653c9017f7ac4aaa35bcb2811a8f9dbb56746b45475350e7c13d42abb5692377da7a4045ee644ce00f8699e3251d75621c82cd659ea3add277affe3ff792f7d24a3d0979ef82cfc0d409697ae2e8598854a8327f46974c901d309dc6dbe31913c59d821aa50c0fe95cc822e8f07bbb00e9a09bc9a570b9778d29308740bc336a41258d209c206f87a709aa43415da0096f7d177e509a7d625645fb098ccc45367d82235e952670ac5f82f8ced3f59fd9ee20ac75be609cc832417e807ddc40630cba4c91e0785edcb5f20b9e6dedb1ec172cd16fc034f410e9ce375ea855144aa3076317f649cf4efe4d7abf244984c4e", 0xfffffffffffffd14}, 0x10a9) truncate(&(0x7f0000000080)='./bus\x00', 0x200) unlink(&(0x7f00000002c0)='./bus\x00') sendfile(r1, r1, &(0x7f00000000c0), 0x808100000000) [ 1154.464329][ T3392] device team_slave_0 left promiscuous mode [ 1154.509715][ T3392] device team_slave_1 left promiscuous mode 03:36:15 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b2b, &(0x7f0000000100)='wlan0\x00\xd3\xeb\x180xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000000)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x14\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000480)=[{&(0x7f00000001c0)='J', 0x1}], 0x1, 0x181806) finit_module(r1, 0x0, 0x0) 03:36:16 executing program 3: syz_open_dev$video4linux(0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "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", 0xfffffffffffffd14}, 0x10a9) truncate(&(0x7f0000000080)='./bus\x00', 0x200) unlink(&(0x7f00000002c0)='./bus\x00') sendfile(r1, r1, &(0x7f00000000c0), 0x808100000000) 03:36:16 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x14, r1, 0x301, 0x0, 0x25dfdbfb}, 0x14}}, 0x0) 03:36:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x4b564d03, 0x1, 0x561]}) 03:36:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x100000000000019, &(0x7f0000548000)=0x5, 0x4) sendto$inet6(r1, 0x0, 0xfffffffffffffd48, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmsg(r1, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x2000) ioctl$SIOCGSTAMP(r1, 0x8906, &(0x7f0000000000)) 03:36:16 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 03:36:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000000)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x14\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000480)=[{&(0x7f00000001c0)='J', 0x1}], 0x1, 0x181806) finit_module(r1, 0x0, 0x0) 03:36:16 executing program 1: r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$vnet(r0, &(0x7f0000000100)={0x1, {0x0, 0x0, 0x0}}, 0x358) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r2 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000240)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="00df49aebcfc0d0953d9c71a315144ce2db76ab20c9e36cae0cf2fc8f974a86fc388240d014fe1ba9c3bc101ec5d9f5cc99340e02dc4b549816f7db6c3d6d1e7494e1c7f3c54cab3daec807f13d912c65e8b", @ANYRES64, @ANYRES32], 0x5e) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x4, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f0000000080)) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:17 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x20032600) fallocate(r0, 0x10, 0x0, 0x4659) 03:36:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x4b564d03, 0x1, 0x561]}) 03:36:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000000)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x14\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000480)=[{&(0x7f00000001c0)='J', 0x1}], 0x1, 0x181806) finit_module(r1, 0x0, 0x0) 03:36:17 executing program 1: r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$vnet(r0, &(0x7f0000000100)={0x1, {0x0, 0x0, 0x0}}, 0x358) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r2 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000240)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="00df49aebcfc0d0953d9c71a315144ce2db76ab20c9e36cae0cf2fc8f974a86fc388240d014fe1ba9c3bc101ec5d9f5cc99340e02dc4b549816f7db6c3d6d1e7494e1c7f3c54cab3daec807f13d912c65e8b", @ANYRES64, @ANYRES32], 0x5e) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x4, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f0000000080)) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:17 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000000)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x14\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000480)=[{&(0x7f00000001c0)='J', 0x1}], 0x1, 0x181806) finit_module(r1, 0x0, 0x0) 03:36:17 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ioprio_get$uid(0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgrcv(r1, &(0x7f00000000c0)={0x0, ""/63}, 0x47, 0x0, 0x0) tkill(r0, 0x20) 03:36:17 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ffc000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x4b564d03, 0x1, 0x561]}) 03:36:17 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x20032600) fallocate(r0, 0x10, 0x0, 0x4659) 03:36:17 executing program 3: syz_open_dev$video4linux(0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "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", 0xfffffffffffffd14}, 0x10a9) truncate(&(0x7f0000000080)='./bus\x00', 0x200) unlink(&(0x7f00000002c0)='./bus\x00') sendfile(r1, r1, &(0x7f00000000c0), 0x808100000000) 03:36:17 executing program 5: r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$vnet(r0, &(0x7f0000000100)={0x1, {0x0, 0x0, 0x0}}, 0x358) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r2 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000240)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="00df49aebcfc0d0953d9c71a315144ce2db76ab20c9e36cae0cf2fc8f974a86fc388240d014fe1ba9c3bc101ec5d9f5cc99340e02dc4b549816f7db6c3d6d1e7494e1c7f3c54cab3daec807f13d912c65e8b", @ANYRES64, @ANYRES32], 0x5e) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x4, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f0000000080)) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:17 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000080)) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) 03:36:17 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x20032600) fallocate(r0, 0x10, 0x0, 0x4659) 03:36:18 executing program 1: r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$vnet(r0, &(0x7f0000000100)={0x1, {0x0, 0x0, 0x0}}, 0x358) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r2 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000240)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="00df49aebcfc0d0953d9c71a315144ce2db76ab20c9e36cae0cf2fc8f974a86fc388240d014fe1ba9c3bc101ec5d9f5cc99340e02dc4b549816f7db6c3d6d1e7494e1c7f3c54cab3daec807f13d912c65e8b", @ANYRES64, @ANYRES32], 0x5e) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x4, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f0000000080)) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:18 executing program 5: r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$vnet(r0, &(0x7f0000000100)={0x1, {0x0, 0x0, 0x0}}, 0x358) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r2 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000240)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="00df49aebcfc0d0953d9c71a315144ce2db76ab20c9e36cae0cf2fc8f974a86fc388240d014fe1ba9c3bc101ec5d9f5cc99340e02dc4b549816f7db6c3d6d1e7494e1c7f3c54cab3daec807f13d912c65e8b", @ANYRES64, @ANYRES32], 0x5e) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x4, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f0000000080)) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:18 executing program 1: r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$vnet(r0, &(0x7f0000000100)={0x1, {0x0, 0x0, 0x0}}, 0x358) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r2 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000240)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="00df49aebcfc0d0953d9c71a315144ce2db76ab20c9e36cae0cf2fc8f974a86fc388240d014fe1ba9c3bc101ec5d9f5cc99340e02dc4b549816f7db6c3d6d1e7494e1c7f3c54cab3daec807f13d912c65e8b", @ANYRES64, @ANYRES32], 0x5e) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x4, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f0000000080)) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:18 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x20032600) fallocate(r0, 0x10, 0x0, 0x4659) [ 1157.325496][ C0] net_ratelimit: 18 callbacks suppressed [ 1157.325506][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1157.337399][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1157.343471][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1157.349335][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1157.405379][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1157.411294][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:36:18 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ioprio_get$uid(0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgrcv(r1, &(0x7f00000000c0)={0x0, ""/63}, 0x47, 0x0, 0x0) tkill(r0, 0x20) [ 1157.505280][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1157.511107][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:36:18 executing program 3: syz_open_dev$video4linux(0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000000980)={0x8, "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", 0xfffffffffffffd14}, 0x10a9) truncate(&(0x7f0000000080)='./bus\x00', 0x200) unlink(&(0x7f00000002c0)='./bus\x00') sendfile(r1, r1, &(0x7f00000000c0), 0x808100000000) 03:36:18 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000100), 0x4) sendmmsg(r0, &(0x7f000000ac80), 0x66, 0x0) 03:36:18 executing program 0: ioctl(0xffffffffffffffff, 0xffffffffffffffbd, &(0x7f00000000c0)) semget$private(0x0, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) r0 = creat(&(0x7f0000000a80)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x10, 0x5, 0x1000f4) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="576f00734800baca6043836a213578c1b0016f8cf6b50be866e4096db2b5013e19d3561ef8a5c48fd2165e692d4d3ba9353241f194ca0d4fef89fa4c4b1132b2b359a3b8733da8f284d77c2978cf3f1556bf36546355f6d266388eccfe2f137047adbac1be5665fde84d9786a4adc61d723dc92222ac8a1db465a8bf7e047921d5774564a4ada8a9e920995cbc38aa88f754856d96c29d2846"]) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x2) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) getsockname$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000200)=0x14, 0xffffffffffffff2e) r3 = open(&(0x7f00000008c0)='./bus\x00', 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8000fffffffe) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) write$FUSE_STATFS(r3, 0x0, 0x0) [ 1157.846817][ T26] audit: type=1804 audit(2000000179.079:923): pid=3563 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir441605446/syzkaller.Ef4v6m/1110/bus" dev="sda1" ino=16899 res=1 03:36:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000000240)=@framed={{}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x54}]}, &(0x7f0000000000)='Q\xa2\xa2\x11\xbbo-\x95\xd3\xc0I\x960(U\x06\t.\xc3\t\xa4\xd5\x99\x02_2\x01\r\xf8\xedxR\xc2\a\xc0\x17\x15k3\xfc\xe7\x9d\xea\xe7\x19M#\"N\xe4\xe4\xc5\xe3!\xfd\x80\xb7', 0x5, 0x3e2, &(0x7f00001a7f05)=""/251}, 0x34) [ 1157.887910][ T3561] overlayfs: unrecognized mount option "Wo" or missing value [ 1157.983595][ T26] audit: type=1804 audit(2000000179.209:924): pid=3563 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir441605446/syzkaller.Ef4v6m/1110/bus" dev="sda1" ino=16899 res=1 03:36:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) recvmsg(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f00000028c0)=[{&(0x7f0000002840)=""/109, 0x6d}], 0x1, &(0x7f0000002900)=""/213, 0xd5}, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='#'], 0x1) [ 1158.148261][ T26] audit: type=1804 audit(2000000179.379:925): pid=3563 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir441605446/syzkaller.Ef4v6m/1110/bus" dev="sda1" ino=16899 res=1 [ 1158.156733][ T3563] overlayfs: unrecognized mount option "Wo" or missing value [ 1158.190681][ T26] audit: type=1804 audit(2000000179.379:926): pid=3561 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir441605446/syzkaller.Ef4v6m/1110/bus" dev="sda1" ino=16899 res=1 [ 1158.215231][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1158.215285][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1158.228870][ T26] audit: type=1804 audit(2000000179.449:927): pid=3567 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir441605446/syzkaller.Ef4v6m/1110/bus" dev="sda1" ino=16899 res=1 [ 1158.279287][ T26] audit: type=1804 audit(2000000179.459:928): pid=3563 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir441605446/syzkaller.Ef4v6m/1110/bus" dev="sda1" ino=16899 res=1 03:36:21 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000080)) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) 03:36:21 executing program 5: r0 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$vnet(r0, &(0x7f0000000100)={0x1, {0x0, 0x0, 0x0}}, 0x358) close(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) r2 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000240)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="00df49aebcfc0d0953d9c71a315144ce2db76ab20c9e36cae0cf2fc8f974a86fc388240d014fe1ba9c3bc101ec5d9f5cc99340e02dc4b549816f7db6c3d6d1e7494e1c7f3c54cab3daec807f13d912c65e8b", @ANYRES64, @ANYRES32], 0x5e) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x8, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x4, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}) ioctl$CAPI_GET_ERRCODE(r2, 0x80024321, &(0x7f0000000080)) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r4 = socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 03:36:21 executing program 0: ioctl(0xffffffffffffffff, 0xffffffffffffffbd, &(0x7f00000000c0)) semget$private(0x0, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) r0 = creat(&(0x7f0000000a80)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x10, 0x5, 0x1000f4) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="576f00734800baca6043836a213578c1b0016f8cf6b50be866e4096db2b5013e19d3561ef8a5c48fd2165e692d4d3ba9353241f194ca0d4fef89fa4c4b1132b2b359a3b8733da8f284d77c2978cf3f1556bf36546355f6d266388eccfe2f137047adbac1be5665fde84d9786a4adc61d723dc92222ac8a1db465a8bf7e047921d5774564a4ada8a9e920995cbc38aa88f754856d96c29d2846"]) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x2) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) getsockname$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000200)=0x14, 0xffffffffffffff2e) r3 = open(&(0x7f00000008c0)='./bus\x00', 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8000fffffffe) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) write$FUSE_STATFS(r3, 0x0, 0x0) 03:36:21 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) ftruncate(r0, 0x10000) r1 = open(&(0x7f0000000080)='./bus\x00', 0x101002, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = open(&(0x7f0000005a40)='./bus\x00', 0x0, 0x0) sendfile(r0, r2, 0x0, 0x8000fffffffe) 03:36:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() ioprio_get$uid(0x3, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) r1 = msgget(0xffffffffffffffff, 0x0) msgrcv(r1, &(0x7f00000000c0)={0x0, ""/63}, 0x47, 0x0, 0x0) tkill(r0, 0x20) 03:36:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_XSAVE(r2, 0x5000aea5, &(0x7f00000000c0)={"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"}) 03:36:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f0000000440), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x5, 0x0, 0x0, {}, {0x77359400}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "934341c138c7f1bf"}}, 0x48}}, 0x0) sendmsg$can_bcm(r1, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000740)={0x7, 0x0, 0x0, {}, {}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "5963fa4133fe8b2c"}}, 0x48}}, 0x0) 03:36:21 executing program 3: accept$unix(0xffffffffffffff9c, 0x0, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) pipe2(0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) dup(0xffffffffffffffff) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000300)="d52eb84090285c13374b3152e0a89b655cb362e82ee1f7fb3c58bd377ad112ac5c95fd536735a366aef8d78a9cc840f1c511bc976bfeb97815a2792a12ffc009962687a8b18aa4d3ad54fc8143af786f562041569efd3d840786ad0e31a3e10df20ec31cb7a913409496970751df4e87fca85aaf475125680fe3a900f10316cfcf5d1463315a08439144959ba5f750c6a22f2bc47fdd13f758d2b101cb962c37871da80583efca17371411bc5b1b986b9d7a85f510ca4bb183bb76a4078958b32a84a9a5896e43c1cfa9eb694fd643f4e6bfb276", 0xd4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0xff}, 0xa, @in6, 0x0, 0x1, 0x0, 0xdffffffffffffffe}}, 0xe8) sendmmsg(r1, &(0x7f0000000a80)=[{{&(0x7f0000000100)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) [ 1159.993702][ T26] audit: type=1804 audit(2000000181.220:929): pid=3580 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="bus" dev="sda1" ino=17267 res=1 [ 1160.050066][ T3583] overlayfs: unrecognized mount option "Wo" or missing value [ 1160.072453][ T26] audit: type=1804 audit(2000000181.260:930): pid=3580 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="bus" dev="sda1" ino=17267 res=1 03:36:21 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x7, 0x1, 0x1c}]}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xfb, &(0x7f0000002880)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) [ 1160.136218][ T26] audit: type=1804 audit(2000000181.280:931): pid=3594 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="bus" dev="sda1" ino=17267 res=1 03:36:21 executing program 1: clock_adjtime(0x0, &(0x7f0000000100)={0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 03:36:21 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000040)=""/79, 0x4f, 0x0) [ 1160.168315][ T26] audit: type=1804 audit(2000000181.280:932): pid=3593 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="bus" dev="sda1" ino=17267 res=1 03:36:21 executing program 3: r0 = open(&(0x7f0000000280)='./bus\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x0, 0x0) [ 1162.373941][ C0] net_ratelimit: 22 callbacks suppressed [ 1162.373950][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1162.385570][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1162.446145][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1162.452000][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:36:24 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000080)) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) 03:36:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8937, &(0x7f0000000000)={'team0\x00'}) 03:36:24 executing program 1: clock_adjtime(0x0, &(0x7f0000000100)={0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 03:36:24 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000040)=""/79, 0x4f, 0x0) 03:36:24 executing program 0: ioctl(0xffffffffffffffff, 0xffffffffffffffbd, &(0x7f00000000c0)) semget$private(0x0, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) r0 = creat(&(0x7f0000000a80)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x10, 0x5, 0x1000f4) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="576f00734800baca6043836a213578c1b0016f8cf6b50be866e4096db2b5013e19d3561ef8a5c48fd2165e692d4d3ba9353241f194ca0d4fef89fa4c4b1132b2b359a3b8733da8f284d77c2978cf3f1556bf36546355f6d266388eccfe2f137047adbac1be5665fde84d9786a4adc61d723dc92222ac8a1db465a8bf7e047921d5774564a4ada8a9e920995cbc38aa88f754856d96c29d2846"]) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x2) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) getsockname$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000200)=0x14, 0xffffffffffffff2e) r3 = open(&(0x7f00000008c0)='./bus\x00', 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8000fffffffe) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) write$FUSE_STATFS(r3, 0x0, 0x0) 03:36:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x200000004, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000006140), 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000040)}, 0x10) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 03:36:24 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x1000000000000022, &(0x7f0000000000)=0xfffffffffffffffd, 0x3a) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) 03:36:24 executing program 1: clock_adjtime(0x0, &(0x7f0000000100)={0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 03:36:24 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x200000004, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000006140), 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000040)}, 0x10) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 03:36:24 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000040)=""/79, 0x4f, 0x0) [ 1163.095433][ T26] kauditd_printk_skb: 2 callbacks suppressed [ 1163.095450][ T26] audit: type=1804 audit(2000000184.328:935): pid=3631 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir441605446/syzkaller.Ef4v6m/1112/bus" dev="sda1" ino=16698 res=1 [ 1163.222220][ T3619] overlayfs: unrecognized mount option "Wo" or missing value 03:36:24 executing program 1: clock_adjtime(0x0, &(0x7f0000000100)={0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}) 03:36:24 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x3ffffffffffffab, 0x0) [ 1163.252747][ T26] audit: type=1804 audit(2000000184.424:936): pid=3639 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir441605446/syzkaller.Ef4v6m/1112/bus" dev="sda1" ino=16698 res=1 [ 1163.574087][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1163.580027][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1163.585928][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1163.591721][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1163.643938][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1163.649793][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:36:25 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000080)) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x1000000000016) 03:36:25 executing program 5: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) pread64(r0, &(0x7f0000000040)=""/79, 0x4f, 0x0) 03:36:25 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x200000004, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000006140), 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000040)}, 0x10) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 03:36:25 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x4000000000000087) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) io_setup(0x101, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000356ff0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000001ec0)="5ba81c8b", 0x4}]) 03:36:25 executing program 0: ioctl(0xffffffffffffffff, 0xffffffffffffffbd, &(0x7f00000000c0)) semget$private(0x0, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(0xffffffffffffffff, 0xc0305710, 0x0) r0 = creat(&(0x7f0000000a80)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x10, 0x5, 0x1000f4) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000140)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="576f00734800baca6043836a213578c1b0016f8cf6b50be866e4096db2b5013e19d3561ef8a5c48fd2165e692d4d3ba9353241f194ca0d4fef89fa4c4b1132b2b359a3b8733da8f284d77c2978cf3f1556bf36546355f6d266388eccfe2f137047adbac1be5665fde84d9786a4adc61d723dc92222ac8a1db465a8bf7e047921d5774564a4ada8a9e920995cbc38aa88f754856d96c29d2846"]) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x0, 0x2) sendfile(r1, 0xffffffffffffffff, 0x0, 0x0) getsockname$inet(r2, &(0x7f0000000000)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000200)=0x14, 0xffffffffffffff2e) r3 = open(&(0x7f00000008c0)='./bus\x00', 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8000fffffffe) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) write$FUSE_STATFS(r3, 0x0, 0x0) 03:36:25 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x200000004, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r1, &(0x7f0000000a80)={&(0x7f0000000180)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000006140), 0x0, &(0x7f0000000ac0)=ANY=[]}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000040)}, 0x10) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) 03:36:25 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') sendfile(r0, r1, 0x0, 0x80000001) 03:36:25 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") socket$packet(0x11, 0x3, 0x300) pipe(&(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) [ 1164.121592][ T26] audit: type=1804 audit(2000000185.355:937): pid=3666 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir441605446/syzkaller.Ef4v6m/1113/bus" dev="sda1" ino=17203 res=1 [ 1164.169468][ T3654] overlayfs: unrecognized mount option "Wo" or missing value 03:36:25 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000180)={0xfffffff, 0x9, 0x0, [], 0x0}) [ 1164.239914][ T26] audit: type=1804 audit(2000000185.435:938): pid=3671 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir441605446/syzkaller.Ef4v6m/1113/bus" dev="sda1" ino=17203 res=1 03:36:25 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x400000000000486, 0x0, &(0x7f0000000000)=0x1e5) 03:36:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='devpts\x00', 0x0, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20, &(0x7f0000000400)=ANY=[@ANYBLOB="6d6f64653d30303030303030303030303030303030303030302caa"]) 03:36:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x141003, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r2, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', 0x0}) dup2(r1, r0) socket$inet6_udp(0xa, 0x2, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000100)) socket$l2tp(0x18, 0x1, 0x1) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 03:36:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x141003, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r2, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', 0x0}) dup2(r1, r0) socket$inet6_udp(0xa, 0x2, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000100)) socket$l2tp(0x18, 0x1, 0x1) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 03:36:28 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xff00000000000000, 0x0, 0x0, 0xd}, 0x98) syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x2) ioctl(r1, 0x4, &(0x7f00000000c0)="174867baefb12f0c9b39906db6bd56b631ea0a434a53c42ecc9810d0b1b02d26865bb38556a52a129d07465e5d53ef13b00ef4e209efcff906d42be487b17754b893fd77913add65") 03:36:28 executing program 2: r0 = socket(0x15, 0x80005, 0x0) getsockopt(r0, 0x114, 0x1000000002710, 0x0, &(0x7f000033bffc)) 03:36:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') sendfile(r0, r1, 0x0, 0x80000001) 03:36:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x10) 03:36:28 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 03:36:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x141003, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r2, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', 0x0}) dup2(r1, r0) socket$inet6_udp(0xa, 0x2, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000100)) socket$l2tp(0x18, 0x1, 0x1) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 03:36:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x10) 03:36:28 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x800, 0x0, 0xff, 0x1}, 0x20) r1 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x800, 0x2}, 0x20) 03:36:28 executing program 2: r0 = socket$kcm(0x11, 0x8400000000003, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000040)={&(0x7f00000000c0)=@nfc={0x27, 0x6}, 0x80, &(0x7f0000000000), 0xf}, 0x0) 03:36:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x141003, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r2, 0x89f1, &(0x7f0000000180)={'ip6gre0\x00', 0x0}) dup2(r1, r0) socket$inet6_udp(0xa, 0x2, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000100)) socket$l2tp(0x18, 0x1, 0x1) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 03:36:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x10) 03:36:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') sendfile(r0, r1, 0x0, 0x80000001) [ 1167.723932][ C0] net_ratelimit: 18 callbacks suppressed [ 1167.724041][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1167.735558][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1167.741410][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1167.747219][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1167.804065][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1167.810955][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1167.883942][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1167.889804][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:36:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbd1b) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0xff00000000000000, 0x0, 0x0, 0xd}, 0x98) syz_open_dev$swradio(0x0, 0x1, 0x2) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x2) ioctl(r1, 0x4, &(0x7f00000000c0)="174867baefb12f0c9b39906db6bd56b631ea0a434a53c42ecc9810d0b1b02d26865bb38556a52a129d07465e5d53ef13b00ef4e209efcff906d42be487b17754b893fd77913add65") 03:36:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000080)=ANY=[@ANYBLOB="0f238de98fb6fb"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:36:29 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x8001, 0x0) r1 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x80000000000d) 03:36:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0), 0xc, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x10) [ 1168.603947][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1168.609881][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1172.763947][ C0] net_ratelimit: 22 callbacks suppressed [ 1172.763957][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1172.775496][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1172.843960][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1172.849844][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1173.963949][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1173.969801][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1173.975673][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1173.981484][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1174.043992][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1174.049814][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1178.133976][ C0] net_ratelimit: 18 callbacks suppressed [ 1178.133986][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1178.145603][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1178.151428][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1178.157249][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1178.203963][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1178.209782][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1178.283961][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1178.289829][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1179.003942][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1179.009761][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1183.163951][ C0] net_ratelimit: 22 callbacks suppressed [ 1183.163960][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1183.175560][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1183.243955][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1183.249963][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1184.373944][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1184.379778][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1184.385686][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1184.391779][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1184.444000][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1184.449863][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1188.523943][ C0] net_ratelimit: 18 callbacks suppressed [ 1188.523953][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1188.535517][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1188.541322][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1188.547174][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1188.603964][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1188.609789][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1188.683950][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1188.689752][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1189.403963][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1189.409793][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1193.563946][ C0] net_ratelimit: 22 callbacks suppressed [ 1193.563956][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1193.575512][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1193.643954][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1193.649805][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1194.763948][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1194.769764][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1194.775677][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1194.781456][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1194.843950][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1194.849831][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1198.923942][ C0] net_ratelimit: 18 callbacks suppressed [ 1198.923951][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1198.935484][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1198.941297][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1198.947133][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1199.003956][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1199.009773][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1199.083975][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1199.089785][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1199.803948][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1199.809756][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1203.963949][ C0] net_ratelimit: 22 callbacks suppressed [ 1203.963959][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1203.975591][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1204.044000][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1204.049920][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1205.163945][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1205.169752][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1205.175648][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1205.181564][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1205.243955][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1205.249771][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1209.323945][ C0] net_ratelimit: 18 callbacks suppressed [ 1209.323955][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1209.335522][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1209.341427][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1209.347499][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1209.403963][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1209.409796][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1209.483943][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1209.489745][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1210.203950][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1210.209766][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1214.363946][ C0] net_ratelimit: 22 callbacks suppressed [ 1214.363957][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1214.375510][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1214.443959][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1214.450147][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1215.563952][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1215.569769][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1215.575717][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1215.581577][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1215.643954][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1215.649778][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1219.723950][ C0] net_ratelimit: 18 callbacks suppressed [ 1219.723959][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1219.735550][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1219.741371][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1219.747233][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1219.803952][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1219.809779][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1219.883943][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1219.889771][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1220.603949][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1220.609846][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1224.763943][ C0] net_ratelimit: 22 callbacks suppressed [ 1224.763953][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1224.775541][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1224.843962][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1224.849951][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1225.963949][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1225.969789][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1225.975672][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1225.981432][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1226.043992][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1226.049808][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1230.123977][ C0] net_ratelimit: 18 callbacks suppressed [ 1230.123987][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1230.135835][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1230.141888][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1230.147732][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1230.203950][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1230.209860][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1230.283930][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1230.289743][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1231.003965][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1231.009798][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1235.163948][ C0] net_ratelimit: 22 callbacks suppressed [ 1235.163958][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1235.175562][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1235.243962][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1235.249810][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1236.363956][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1236.369811][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1236.375737][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1236.381517][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1236.453966][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1236.459780][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1240.523974][ C0] net_ratelimit: 18 callbacks suppressed [ 1240.523983][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1240.535639][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1240.541797][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1240.548613][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1240.603959][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1240.609788][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1240.683931][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1240.689748][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1241.403943][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1241.409775][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1245.563950][ C0] net_ratelimit: 22 callbacks suppressed [ 1245.563960][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1245.575507][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1245.643954][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1245.649793][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1246.763944][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1246.769735][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1246.775608][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1246.781430][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1246.843959][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1246.849833][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1250.923954][ C0] net_ratelimit: 18 callbacks suppressed [ 1250.923963][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1250.935593][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1250.941461][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1250.947620][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1251.004013][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1251.009853][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1251.083975][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1251.089790][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1251.803945][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1251.809752][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1255.963946][ C0] net_ratelimit: 22 callbacks suppressed [ 1255.963956][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1255.975578][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1256.043996][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1256.049814][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1257.163951][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1257.169781][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1257.175683][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1257.181534][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1257.243952][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1257.249780][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1261.323945][ C0] net_ratelimit: 18 callbacks suppressed [ 1261.323955][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1261.335523][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1261.341352][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1261.347416][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1261.403959][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1261.409806][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1261.483948][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1261.489759][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1262.203957][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1262.209973][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1266.363966][ C0] net_ratelimit: 22 callbacks suppressed [ 1266.363975][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1266.375537][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1266.443974][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1266.449829][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1267.563957][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1267.569850][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1267.575733][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1267.581526][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1267.643958][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1267.649789][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1271.723955][ C0] net_ratelimit: 18 callbacks suppressed [ 1271.723964][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1271.735585][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1271.741412][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1271.747250][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1271.803948][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1271.809757][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1271.883936][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1271.889763][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1272.603954][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1272.609788][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1276.763957][ C0] net_ratelimit: 22 callbacks suppressed [ 1276.763966][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1276.775505][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1276.843959][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1276.849844][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1277.963954][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1277.969772][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1277.975650][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1277.981439][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1278.044004][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1278.049934][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1282.123985][ C0] net_ratelimit: 18 callbacks suppressed [ 1282.123994][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1282.135550][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1282.141361][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1282.147220][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1282.203961][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1282.209793][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1282.283948][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1282.289748][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1283.003950][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1283.009764][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1287.163951][ C0] net_ratelimit: 22 callbacks suppressed [ 1287.163961][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1287.175491][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1287.243975][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1287.249836][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1288.363964][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1288.369808][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1288.375742][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1288.381555][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1288.443969][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1288.449805][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1292.523950][ C0] net_ratelimit: 18 callbacks suppressed [ 1292.523959][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1292.535583][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1292.541416][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1292.547455][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1292.603953][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1292.609789][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1292.683953][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1292.689751][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1293.403945][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1293.409740][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1297.563937][ C0] net_ratelimit: 22 callbacks suppressed [ 1297.563947][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1297.575481][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1297.643966][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1297.649923][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1298.763944][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1298.769762][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1298.775655][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1298.781437][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1298.843958][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1298.849841][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1302.923953][ C0] net_ratelimit: 18 callbacks suppressed [ 1302.923962][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1302.935487][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1302.941430][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1302.947282][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1303.003958][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1303.009782][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1303.083970][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1303.094124][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1303.803939][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1303.809745][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1307.963942][ C0] net_ratelimit: 22 callbacks suppressed [ 1307.963951][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1307.975467][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1308.044004][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1308.049817][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1309.163970][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1309.169784][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1309.175692][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1309.181478][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1309.243954][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1309.249772][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1313.323953][ C0] net_ratelimit: 18 callbacks suppressed [ 1313.323963][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1313.335537][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1313.341331][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1313.347226][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1313.403962][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1313.409783][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1313.483939][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1313.489787][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1314.203948][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1314.209813][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1318.363944][ C0] net_ratelimit: 22 callbacks suppressed [ 1318.363953][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1318.375509][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1318.443962][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1318.450100][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1319.563955][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1319.569793][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1319.575684][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1319.581472][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1319.643952][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1319.649784][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1323.723948][ C0] net_ratelimit: 18 callbacks suppressed [ 1323.723957][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1323.724266][ T1043] INFO: task syz-executor.4:3712 blocked for more than 143 seconds. [ 1323.729686][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1323.743886][ T1043] Not tainted 5.0.0-next-20190306 #4 [ 1323.749323][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1323.760860][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1323.762495][ T1043] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1323.783617][ T1043] syz-executor.4 D28232 3712 888 0x00000004 [ 1323.790813][ T1043] Call Trace: [ 1323.802592][ T1043] __schedule+0x817/0x1cc0 [ 1323.807172][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 1323.807228][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 1323.828466][ T1043] ? __lockdep_free_key_range+0x120/0x120 [ 1323.838791][ T1043] ? __sched_text_start+0x8/0x8 [ 1323.843682][ T1043] ? perf_trace_lock+0xeb/0x510 [ 1323.853396][ T1043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1323.868448][ T1043] ? debug_smp_processor_id+0x3c/0x280 [ 1323.877297][ T1043] schedule+0x92/0x180 [ 1323.881416][ T1043] schedule_timeout+0x8ca/0xfd0 [ 1323.883972][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1323.891961][ T1043] ? wait_for_completion+0x294/0x440 [ 1323.892184][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1323.900331][ T1043] ? find_held_lock+0x35/0x130 [ 1323.913701][ T1043] ? usleep_range+0x170/0x170 [ 1323.921526][ T1043] ? mark_held_locks+0xa4/0xf0 [ 1323.932090][ T1043] ? _raw_spin_unlock_irq+0x28/0x90 [ 1323.940536][ T1043] ? wait_for_completion+0x294/0x440 [ 1323.951615][ T1043] ? _raw_spin_unlock_irq+0x28/0x90 [ 1323.961069][ T1043] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1323.972191][ T1043] ? trace_hardirqs_on+0x67/0x230 [ 1323.980489][ T1043] ? kasan_check_read+0x11/0x20 [ 1323.991102][ T1043] wait_for_completion+0x29c/0x440 [ 1323.999333][ T1043] ? wait_for_completion_interruptible+0x4b0/0x4b0 [ 1324.011380][ T1043] ? __call_srcu+0x3a8/0xcc0 [ 1324.020234][ T1043] ? wake_up_q+0xf0/0xf0 [ 1324.030198][ T1043] __synchronize_srcu+0x197/0x250 [ 1324.038470][ T1043] ? call_srcu+0x10/0x10 [ 1324.042741][ T1043] ? rcu_gp_is_expedited+0xb0/0xb0 [ 1324.058259][ T1043] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1324.068760][ T1043] ? ktime_get_mono_fast_ns+0x178/0x200 [ 1324.078956][ T1043] synchronize_srcu+0x239/0x3e8 [ 1324.089431][ T1043] perf_trace_event_unreg.isra.0+0xcb/0x220 [ 1324.100035][ T1043] perf_trace_destroy+0xc1/0x100 [ 1324.109375][ T1043] ? perf_tp_event_init+0x120/0x120 [ 1324.118977][ T1043] tp_perf_event_destroy+0x16/0x20 [ 1324.128490][ T1043] _free_event+0x356/0x13b0 [ 1324.133036][ T1043] ? ring_buffer_attach+0x650/0x650 [ 1324.142699][ T1043] put_event+0x47/0x60 [ 1324.151197][ T1043] perf_event_release_kernel+0x693/0xc60 [ 1324.161279][ T1043] ? put_event+0x60/0x60 [ 1324.169946][ T1043] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1324.190990][ T1043] ? perf_event_release_kernel+0xc60/0xc60 [ 1324.201286][ T1043] perf_release+0x37/0x50 [ 1324.210198][ T1043] __fput+0x2e5/0x8d0 [ 1324.219727][ T1043] ____fput+0x16/0x20 [ 1324.223744][ T1043] task_work_run+0x14a/0x1c0 [ 1324.232762][ T1043] exit_to_usermode_loop+0x273/0x2c0 [ 1324.242514][ T1043] do_syscall_64+0x52d/0x610 [ 1324.251547][ T1043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1324.261883][ T1043] RIP: 0033:0x457f29 [ 1324.270211][ T1043] Code: Bad RIP value. [ 1324.278795][ T1043] RSP: 002b:00007fe9a2652c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 1324.291929][ T1043] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000457f29 [ 1324.308758][ T1043] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1324.322548][ T1043] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1324.339172][ T1043] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9a26536d4 [ 1324.351495][ T1043] R13: 00000000004f4e52 R14: 00000000004ce9f8 R15: 00000000ffffffff [ 1324.369266][ T1043] INFO: task syz-executor.4:3735 blocked for more than 143 seconds. [ 1324.381632][ T1043] Not tainted 5.0.0-next-20190306 #4 [ 1324.391769][ T1043] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1324.416863][ T1043] syz-executor.4 D30120 3735 888 0x00000004 [ 1324.423247][ T1043] Call Trace: [ 1324.431022][ T1043] __schedule+0x817/0x1cc0 [ 1324.439840][ T1043] ? __mutex_lock+0x721/0x1310 [ 1324.449627][ T1043] ? __sched_text_start+0x8/0x8 [ 1324.458882][ T1043] schedule+0x92/0x180 [ 1324.462987][ T1043] schedule_preempt_disabled+0x13/0x20 [ 1324.472908][ T1043] __mutex_lock+0x726/0x1310 [ 1324.483049][ T1043] ? perf_trace_init+0x58/0x250 [ 1324.492317][ T1043] ? mutex_trylock+0x1e0/0x1e0 [ 1324.501777][ T1043] ? perf_trace_lock+0xeb/0x510 [ 1324.511138][ T1043] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1324.522032][ T1043] ? __lockdep_free_key_range+0x120/0x120 [ 1324.532431][ T1043] ? perf_event_alloc.part.0+0xef5/0x3200 [ 1324.542529][ T1043] ? find_held_lock+0x35/0x130 [ 1324.551800][ T1043] mutex_lock_nested+0x16/0x20 [ 1324.561003][ T1043] ? mutex_lock_nested+0x16/0x20 [ 1324.570389][ T1043] perf_trace_init+0x58/0x250 [ 1324.579461][ T1043] perf_tp_event_init+0xa6/0x120 [ 1324.588880][ T1043] perf_try_init_event+0x137/0x3f0 [ 1324.598591][ T1043] perf_event_alloc.part.0+0xfa0/0x3200 [ 1324.603951][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 1324.609952][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 1324.610270][ T1043] ? __perf_event_read+0xe10/0xe10 [ 1324.629459][ T1043] ? kasan_check_read+0x11/0x20 [ 1324.637403][ T1043] ? do_raw_spin_unlock+0x57/0x270 [ 1324.642733][ T1043] __do_sys_perf_event_open+0x830/0x24e0 [ 1324.656942][ T1043] ? perf_event_set_output+0x4e0/0x4e0 [ 1324.662457][ T1043] ? put_timespec64+0xda/0x140 [ 1324.671694][ T1043] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1324.681647][ T1043] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 1324.691910][ T1043] ? do_syscall_64+0x26/0x610 [ 1324.701009][ T1043] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1324.711457][ T1043] ? do_syscall_64+0x26/0x610 [ 1324.720817][ T1043] __x64_sys_perf_event_open+0xbe/0x150 [ 1324.730875][ T1043] do_syscall_64+0x103/0x610 [ 1324.741080][ T1043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1324.751636][ T1043] RIP: 0033:0x457f29 [ 1324.759898][ T1043] Code: Bad RIP value. [ 1324.773157][ T1043] RSP: 002b:00007fe9a2631c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1324.786083][ T1043] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 0000000000457f29 [ 1324.799754][ T1043] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000002025c000 [ 1324.810821][ T1043] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1324.827190][ T1043] R10: ffffffffffffffff R11: 0000000000000246 R12: 00007fe9a26326d4 [ 1324.839595][ T1043] R13: 00000000004c4591 R14: 00000000004d7cf8 R15: 00000000ffffffff [ 1324.852297][ T1043] [ 1324.852297][ T1043] Showing all locks held in the system: [ 1324.864611][ T1043] 1 lock held by khungtaskd/1043: [ 1324.869653][ T1043] #0: 0000000032a5dba0 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 1324.888537][ T1043] 1 lock held by rsyslogd/7698: [ 1324.893420][ T1043] #0: 000000009725bca8 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 1324.910589][ T1043] 2 locks held by getty/7810: [ 1324.917403][ T1043] #0: 00000000a011d131 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1324.946738][ T1043] #1: 0000000008786143 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1324.962503][ T1043] 2 locks held by getty/7811: [ 1324.970203][ T1043] #0: 000000004fffd61c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1324.987555][ T1043] #1: 0000000050b8072f (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1325.001570][ T1043] 2 locks held by getty/7812: [ 1325.013057][ T1043] #0: 00000000aeea8977 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1325.027661][ T1043] #1: 00000000efc50b6c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1325.041798][ T1043] 2 locks held by getty/7813: [ 1325.050840][ T1043] #0: 00000000e58051d4 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1325.064311][ T1043] #1: 000000003cf2636b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1325.080990][ T1043] 2 locks held by getty/7814: [ 1325.093410][ T1043] #0: 000000006b0ea685 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1325.109682][ T1043] #1: 00000000a66fad51 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1325.121146][ T1043] 2 locks held by getty/7815: [ 1325.132740][ T1043] #0: 00000000d32486a2 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1325.143675][ T1043] #1: 00000000882bb412 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1325.162003][ T1043] 2 locks held by getty/7816: [ 1325.168640][ T1043] #0: 000000001fa36cd5 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1325.186430][ T1043] #1: 00000000db66b049 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1325.202037][ T1043] 4 locks held by kworker/0:6/16350: [ 1325.210722][ T1043] 1 lock held by syz-executor.4/3712: [ 1325.221860][ T1043] #0: 00000000bab10526 (event_mutex){+.+.}, at: perf_trace_destroy+0x28/0x100 [ 1325.239562][ T1043] 3 locks held by syz-executor.4/3735: [ 1325.246978][ T1043] #0: 000000002c73455c (&sig->cred_guard_mutex){+.+.}, at: __do_sys_perf_event_open+0x6d2/0x24e0 [ 1325.266356][ T1043] #1: 000000003142e6c9 (&pmus_srcu){....}, at: perf_event_alloc.part.0+0xd57/0x3200 [ 1325.281631][ T1043] #2: 00000000bab10526 (event_mutex){+.+.}, at: perf_trace_init+0x58/0x250 [ 1325.300003][ T1043] [ 1325.302380][ T1043] ============================================= [ 1325.302380][ T1043] [ 1325.314090][ T1043] NMI backtrace for cpu 1 [ 1325.318446][ T1043] CPU: 1 PID: 1043 Comm: khungtaskd Not tainted 5.0.0-next-20190306 #4 [ 1325.326695][ T1043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1325.336755][ T1043] Call Trace: [ 1325.340060][ T1043] dump_stack+0x172/0x1f0 [ 1325.344402][ T1043] nmi_cpu_backtrace.cold+0x63/0xa4 [ 1325.349617][ T1043] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1325.355260][ T1043] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 1325.361259][ T1043] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1325.367163][ T1043] watchdog+0x9b7/0xec0 [ 1325.371334][ T1043] kthread+0x357/0x430 [ 1325.375441][ T1043] ? reset_hung_task_detector+0x30/0x30 [ 1325.381013][ T1043] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1325.387273][ T1043] ret_from_fork+0x3a/0x50 [ 1325.391958][ T1043] Sending NMI from CPU 1 to CPUs 0: [ 1325.397769][ C0] NMI backtrace for cpu 0 [ 1325.397776][ C0] CPU: 0 PID: 16350 Comm: kworker/0:6 Not tainted 5.0.0-next-20190306 #4 [ 1325.397783][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1325.397787][ C0] Workqueue: events rtc_timer_do_work [ 1325.397794][ C0] RIP: 0010:strlen+0x56/0xa0 [ 1325.397806][ C0] Code: 04 84 c0 75 4d 41 80 3c 24 00 74 3b 48 bb 00 00 00 00 00 fc ff df 4c 89 e0 48 83 c0 01 48 89 c2 48 89 c1 48 c1 ea 03 83 e1 07 <0f> b6 14 1a 38 ca 7f 04 84 d2 75 23 80 38 00 75 de 48 83 c4 08 4c [ 1325.397810][ C0] RSP: 0018:ffff8880972f7948 EFLAGS: 00000002 [ 1325.397819][ C0] RAX: ffffffff87dae18a RBX: dffffc0000000000 RCX: 0000000000000002 [ 1325.397824][ C0] RDX: 1ffffffff0fb5c31 RSI: ffff88821890d0c0 RDI: ffffffff87dae180 [ 1325.397830][ C0] RBP: ffff8880972f7960 R08: 0000000000000000 R09: ffffed1012e5ef55 [ 1325.397835][ C0] R10: ffffed1012e5ef54 R11: 0000000000000003 R12: ffffffff87dae180 [ 1325.397840][ C0] R13: ffffffff84a4ac26 R14: ffffffff8898d4c0 R15: ffff8880972f7a20 [ 1325.397846][ C0] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 1325.397851][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1325.397856][ C0] CR2: 000000000070e6b4 CR3: 0000000093e79000 CR4: 00000000001406f0 [ 1325.397862][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1325.397868][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1325.397871][ C0] Call Trace: [ 1325.397875][ C0] perf_trace_lock+0xb1/0x510 [ 1325.397879][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1325.397883][ C0] ? debug_smp_processor_id+0x3c/0x280 [ 1325.397888][ C0] ? __lockdep_free_key_range+0x120/0x120 [ 1325.397892][ C0] ? mark_held_locks+0xf0/0xf0 [ 1325.397895][ C0] ? perf_trace_lock+0x510/0x510 [ 1325.397900][ C0] ? rtc_handle_legacy_irq+0x76/0xd0 [ 1325.397904][ C0] lock_release+0x587/0xa00 [ 1325.397908][ C0] ? kasan_check_write+0x14/0x20 [ 1325.397911][ C0] ? do_raw_spin_lock+0x12a/0x2e0 [ 1325.397915][ C0] ? lock_downgrade+0x880/0x880 [ 1325.397919][ C0] ? rtc_handle_legacy_irq+0x2c/0xd0 [ 1325.397924][ C0] _raw_spin_unlock_irqrestore+0x1f/0xe0 [ 1325.397928][ C0] rtc_handle_legacy_irq+0x76/0xd0 [ 1325.397932][ C0] rtc_uie_update_irq+0x20/0x30 [ 1325.397936][ C0] ? rtc_aie_update_irq+0x30/0x30 [ 1325.397939][ C0] rtc_timer_do_work+0x1cc/0xeb0 [ 1325.397944][ C0] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1325.397948][ C0] ? rtc_irq_set_freq+0x3a0/0x3a0 [ 1325.397952][ C0] ? perf_trace_lock+0x510/0x510 [ 1325.397956][ C0] process_one_work+0x98e/0x1790 [ 1325.397960][ C0] ? rtc_irq_set_freq+0x3a0/0x3a0 [ 1325.397964][ C0] ? process_one_work+0x98e/0x1790 [ 1325.397968][ C0] ? pwq_dec_nr_in_flight+0x320/0x320 [ 1325.397971][ C0] ? lock_acquire+0x16f/0x3f0 [ 1325.397975][ C0] worker_thread+0x98/0xe40 [ 1325.397979][ C0] ? trace_hardirqs_on+0x67/0x230 [ 1325.397982][ C0] kthread+0x357/0x430 [ 1325.397986][ C0] ? process_one_work+0x1790/0x1790 [ 1325.397991][ C0] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1325.397995][ C0] ret_from_fork+0x3a/0x50 [ 1325.409552][ T1043] Kernel panic - not syncing: hung_task: blocked tasks [ 1325.705291][ T1043] CPU: 1 PID: 1043 Comm: khungtaskd Not tainted 5.0.0-next-20190306 #4 [ 1325.713534][ T1043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1325.723642][ T1043] Call Trace: [ 1325.726960][ T1043] dump_stack+0x172/0x1f0 [ 1325.731314][ T1043] panic+0x2cb/0x65c [ 1325.735232][ T1043] ? __warn_printk+0xf3/0xf3 [ 1325.739835][ T1043] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1325.745671][ T1043] ? ___preempt_schedule+0x16/0x18 [ 1325.750816][ T1043] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 1325.756994][ T1043] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 1325.763158][ T1043] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 1325.769327][ T1043] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 1325.775519][ T1043] watchdog+0x9c8/0xec0 [ 1325.779737][ T1043] kthread+0x357/0x430 [ 1325.783821][ T1043] ? reset_hung_task_detector+0x30/0x30 [ 1325.789384][ T1043] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1325.795643][ T1043] ret_from_fork+0x3a/0x50 [ 1325.801062][ T1043] Kernel Offset: disabled [ 1325.805399][ T1043] Rebooting in 86400 seconds..