00000000000006000000003440000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='auxv\x00') ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000140)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f00000001c0)={r1, 0x4}) msgget(0x1, 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f00000000c0), 0x4) connect$vsock_dgram(r2, &(0x7f0000000000)={0x28, 0x0, 0xffffffff, @reserved}, 0x10) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000000200)=ANY=[@ANYBLOB="920000000000b1927503000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f00000006c0)) sendfile(r3, r4, 0x0, 0x1) creat(&(0x7f0000000400)='./file0\x00', 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x8) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:28 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000003e40000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:28 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1622d, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:28 executing program 1: getpgrp(0x0) r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x200082) fcntl$getown(r0, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo/3\x00') r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)=0x0) r4 = syz_open_procfs(r3, &(0x7f0000000040)='\x03\x00\x00\x00\x00\x00\x00\x00e\n') sendfile(r2, r4, 0x0, 0x1) write$binfmt_aout(r0, &(0x7f0000000400)={{0x1cf, 0xc3d5, 0x10000, 0x12, 0x49, 0x1, 0x3aa, 0x80}, "ba3104f8d7fde1f16a0e25e78560117bc75f898ec1455f2700a72a998cc6bd935a730c0363f06910d9b3c38412a1d842c64d467b74ee91f0512aa70d344c359fa9458b80ccd82a9150be13be329a19074b71cf46801e4dc0f5da2148b18402ab957d76843566e3383dc88cc9973ed96294daae15a8c32bac4dda27da410f974271e45ba6c893a6283553fea1012fe982f1a02382340ca7cc5c996017c41ba6af5b8fbe10bdd9245881711f2452919ce35faca7bc02f8"}, 0xd6) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffb000/0x3000)=nil, 0x3000}, 0x1}) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)}], 0x1) 21:47:28 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xc3ffffff00000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c02"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = fcntl$dupfd(r0, 0x406, r0) sendto(r1, &(0x7f0000000340)="600ccc006da88ac056bb440ccce084dd3591ca1a94a3237148799a98743daa1c05f77b2dc1f8d5ee0b16b4e1e3e12fa7e7bdcd31cdbbd78fe7c8af80a36f1b646994621eb12dbe42855e8ff0c27977cac01d428e5397f4744ec9d14e251fa3fcce734ac97f70ae148d6ab4448c6a86e0339a607b5e9a4b2e44b569e170fe68e266d53129085c1ce74a05f08f4d1ac4fa78fae16dbd4d33d670bdfbde30310b0e81506ef8c480ca96ca839893e337826b27e336377542e005", 0xb8, 0x0, &(0x7f0000000280)=@un=@file={0x1, './file0\x00'}, 0x80) ioctl$TIOCNXCL(r1, 0x540d) read$FUSE(r0, &(0x7f0000001f00), 0x1000) fcntl$dupfd(r0, 0x0, r1) r2 = gettid() r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) bind$rxrpc(r3, &(0x7f0000000080)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e24, 0xfffffffffffff66d, @ipv4={[], [], @empty}, 0x8}}, 0x24) tkill(r2, 0x15) ioctl$sock_inet_tcp_SIOCINQ(r3, 0x541b, &(0x7f0000000040)) syz_emit_ethernet(0x17d, &(0x7f0000000480)={@random="20ef7a809e31", @remote, [{[], {0x8100, 0x3ff, 0x100000000, 0x4}}], {@ipv6={0x86dd, {0x9, 0x6, "41807b", 0x143, 0x7f, 0x3, @ipv4={[], [], @empty}, @ipv4={[], [], @broadcast}, {[@dstopts={0xbf, 0x1c, [], [@pad1, @calipso={0x7, 0x40, {0x1, 0xe, 0x3ff, 0x7163, [0x800, 0x20, 0x8, 0x1ff, 0x401, 0x27a, 0x8]}}, @calipso={0x7, 0x38, {0xffffffffffffff47, 0xc, 0xfffffffffffffcb2, 0x100000001, [0x1, 0xcb, 0x7ff, 0x3, 0x8001, 0x1f]}}, @enc_lim={0x4, 0x1, 0x9}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x50, {0x6, 0x12, 0x5, 0x9, [0xfffffffffffffffd, 0x0, 0x3, 0x5, 0x2, 0x2, 0x8001, 0x0, 0xc000000000000000]}}]}, @fragment={0x87, 0x0, 0x1, 0x8, 0x0, 0x7, 0x64}, @hopopts={0xbf, 0x3, [], [@hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @enc_lim={0x4, 0x1, 0x7}, @jumbo={0xc2, 0x4, 0x100}]}], @tipc=@payload_direct={{{{0x23, 0x0, 0x2, 0x9, 0x75e2, 0x8, 0x42e339238cc64baf, 0x2, 0x54a, 0x0, 0x1, 0x4, 0xc7f9a976cc6ec49e, 0x3, 0x0, 0x20, 0x2, 0x4e23, 0x4e20}, 0x0, 0x4}}, [0x0, 0x0, 0x0]}}}}}}, &(0x7f00000000c0)={0x1, 0x1, [0x43c, 0xf73, 0x545, 0x8f1]}) read$FUSE(r0, 0x0, 0x2f) 21:47:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000004840000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067f9a05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:47:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x181, 0x0) 21:47:30 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1622e, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:30 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xc401000000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:31 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000004f40000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') fcntl$dupfd(r1, 0x40a, r0) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000000)) 21:47:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:31 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000006840000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:31 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1622f, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:31 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xd360010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3210.210409][ C0] net_ratelimit: 25 callbacks suppressed [ 3210.210419][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3210.222117][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3210.290330][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3210.290352][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3210.296254][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3210.302021][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3210.307848][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3210.319252][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3210.380399][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3210.386262][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:47:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000008340000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e20, @remote}}, 0x2e0, 0x7, 0x1, 0xdab4, 0x8}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r2, 0xbac3, 0x34b2a0d0}, &(0x7f00000001c0)=0x10) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f00000006c0)=""/4096) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r3, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067f9b05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:47:34 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='w=\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:47:34 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16230, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:34 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xd460010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000040)='4', 0x36}], 0x1, 0x0) 21:47:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000c840000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000d040000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) sendmsg$nl_route_sched(r1, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000400)={&(0x7f00000008c0)=ANY=[@ANYBLOB="280000002600000128bd7000fbdbe42500000040b30afe318f823833b20d3fd4cd9ab258b76cb8bd9ba1b756d38039ba73c627ebb5394380bd2729e3cdf50475eaf266697cc396e1a6d3dc74388cbfd5e05df587f334239f8658b277d757a14e0e1b197e14893debc10f18cefed1036163bc2697b9e4f7c3e2f68659bf34fd3c7654b2b22bf7aa7b8261436983f668d9f29a92f15c27381064317621a3ebf43bafc278047897ba89636e8a3a39caee3da4477c111c8958ec090b07c5e8275223279bf7096bf484f602cdacc70b28ed1fa920766547f76692ab9a4d98b6ebe9ffb2aa4e6c02c5a1d7", @ANYRES32=r3, @ANYBLOB="0f000900ffff0000faff0f0004000a00"], 0x28}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) fcntl$dupfd(r0, 0x0, r2) ioctl$BLKGETSIZE64(r2, 0x80081272, &(0x7f0000000040)) 21:47:34 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xd560010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:34 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16231, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r1, &(0x7f0000000000), 0x4) sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000fe40000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067f9c05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:47:37 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000013000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:37 executing program 1: r0 = syz_open_dev$mouse(&(0x7f00000006c0)='/dev/input/mouse#\x00', 0x5, 0x40) ioctl$LOOP_CLR_FD(r0, 0x4c01) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000000)) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) r3 = syz_open_procfs(r2, &(0x7f00000000c0)='net/ip_mr_vif\x00') r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r3, r4, 0x0, 0x1) setsockopt$netlink_NETLINK_RX_RING(r4, 0x10e, 0x6, &(0x7f0000000100)={0xd2, 0x948, 0x5f, 0x100}, 0x10) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x800, 0x0) ioctl$DRM_IOCTL_VERSION(r5, 0xc0406400, &(0x7f0000000480)={0x2, 0x0, 0x7, 0xf2, &(0x7f00000001c0)=""/242, 0x57, &(0x7f00000002c0)=""/87, 0xd3, &(0x7f0000000380)=""/211}) 21:47:37 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xd660010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000050c0), 0x606) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000340)={0xdcbe, {{0xa, 0x4e20, 0x40000000000000, @ipv4={[], [], @multicast1}, 0x1}}}, 0x88) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r1, &(0x7f0000001f00), 0x1000) r2 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r2, 0x15) read$FUSE(r0, 0x0, 0xfffffffffffffd87) 21:47:37 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16232, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067f9d05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 3214.891277][ T2578] Unknown ioctl -1069521920 21:47:37 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000014000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x4) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:37 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16233, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:37 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000003b000000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='cle\x03\x00@\x00\x00\x00\x00\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000000)="caa764fbee7e01dd2e1e61dc7d9fd213b2e29317fe646fdab060c3754f057a4d8e3c9405111ebf7a00336f1f42aa2de7b3c4ca4052df889422a5c313b0000fc04e8405734ec46ee7acbd778cfc4a1cdb3082b5538e56b491a17ad5a51ef18e45c74cb67318e1a6643c34f245b6702cd32e69ce5bfbaf80b181ea786f1075", 0x7e}, {&(0x7f00000000c0)="6a97d2d059942f3027e40981d01f9298d748d4ccbd4f880e", 0x18}, {&(0x7f0000000100)="77b2c5c4d541eac6466296eba6558a2aa6a97b99e58297140caf3f3abab086a3747db6e5b2c35b1c70e6d7bc77f0852fd21df69a8e321dc94b6d87f6", 0x3c}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000016c0)="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", 0x1000}, {&(0x7f00000001c0)="e88dc99282df651158c5a1c9bb281b851d457f96fcf7c38734c06a464f8da450cc1d42b2dc68c8f3a837adcf31155ce1aae10f451363e7ba30c8e431585648729a0266cede03f4e11389ddc7555a3a323e4a67b114b017969eb66d60bc863657e6e1d3f925af8c77c7bac2ac9f2cbcb44fabcf862937ceff61c6dbc9933dd1eaa01dd09b622a7a0905c486af27ad58cf4cc7c1c50980c04abf000f30a9700ede5288960263801ede4c3654b784c41ed203c92a7316b2d7855243859d3084aef83ee020f0564f11f06155377ec337239a2a563f9a44f6a9747d8498461f27441285fe3dfe68ca42", 0xe7}, {&(0x7f0000000140)="06309fde432f2829eec961bc7929537e9fb50e330b86a935d25a24022260c2686362cc", 0x23}], 0x7) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) ioctl$UI_DEV_CREATE(r1, 0x5501) 21:47:37 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xd760010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067f9e05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:47:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)=0x0) r3 = syz_open_procfs(r2, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r3, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:37 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040020000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3216.450361][ C0] net_ratelimit: 25 callbacks suppressed [ 3216.450371][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3216.461964][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3216.530347][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3216.536318][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3216.540388][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3216.542252][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3216.547925][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3216.553789][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3216.620459][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3216.626270][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:47:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040030000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x37c}], 0x1, 0x0) 21:47:40 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16234, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:40 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xd803000000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067f9f05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:47:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f00000000c0)={0x2, [0xffffffffffffffff, 0xf82]}, 0x8) getsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000040), &(0x7f0000000080)=0x4) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:47:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040040000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000800)='net/packet\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r2, r1, 0x0, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000a80)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00TZ\x10\x9a<\xfc\xddv\xf1+\x9d=\xf8Tc\xe6\xb9Cu\xba\xacR`q\xc7\x8e\x97O\xa4\xc1\a\xb4\xb4$') r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r2, r3, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040050000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:40 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xd860010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:40 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16235, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040070000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:40 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r1, 0x0, 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fa005ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:47:41 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xd960010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:41 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000cc0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r3, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) socket$rds(0x15, 0x5, 0x0) 21:47:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="66643d6b53c6e8f7164bf0d4d2331059d0603b43a7a77cdaebf549efe418a08d4d5a18fa325d18902613eaef", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:47:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040080000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:43 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16236, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:43 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xda60010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='\xb8') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='limits\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x0) syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3, 0x2000) fanotify_init(0x41, 0x109402) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fa105ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:47:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040090000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = getpgid(0xffffffffffffffff) r2 = syz_open_procfs(r1, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r2, r3, 0x0, 0x1) fchmod(r2, 0x0) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:43 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = gettid() setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x7, 0x4) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x5, 0x0, 0x6, 0x6b5, 0x101}) getpgid(r2) r3 = syz_open_procfs(r2, &(0x7f0000000ac0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r3, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:43 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16237, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000400a0000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:43 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xdb60010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3222.690403][ C0] net_ratelimit: 26 callbacks suppressed [ 3222.690410][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3222.701962][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3222.770353][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3222.770358][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3222.770440][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3222.776178][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3222.793762][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3222.799518][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3222.850490][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3222.856324][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:47:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) write$FUSE_DIRENT(r0, &(0x7f00000000c0)={0x38, 0xfffffffffffffff5, 0x3, [{0x3, 0x7, 0xc, 0xffffffff00000001, '\n^proc.eth1&'}]}, 0x38) rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x0, 0x5, 0x6}, 0x3}, 0x20, 0x1, 0x0) r2 = gettid() r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r2, 0x15) read$FUSE(r0, 0x0, 0x2f) socket$rds(0x15, 0x5, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r3, 0x10e, 0x3, &(0x7f0000000140)=0x80, 0x4) 21:47:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f00000001c0)={'broute\x00', 0x0, 0x3, 0x6f, [], 0x1, &(0x7f0000000000)=[{}], &(0x7f00000000c0)=""/111}, &(0x7f0000000040)=0x78) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000400e0000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fa205ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:47:46 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16238, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:46 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xdc60010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040100000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) r3 = accept$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@ipv4={[], [], @local}, @in6=@dev={0xfe, 0x80, [], 0x23}, 0x4e20, 0x0, 0x4e24, 0x1, 0xa, 0x80, 0x80, 0x2f, r4, r5}, {0x6, 0x4, 0xffff, 0x8, 0x1, 0xffffffffffffff1f, 0x9, 0x8}, {0x5, 0xff, 0x2a, 0x4b3}, 0x3f, 0x6e6bb4, 0x3, 0x1, 0x0, 0x1}, {{@in6=@mcast1, 0x4d2, 0x7f}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x11}, 0x34ff, 0x1, 0x1, 0x1, 0xbbf, 0xe3, 0x2}}, 0xe8) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000440)=@req={0x28, &(0x7f0000000400)={'dummy0\x00', @ifru_map={0x20, 0x800, 0x0, 0x7, 0x2, 0x23}}}) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:46 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xdd60010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040160000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:46 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r1, 0x0, 0x6) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='\x00', 0x1}], 0x215, 0x0) 21:47:47 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16239, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c75736529aa69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = shmget$private(0x0, 0x200000, 0x800, &(0x7f0000dfd000/0x200000)=nil) shmctl$IPC_RMID(r1, 0x0) read$FUSE(r0, &(0x7f00000050c0), 0x404) fdatasync(r0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000000480), 0xda5af9395c56ae2f) r2 = gettid() r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r2, 0x15) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.syz\x00', &(0x7f0000000340)=""/129, 0x81) ioctl$NBD_SET_SIZE(r3, 0xab02, 0xffffffffffff8001) read$FUSE(r0, 0x0, 0x2f) 21:47:49 executing program 1: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000200)='clear_refs\x00') r2 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x8, 0x6, 0xfff, 0xc0, 0x0, 0x5, 0x0, 0x3, 0x2, 0x14, 0xda, 0x7, 0x101, 0x3d, 0x6, 0xc0f9, 0x20, 0x4, 0x5, 0x193, 0x3, 0xff, 0xffffffff, 0x8001, 0xfffffffffffffffd, 0x24d6, 0xeef2, 0xfdf0, 0xfffffffffffffffc, 0x4, 0x5, 0x8, 0x0, 0x2, 0x7, 0x8f5b, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000000), 0x1}, 0x8182, 0x8000, 0x6a, 0xb, 0x1, 0x224d94ea, 0x9c}, r2, 0xa, r1, 0x8) r3 = syz_open_procfs(r2, &(0x7f00000002c0)='environ\x00') r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') connect$caif(r4, &(0x7f0000000140), 0x18) sendfile(r3, r4, 0x0, 0x20000001) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040340000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fa305ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:47:49 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xde60010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:49 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1623a, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000403e0000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') close(r0) fcntl$getflags(r1, 0x40b) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:50 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xdf60010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040480000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:50 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x400, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @loopback, @loopback}, &(0x7f0000000380)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000003c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000480)=0x14) getpeername$packet(0xffffffffffffffff, &(0x7f0000001800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001840)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f00000056c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000005700)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000005740)={0x0, @remote, @local}, &(0x7f0000005780)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000057c0)={'vcan0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005800)={0x0, @rand_addr, @multicast1}, &(0x7f0000005840)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000005ac0)={{{@in6=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000005bc0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000005cc0)={0x0, @remote, @initdev}, &(0x7f0000005d00)=0xc) accept4$packet(0xffffffffffffff9c, &(0x7f0000005d40)={0x11, 0x0, 0x0}, &(0x7f0000005d80)=0x14, 0x80800) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000062c0)={@mcast2, 0x0}, &(0x7f0000006300)=0x14) getsockname$packet(0xffffffffffffff9c, &(0x7f0000006340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000006380)=0x14) accept4(0xffffffffffffff9c, &(0x7f0000006480)=@can={0x1d, 0x0}, &(0x7f0000006500)=0x80, 0x80800) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000006540)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000006640)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000006680)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000013080)={0x0, @loopback, @multicast1}, &(0x7f00000130c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000013100)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000013240)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000013340)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000013380)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000013480)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f00000134c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000013500)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000013c40)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x9020000}, 0xc, &(0x7f0000013c00)={&(0x7f0000001880)=ANY=[@ANYBLOB="b0060000", @ANYRES16=r1, @ANYBLOB="00032abd7000fddbdf250300000008000100", @ANYRES32=r2, @ANYBLOB="e801020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000300000008000600", @ANYRES32=r3, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000900000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004007f00000008000600", @ANYRES32=r4, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000800000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004005000000008000600", @ANYRES32=r5, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="3c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d00003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="08000100", @ANYRES32=r8, @ANYBLOB="ac01020040000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000100004006c6f616462616c616e6365003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400010000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r10, @ANYBLOB="3c00010024006e6b7570000000000000000000000000000000000000001f000800030006000000040004006100060020eae6cf0d04f085de31ae1cd3d4f723ee8d7c23dab6d99b19f10d7d5639e8160c02d94bb770db2b971605e14cab8b4150ec239d957cacc23a109869895ac97902a3e044", @ANYRES32=r11, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r12, @ANYBLOB="080007000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="080007000000000008000100", @ANYRES32=r14, @ANYBLOB="3c01020038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400060000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r15, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004005600000008000600", @ANYRES32=r16, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400010000004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000008000100", @ANYRES32=r17, @ANYBLOB="ac0102003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r18, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000180000008000600", @ANYRES32=r19, @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c000400010045ff070000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r20, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r21, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000800000008000600", @ANYRES32=r22, @ANYBLOB="65725f6c696e6b75705f656e613ec8d75d0000000000000000000000000008000300060000000400040008000600", @ANYRES32=r23], 0x6b0}, 0x1, 0x0, 0x0, 0x4040000}, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000001000000000000002b0e2bb33a6258c1f5330000180000005013009ccb1b7c06e6000000"], &(0x7f0000000040)='syzkaller\x00', 0x88, 0x1000, &(0x7f00000006c0)=""/4096, 0x41f00, 0x0, [], 0x0, 0x7}, 0x48) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x8000, 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) r25 = fcntl$getown(r24, 0x9) r26 = syz_open_procfs(r25, &(0x7f0000000340)='clear_refs\x00') r27 = syz_open_procfs(r25, &(0x7f00000016c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r28 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/attr/exec\x00', 0x2, 0x0) sendfile(r27, r28, 0x0, 0x1) pwritev(r26, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:50 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1623b, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3228.930391][ C0] net_ratelimit: 25 callbacks suppressed [ 3228.930401][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3228.943740][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3229.010338][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3229.010343][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3229.010399][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3229.016190][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3229.033506][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3229.039406][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3229.090458][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3229.096329][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:47:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x5}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f0000000040)='./file0\x00', 0x40302, 0x8) tkill(r1, 0xf) read$FUSE(r0, 0x0, 0x2f) openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 21:47:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000404f0000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:52 executing program 1: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f00000001c0)='\xab\xcc$\x8dI\xb1O\x14\xadQ/s\xb90\x1cJs=\xb0\xe0q\x85\xf9Ct\xa2LQ\x9b\xfa\xdf\xe7%\xdaG\xf5\x9a\xcd\x1a\x0eo\xf63^\x9d\xbbk\x14Y\xf9\x88\f\xca\xa8\x8d\x050?\xed\xcfuD7\xd9\x97\x8c+S$\x9e7\xa7=\t\xf8\x1d\xf4o!,\td9\xad\xe3\xcdw\xef\xe2HQ\xf0[\xb6:\x83\xcdT\xa6p\x91;\xac\x8f\xa9\x83\xc4\x9b\xf3z\xf4G&\x85\xdc\xc1\xa4S?\xbd`?\x13\xa7\xe6![0}\xb5\x99\xba>-D\x83\x0e\xe5q\xa0\xac\x81\xab\x8d\xc8nuc\x1c\xb0\xe6~\x1e5\x86\xa3R\xcb\xf4\xf3\x7f\xef\x1e\xfc%\xa0b5\xc3\x8c\xd8s^H8\xd38a2\x8f\xce^\xe5\xf3\xa8\xf9#Y\xb0\xff)7\x8b\xd3\x9a\xc0\xd6\x03o\x02\'\xab\x95\xe3\xf98\xe6\xb1\xc0\xaa\xe3\x17L%\x05\x8e\xfb\xfb(g\x94\xf7\x8f\xc66\xd7=\xf0\xdfI\xe2\xc0') r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r2, r3, 0x0, 0x4) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fa405ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:47:52 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xe060010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:52 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1623c, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:52 executing program 1: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000140)='net/ip6_tables_matches\x00') r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') recvfrom$inet(r2, &(0x7f00000001c0)=""/155, 0x9b, 0x100, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r4, 0xfffffffffffffeff, 0x7c9e}, &(0x7f0000000180)=0x8) sendfile(r2, r2, 0x0, 0x1) pwritev(r1, &(0x7f0000000400)=[{&(0x7f00000006c0)="fec24a84ba89fcb063dee7258507ca954ac6d4ddc7b32ea0e6fe0d6bbe27621a06f2ae5a0be858ac9b296324ebb0700f5e716fb8a7b38cffb1b524a8c2c7563e11cacc5e35848cce49ec3d102144e7e63acb3222bf575672f7c7bad7bc52b7a32effaa28ab7cd0cb4d764021a3646983fd89fa95a94c2f450a803e5f4df712eaea896a84c82173f631628229c232aad253880e381382f30b51f2e0c24ae932ab79dd670f5691a43538be3c9f25a1efaeeddbce9a384b51e9cb6abbe5f38c2ddff0419d43574884acb9b58061e6816e1ab37048f6d4ea71ae809c6aea4f495e1dd55aaf788b1966b56c95", 0xea}, {&(0x7f0000000440)="6c756e9ccaa24731b4d6c2406f79189f91d8096dab3bf31104d0b6894b7887518b1f4fb14c0caacf91691b9208257a51db8b58ee3c3679b2d2f9", 0x3a}], 0x2, 0x0) 21:47:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040640000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x402000, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:47:53 executing program 1: r0 = getpgrp(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='smaps\x00') r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x8, 0x10}, &(0x7f0000000280)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000440)={r4, 0x1c, &(0x7f0000000400)=[@in6={0xa, 0x4e20, 0x401, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x7fff}]}, &(0x7f00000006c0)=0x10) sendfile(r2, r3, 0x0, 0x1) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r3, 0x84, 0x79, &(0x7f00000001c0)={r5, 0x9f01, 0x4a07785f}, 0x8) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000000), &(0x7f0000000040)=0x4) 21:47:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040680000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:53 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1623d, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) ioctl$KVM_SMI(r0, 0xaeb7) r3 = syz_open_procfs(r2, &(0x7f00000008c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r3, 0x0, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000400)={{0x8, 0x0, 0x400, 0x1, 'syz1\x00', 0xa6}, 0x3, 0x10000010, 0xf49, r2, 0x2, 0x40, 'syz1\x00', &(0x7f0000000040)=['clear_refs\x00', 'clear_refs\x00'], 0x16, [], [0x1f, 0x1, 0x4, 0x4]}) pwritev(r0, &(0x7f0000000180), 0x0, 0x0) r4 = pkey_alloc(0x0, 0x1000000000b) pkey_free(r4) 21:47:53 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xe160010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040830000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fa505ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:47:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000001c0)={@in={{0x2, 0x4e22, @broadcast}}, 0x0, 0x72, 0x0, "52f7054b84ad79b910e7eb0fc092765831aeaf5e019b61561370aaa25dcfe55e1e647fce49240d00f89993cc845e89ee818e854cfc4dfb39b315b1dc3d3f0ca9e13cc3c7eb898c326ed5d24b1fa3bfee"}, 0xd8) sendfile(r1, r2, 0x0, 0x0) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000000)='<', 0x1}], 0xffffffffffffd03, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000140)={0xfffffffffffffff8, 0x3}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000000c0)={r3, 0xfffffffffffffffc, 0x20, 0x2, 0x5}, &(0x7f0000000100)=0x18) fcntl$dupfd(r1, 0x406, r2) 21:47:53 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xe260010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040c80000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:53 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1623e, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040d00000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x1) r3 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f00000000c0)=0xe8) openat$capi20(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/capi20\x00', 0x20001, 0x0) renameat2(r2, &(0x7f0000000a80)='./file0\x00', r0, &(0x7f0000000ac0)='./file0\x00', 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000000100)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000840)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@initdev}}, &(0x7f0000000480)=0xe8) getresuid(&(0x7f0000000940), &(0x7f0000000980), &(0x7f00000009c0)=0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000d00)={{0x1, 0x3, 0x7, 0x0, 0x800000000}, 0x5, 0x4}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000a00)={0x0, 0x0}, &(0x7f0000000a40)=0xc) recvfrom(r0, &(0x7f0000000bc0)=""/164, 0xa4, 0x40000021, &(0x7f0000000c80)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @broadcast}, 0x4, 0x0, 0x3}}, 0x80) fsetxattr$system_posix_acl(r2, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000b40)={{}, {0x1, 0x7}, [{0x2, 0x7, r3}, {0x2, 0x7, r4}, {0x2, 0x0, r5}, {0x2, 0x4, r6}, {0x2, 0x1, r7}, {0x2, 0x4, r8}, {0x2, 0x2, r9}, {0x2, 0x7, r10}], {0x4, 0x6}, [{0x8, 0x4}], {0x10, 0x2}, {0x20, 0x4}}, 0x6c, 0x1) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x14) read$FUSE(r0, 0x0, 0x2f) 21:47:56 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xe360010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:56 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1623f, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fa605ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:47:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040fe0000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000000)) 21:47:56 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xe402000000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000040), 0x2, r1, 0x0, 0x1, @ib={0x1b, 0x3f, 0x17, {"7a5a05e2471f7d57ed2a97da1bad917b"}, 0x9, 0x4, 0x9}}}, 0xa0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000280)={0x10, 0x30, 0xfa00, {&(0x7f0000000140), 0x0, {0xa, 0x4e21, 0x4, @rand_addr="c125173a5004c3288720e3ceed02c9d2", 0x4}, r1}}, 0x38) sendfile(r2, r3, 0x0, 0x1) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000000)=0x1, 0x4) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040040100000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:56 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16240, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000401f0100000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fa705ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 3235.185244][ C0] net_ratelimit: 26 callbacks suppressed [ 3235.185258][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3235.196804][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3235.250336][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3235.256169][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3235.260345][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3235.262109][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3235.267705][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3235.273456][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3235.330401][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3235.336336][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:47:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PPPIOCSMRU(r1, 0x40047452, &(0x7f0000000080)=0x20) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r2 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r2, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:47:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_ta\xc8\xed6\"\x8c\x90wK\x84\x11\xbf\xf7h\xdf\x81\xb9/\x12bles_mat') sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040ef0100000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:59 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xe403000000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:59 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16241, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fa805ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:47:59 executing program 1: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)='selinuxem1cpuset\x00'}, 0x30) gettid() ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000240)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f0000000200)='net/llc\x00') r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') ioctl$EVIOCGEFFECTS(r3, 0x80044584, &(0x7f0000000400)=""/80) sendfile(r2, r3, 0x0, 0x1) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000040)={0x1, 0x10000}) fchdir(r1) syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x1, 0x8000) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000000)=0x40) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040f40100000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:59 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xe460010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:47:59 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') open_by_handle_at(r0, &(0x7f00000001c0)={0xfd, 0xffffffff, "a2dd1bc87ad37d07ef88526c0d360588d5d437b12548690e8c9c2b22f6c04462ea4a9b5956ca056f1a90a24a1dbe65e046fe5fe5f80df087b49af4a4f91f8f98e2160a9e1c1356e42d0e047d8bf6289189824e3e9db11319dbe61b207f87e08bd69f628c79f42b7ae7aaea8974cda0112087a5dca381531190062c1e4f31ad0153a6d6268df0487b0dba66e20cc164f617a83f814f53f079c7484f90d8c3cca18af2f02e6623f8e43f5eccd8632e561268dcdb01e1cbc53175cd6c213b8f02ac17a82461cef7baa1e5dc714e6d4b03963388915cf2e57bb8271eb91057a584838344b58d47ec7d8e55627efb6dddeae30191826fad"}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:47:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040400200000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:47:59 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16242, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000300000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@mcast1}}, &(0x7f0000000040)=0xe8) fsetxattr$security_capability(r1, &(0x7f0000000000)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x4, 0x8}, {0x4, 0x7fffffff}], r2}, 0x18, 0x3) r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r3, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fa905ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:02 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xe4ffffff00000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r2, 0x0, 0xfffffffffffffffd) 21:48:02 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16243, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040e80300000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:02 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000000), 0x4) sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000500000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:03 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xe560010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:03 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f00000000c0)={0xe, 0x7, 0x6}) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000d40)={{0xa, 0x6, 0x100, 0x7ff, 'syz0\x00'}, 0x3, 0x433, 0x84f, r3, 0x4, 0x7a82, 'syz0\x00', &(0x7f00000006c0)=['loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{', 'loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{', 'loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{', 'clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00'], 0x642, [], [0x80, 0x2, 0x2, 0x1]}) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f0000000280)) sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x840010}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r4, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3f6c}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}]}, 0x28}}, 0x10) write$P9_RFLUSH(r0, &(0x7f0000000040)={0x7, 0x6d, 0x1}, 0x7) 21:48:03 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16244, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000700000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:03 executing program 1: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000040)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='cle\x02\x00_refs\x00') sendmsg$nl_generic(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1004}, 0xc, &(0x7f0000000140)={&(0x7f00000006c0)={0x364, 0x38, 0x201, 0x70bd27, 0x25dfdbfc, {0x11}, [@generic="9d2328dc1e9c3ab277fdf105dcea37c9fa7a43c8d9d28e571d7f6e870cce6b", @typed={0x8, 0x21, @pid=r0}, @typed={0x8, 0x59, @pid=r0}, @nested={0xf4, 0x30, [@generic="27a4c105995f8d989fa01fe476383d6da24f4574f803383c2c5c18eac2c1174c2d8b46ba91f9b40b03bd4e5ef085de224624703cb5d96f27acd11265ec69c7121df5a2469095276417d8775d703c46ba93d9953516b8167ed6e3852d8a009db66e318e1219ed800d2a0c2339f69024bcae28684a77ae686f73bf7a91ff87b5554a5f123e06f7e31f6e24f757a584ec444ab4689cf22cec6e4a57f2ce7618370bf883c55944f7edf7262f426824957e528634600f9557052716dba9df5da7bf1fd17a46d5d021e36729bc30e8fcdfcfee38a7819c00dcce737f70f75f2480a9ad31fda42d67837b7a013e83394ddd6130"]}, @nested={0x22c, 0x6b, [@typed={0x104, 0x8b, @str='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00'}, @typed={0x14, 0x5e, @ipv6=@dev={0xfe, 0x80, [], 0x11}}, @typed={0x8, 0x5e, @str='-\x00'}, @generic="00a8d05b467d23d4661ad8cfe36e56ec5cc1fd7d709d5456c376ad03796ec9483a0679e3f528deda45f469b723ea8044ca76b92406f0cda72170a42a9f6bb741291780d8c7f4910c830b61e93a8f5c1482a3c09b8eeb5c3de6331bc7c8543ed48f21674203a8bbe8ddba5918cf2756b27c173457101e14110ad16616fb960d23200be585e8f467d6284cda1878390e2d304c2ef55d6c8163fc0089bf7d883f5c7f407b2d5aac574b6f462abd911637f318f8ac096e6da78b0737b19bb6f44283339dd080f052e94b3e1f", @typed={0x8, 0x4a, @pid=r0}, @typed={0x10, 0x71, @str='cle\x02\x00_refs\x00'}, @typed={0x8, 0x4c, @str='\x00'}, @typed={0x8, 0x2f, @ipv4=@multicast2}, @typed={0x8, 0x19, @fd=r1}, @typed={0xc, 0x87, @u64=0x100000000}]}]}, 0x364}, 0x1, 0x0, 0x0, 0x40}, 0x20000010) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x40, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x10880, 0x0) sendfile(r2, r3, 0x0, 0x1) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000240)) 21:48:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067faa05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:03 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xe660010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3241.410340][ C0] net_ratelimit: 24 callbacks suppressed [ 3241.410350][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3241.422202][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3241.490773][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3241.497099][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3241.501297][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3241.503024][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3241.509215][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3241.514393][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3241.570715][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3241.577130][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:48:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000006c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\x89\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b8\x18\biz\xe8\xd1\xdf]\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06\xca\xa15\xac\r\xe0r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00}@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00D\f\x1f\x81\x85\x8b\xc0\x8f\x0e\x1f8\xa7\x9c\xa2?\\\xe5J8P\x10A\xd22\x8f-\x97\x93\xf96\xab\x0e\xecF5\xcd\'\x89\xa7J\x9c) \x0e\xc1\xd7y\x16\x14\xfa\x0eUW6v\xe6;\xb1/\x9eQ\xed\xfbV^\xa7\xe3/\xccktH:\x0e\x88\xc6\x12\xd5\x8b\xda@\x99\xb3N.\x8e\xb4O\xb5\xe9\xbb\xbb\xe0\\Baq\v`\xd4xu\x82\b\x8e\x85kZ\xba?\x95SEI\x97\xe086ES\xc4\x90\xda\xeb)-0\\Ka\x86\b\xb8>\xb7\xb2?\\\x91)\xa8\x85\xfd\xadn;\x1c_\x1fZ\xae#\x95\x90\x888+\xa8Z\xc0\xf6\x17\x96\xea\xa7\x06sXm\x0102\x8c\xa4:2\t0,\rN\xb3\x86\x88\t\x18\xfc=F\x89\x03()\x85\x87\x9a+\xab\x9c;\xa0\a%\xd7Z\xab|\xc5\xf8*a\x00n\xa7UCd\xafpj#\xba/\xc6;x\xb2\xcb\xee\x13') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000900000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:05 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16245, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:05 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xe760010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f0000000080)='net/icmp6\x00') futimesat(r2, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}) r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000280)=@add_del={0x2, &(0x7f0000000200)='vxcan1\x00'}) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r3, 0xc040564b, &(0x7f0000000040)={0xa1, 0x0, 0x0, 0x3ff, 0x420000000000000, {0x8, 0xffffffffffff3e02}, 0x1}) 21:48:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fab05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000a00000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180), 0xc21, 0x0) 21:48:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r1, 0x0, 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000e00000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:06 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16246, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:06 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xe802000000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f00000000c0)={0x10000, 0x4fca, 0x0, 'queue0\x00', 0x8}) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040001600000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:06 executing program 1: syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r1, 0x0, 0x1) pwritev(r1, &(0x7f0000000440)=[{&(0x7f00000000c0)="069260b81fb07598c5b24112888941bae4ca62e7323d9d78e317e879188e82fc81900888a684760c9b38d215b4537f851c6aa5df8c7d9f9ba88c66a0c47e48ad20c02d134ebd8cd3bd0a3857238dc8ccc5830841fe343b7fb9116a23b3585ac5878ba64918403acc83a030d7b1c92d9da39d2258a2294daf8564cf5c242a85f27b6a2d7235ae3d60c4d6e76e74551ada389e3b02411a6f22ef8b028ed3e21236655486d50c", 0xa5}, {&(0x7f00000001c0)="0b298d3c2eab5c485145c0d58928312ad41ca194f32023ad89df23f94133aa178cac6f0359141286328ca4ef4e5897b8af659bb8b43977eaec84b0868e403040e76fa7db342b3047038d5cda83cffe7ec9f29a21bac42be68bcdb3d9cdf5cfe4ccc3c06a4dcfc29131c7226ed85749f579b8572bf89454e2f091d842d50c6cde1f7fb927d6fed9bb4c92d1dbba35b20d9f946e7d23a199b45244f34d2a28a6c0a96a63dfb6d879570377f6a3fa8a6fbc710ff734ae8134acfb91ef7d89", 0xbb}, {&(0x7f00000006c0)="46cbe6f5fdf3f10d14b51a5b99cd29f68864fd733822d58e711c13a46130afb80a3fa365b069741cd3b4a173c5fa3f174ced0417cabfb7a1e2f0ddf2b58077004c9810ff3b421e2f9685ae35f9a18c57f537d2e8fc24c3f333f84b332df72a615c60c1dbc6fc504fbbd893aa814b4ca655d335732c839999205d38412bef60bc900910187eac64d8eb5b2b05c9f2f0a0aa0a29d6a270a3e213f1a1e2fffbc023162881b77fde7ad3853b8908d5859d2413eeec92f6d711177dd85f806065e6cfd21da8", 0xc3}, {&(0x7f0000000000)="f476479cebe99c32afe35acd963f5b5cc2fe39920ccad0d7452470a847c92f215b870b9011a793e07c110acfab1320c27e80ea633016537022356fb22180bdef3c19775e7922ba26b027db2e45fe8480ef729e1d3dc0e00fdac52e5a79b2c6b8a8f1f917fb9f2200cc584570df67e3f91794dd00c8f03152cdfd22", 0x7b}, {&(0x7f0000000280)="a4938c7c24eb31db27f0003012b7bbc3589608a5bb3ccfc675346d10f8250f83b12ac267905550", 0x27}, {&(0x7f00000007c0)="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", 0x1000}, {&(0x7f0000000400)="0fae7d6685e758d8801153ddff95bb4f9f5b3b0b7a3e434ced82be", 0x1b}], 0x7, 0x40) finit_module(r1, &(0x7f0000000080)='clear_refs\x00', 0x2) 21:48:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000404c1d00000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fac05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:08 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16247, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:08 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') epoll_create1(0x80000) sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:08 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xe803000000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040011f00000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x8000) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r2 = gettid() r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x10) tkill(r2, 0x15) write$binfmt_elf64(r3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x973) read$FUSE(r0, 0x0, 0x2f) 21:48:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040002000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r0, r1, 0x0, 0x3f) getsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000000)="1ef04b86dddc1810e2f7ef31d777734c", 0x10}], 0x1, 0x0) 21:48:09 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xe860010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:09 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16248, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000140)=0xffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={0x0, r0, 0x0, 0x1, &(0x7f0000000240)='\x00', 0xffffffffffffffff}, 0x30) capset(&(0x7f00000002c0)={0x200f1526, r1}, &(0x7f0000000300)={0x6, 0xfffffffffffffff8, 0x0, 0x6, 0x7, 0x6}) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x8) r3 = getpgrp(0x0) rt_sigqueueinfo(r3, 0x18, &(0x7f00000001c0)={0x3, 0x7, 0x6}) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x4000, 0x0) sendfile(r2, r0, 0x0, 0x1) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000000)=""/127) write$rfkill(r2, &(0x7f0000000380)={0x1, 0x4}, 0x8) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040753000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fad05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040003400000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:09 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r1, 0x10, 0x0, @in={0x2, 0x4e21, @empty}}}, 0x90) r2 = syz_open_procfs(0x0, &(0x7f0000000940)='setgro\x8cp{\x00') r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r2, r3, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) r4 = gettid() ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f00000001c0)=r4) 21:48:09 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xe960010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:09 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16249, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040983a00000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') open(&(0x7f0000000040)='./file0\x00', 0x2000, 0xb0) fcntl$getownex(r1, 0x10, &(0x7f00000001c0)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000100)='projid_map\x00') getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r3, 0x84, 0x1a, &(0x7f0000000200)={0x0, 0x8f, "83ebe67e8d0765e6676438b32fc346fefed7a425cb4591a3ea4e7cc5cde772772969601cc50c676dcca59401dc40e6ad02db028b1b4c44a667027ed051bce1a88a13cddf25894e38efd48017d3691c00edec44e9c443a4bead2d975263f1a02c4400b354233809b6a984a844bf34162015388da97066b3af5dd3926dec16fe386fb80a1c424e492d8e2afed6e09f7e"}, &(0x7f00000000c0)=0x97) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000400)={r4, @in6={{0xa, 0x4e21, 0x247, @dev={0xfe, 0x80, [], 0x1c}, 0x65df}}, 0x1, 0x7ff, 0x3, 0x1000, 0x2}, &(0x7f0000000140)=0x98) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000000)=0x800) readahead(r0, 0x7fffffff, 0x9) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x80800, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x5}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x30, r3, 0x400, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x3d91719800000, 0x200, 0x9, 0x1f}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x1) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) [ 3247.650413][ C0] net_ratelimit: 25 callbacks suppressed [ 3247.650421][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3247.661978][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3247.730393][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3247.736366][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3247.740333][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3247.747945][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3247.753867][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3247.759666][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:48:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') socket$nl_crypto(0x10, 0x3, 0x15) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) ioctl$NBD_CLEAR_QUE(r2, 0xab05) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000000)='syz0\x00') [ 3247.810407][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3247.816323][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:48:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040003e00000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:10 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xea60010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:10 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1c1, &(0x7f00000007c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{'}, 0x30) r1 = syz_open_procfs(r0, &(0x7f0000000100)='clear_refs\x00') fchmod(r1, 0xa8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r3 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) r4 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r2, r4, 0x0, 0x1) fsetxattr$trusted_overlay_nlink(r3, &(0x7f00000000c0)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U+', 0x5}, 0x28, 0x3) fstat(r3, &(0x7f00000001c0)) pwritev(r1, &(0x7f0000000040)=[{&(0x7f00000006c0)="dc86311fbe7f9cd5766ed5d08b058b563931a2016143af7cc115e73bd9ef04b1c1464f08b7829334e4731ca32ce0cdd4d33b353896e0f37a79310c758afe910cf607411e3c55f8528962064bd74be674971661e44e5416a0688740a3cd49fdcc68fccae9c9b9587495903beedd3296d577e623dd7545dc559deac772906bc8b04789a167554fa3036b16004d19c86dd945d8aa3909dd9b940f2dea339214b0c68070017b5a98452e7cce86f4a60b95a093e623d29089f26596e2087a97fd0af50c5c1c4543b5a1f48bdc19c6acb182a90fd231e955df9beac3b32661ed10750ce92129af977065c2", 0xe8}, {&(0x7f0000000000)="fe49a5a79cc1f2649b9b8982efab38a194ff0fe7088e89deaff074a28cc16c9b7b", 0xfffffffffffffd0c}], 0x2, 0x0) 21:48:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fae05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:10 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1624a, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040004000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:10 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xeb60010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:10 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xe, 0x9, 0xf, 0x10, 0x0, 0x70bd2a, 0x25dfdbfd, [@sadb_ident={0x2, 0xb, 0x3, 0x0, 0x80000000}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x4e23, 0xfdce, @ipv4={[], [], @empty}, 0x4}, @in6={0xa, 0x4e20, 0xfffffffffffffffe, @loopback, 0xd5}}, @sadb_lifetime={0x4, 0x7, 0x0, 0x8, 0x1ff, 0x1}]}, 0x80}}, 0x41) sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040024000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000)=0x0) r2 = fcntl$getown(0xffffffffffffff9c, 0x9) getpgid(r2) getpgrp(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r1, r0, 0x0, 0xd, &(0x7f0000000140)='\xc2vmnet0)user\x00', 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r2, r0, 0x0, 0xfffffffffffffdfb, &(0x7f00000006c0)='/}(,trusted\x00', r3}, 0x30) fcntl$getownex(r0, 0x10, &(0x7f00000008c0)={0x0, 0x0}) r5 = syz_open_procfs(r4, &(0x7f0000000440)='net/igm\xafK\xf0\x1a\x9c\xee\xeb\x8b\xd71\xcb\x85\xed@%7\xa47\x19\xe0]\x1df\xc5>\xeb\xc3\x8c.\xf3\x8a\xe6\x89Z\xa0\xc5\xd64\xe7q\xd8\x98\'\x06\x8f P\xd7ay\x82:\xa1h\x9c\x16o\x8c\xd5\x85~\xeb\x9c\x9f&\xa8\x8a\xb3\')\xb2\xc9V\xc6o\x98\x04D\xff\xff\xc3s\x86\xca\r3h\x8c\x83\"') r6 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') ioctl$KDENABIO(r0, 0x4b36) sendfile(r5, r6, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f00000000c0)) ioctl$EVIOCRMFF(r6, 0x40044581, &(0x7f0000000040)=0x1) 21:48:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x14, &(0x7f0000000040)='mime_type/security}\x00', 0xffffffffffffffff}, 0x30) r2 = getpid() rt_tgsigqueueinfo(r1, r2, 0xc, &(0x7f0000000280)={0x30, 0x200, 0x5}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r3 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r3, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:48:13 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1624b, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:13 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xec60010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040004800000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:13 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200400, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r2, 0x8000000000000001, 0x9, &(0x7f0000479000)="890528e4", 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f000063a000)=0x7fff, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000d84000)={0xa, 0x2, 0x0, @loopback}, 0x1c) listen(r3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x62) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r1, 0x0, 0x16, &(0x7f0000000040)='selinuxproc-\"&{wlan1{\x00', 0xffffffffffffffff}, 0x30) gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r1, 0x0, 0xb, &(0x7f0000000100)='clear_refs\x00'}, 0x30) r7 = getpid() r8 = syz_open_procfs(r7, &(0x7f00000001c0)='task\x00') kcmp$KCMP_EPOLL_TFD(r4, r6, 0x7, r1, &(0x7f0000000300)={r1, r2, 0x2}) r9 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r8, r9, 0x0, 0x1) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) ioctl$FS_IOC_GETFSLABEL(r5, 0x81009431, &(0x7f0000000200)) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000380)='nv\x00', 0x3) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000001a40)={r1, r8}) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000006c0)={{{@in=@empty, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@remote}}, &(0x7f0000000440)=0xe8) r11 = add_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000900)="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", 0x1000, 0xfffffffffffffffa) r12 = request_key(&(0x7f0000001980)='big_key\x00', &(0x7f00000019c0)={'syz', 0x0}, &(0x7f0000001a00)='/Xposix_acl_access\'mime_type]ppp0eth0\x00', 0xfffffffffffffff8) setsockopt$IPT_SO_SET_ADD_COUNTERS(r9, 0x0, 0x41, &(0x7f0000001a80)={'filter\x00', 0x4, [{}, {}, {}, {}]}, 0x68) keyctl$search(0xa, r11, &(0x7f0000001900)='rxrpc_s\x00', &(0x7f0000001940)={'syz', 0x2}, r12) clock_gettime(0x0, &(0x7f00000007c0)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f00000008c0)={&(0x7f0000000480)={0x1d, r10}, 0x10, &(0x7f0000000880)={&(0x7f0000000800)=ANY=[@ANYBLOB="0000000041000000ff07000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r13, @ANYRES64=r14/1000+30000, @ANYBLOB="0200000700000000041b00003902d4d6ff95a848b5b64340049896d47eeec67c3a4e9e63d6400d8747727b842723ba388fe5239e133ed034bbc7262deaa29c1f09381649126244f20000000000000000"], 0x80}}, 0x4000010) 21:48:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067faf05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000401d4c00000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:13 executing program 1: getpgrp(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x4000, 0x0) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000480), &(0x7f00000016c0)=0x4) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='clear_re\xf9\x98\x00') ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r2, r3, 0x0, 0x1) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) syz_open_pts(r3, 0x400000) 21:48:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040004f00000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:13 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xed60010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040006400000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:13 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1624c, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3253.890363][ C0] net_ratelimit: 24 callbacks suppressed [ 3253.890372][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3253.901916][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3253.970356][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3253.970361][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3253.970428][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3253.976202][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3253.993599][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3253.999356][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3254.050596][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3254.056418][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:48:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) signalfd4(r0, &(0x7f0000000040)={0x5}, 0x8, 0x800) read$FUSE(r0, &(0x7f00000040c0), 0xffffffffffffffcb) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x5, 0x4000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:48:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fb005ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:16 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x3f, 0x10800) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f00000006c0)={{0x9, 0x1, 0x8, 0x0, 'syz0\x00', 0x4}, 0x1, [0x0, 0x9, 0xe89, 0x0, 0xffffffff, 0x100000001, 0x2, 0x1, 0x5, 0x6, 0x7f, 0x2, 0x8, 0x0, 0x6, 0x9ac, 0x1, 0x4, 0x4, 0x6, 0x21, 0x7, 0x2, 0x9, 0x800, 0x8, 0xe5, 0x9, 0x10000, 0xbab8, 0x0, 0x400, 0x0, 0x100000001, 0x8001, 0x3, 0x5, 0x800, 0x1, 0x5, 0x80000000, 0x81, 0x10000, 0x4, 0xffffffff, 0x80000000, 0x3a9, 0xe1b, 0x9, 0x200, 0xe3, 0x80000000, 0x0, 0xfd, 0xffffffff, 0x7, 0x8eb3, 0x4, 0xc591, 0x8, 0xff, 0xfffffffffffffff9, 0xfff, 0x5, 0x7, 0x0, 0x7ff, 0x1000000000000000, 0x9, 0x9, 0xfff, 0x7af27b3, 0x80, 0x3, 0x4, 0x7fffffff, 0x100000001, 0x1, 0x8f, 0x4, 0xff, 0x2, 0x4, 0x833, 0xc3, 0x6, 0xffffffff, 0x3, 0xfffffffffffeffff, 0x862, 0x9, 0x2, 0x8f, 0x400, 0x7, 0x6cc9, 0xfffffffffffffffe, 0x7, 0x1ff, 0x3, 0x40, 0x5, 0xffffffffffffffff, 0xf50f, 0x3, 0x2, 0xfff, 0x9, 0x101, 0x8, 0x5, 0x6e9, 0x9, 0x1ff, 0x9, 0x9, 0x9, 0xfffffffffffffffb, 0x20, 0x3, 0x8000, 0x2, 0x4, 0x9, 0xfffffffffffff800, 0x4, 0xffffffff, 0x2], {r1, r2+30000000}}) r3 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r5 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r4, r5, 0x0, 0x1) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000000)={0x1}, 0x1) pwritev(r3, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) syz_open_pts(r5, 0x101000) 21:48:16 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040006800000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:16 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xee02000000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:16 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1624d, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:16 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040307500000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000040)={0xfffffffffffffff7, 0x0, 0x0, 0x82}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40106436, &(0x7f00000000c0)={r1, 0x3a98}) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f00000001c0)="26e40aaabd41300adddc77a468a5bd4baf3da45844e82b19a08768435378209549946d45ec7617bda11810d91cd4f1432e95237442189bed9513c4c112f92e660f7f49277fab2a0a96029694866be73c7f1ab1678dd8ff572310a3f5bc76476b0410b2345213975844bcc75b96323ed9a69937c60d97abfeccd477d51c3abcd9baa576d66330995b9ef67bc6b88261954e604f4a7b786b1523448a878e26551f97ee23ced8750afebc47081ca2e74df0050875b195de596972a1163fdfb6fd8d0bb5a84fa531146d1c18e912e93424ea2b1d92aa77987d917de0bd01f5c3a2013b21e4314f90512d727483e825b68732f4f7c4c2832c34cb9a5f0492b43a5f04") sendfile(0xffffffffffffffff, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:16 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040008300000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000000)) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) tee(r1, r0, 0x267, 0x8) 21:48:16 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1624e, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:17 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xee60010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c144dec56a6df8191e5515b67726f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB="64db"]) read$FUSE(r0, &(0x7f0000000340), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'L+', 0x20}, 0x28, 0x2) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:48:19 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000403a9800000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) dup(r0) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fb105ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:19 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1624f, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:19 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xef60010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:19 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000c800000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') socket$tipc(0x1e, 0x2, 0x0) write$binfmt_elf32(r2, &(0x7f00000006c0)={{0x7f, 0x45, 0x4c, 0x46, 0x800, 0x7, 0x1000, 0x1, 0x5, 0x3, 0x3f, 0xfffffffffffffffe, 0xf0, 0x38, 0x397, 0x8, 0x4, 0x20, 0x2, 0x7fff, 0x7, 0x9}, [{0x7, 0xdf7, 0x10000, 0x5, 0x89, 0x100, 0x6b6, 0xd43}, {0x70000000, 0x89f, 0x4, 0x6, 0xffffffff00000000, 0x4, 0x8e3, 0x7a1}], "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", [[], [], []]}, 0x1378) sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) getresuid(&(0x7f0000000000)=0x0, &(0x7f0000000040), &(0x7f00000000c0)) ioprio_set$uid(0x3, r3, 0x0) 21:48:19 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000d000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:20 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16250, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x541081, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r2, r3, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:20 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xf060010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3260.130436][ C0] net_ratelimit: 26 callbacks suppressed [ 3260.130447][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3260.142025][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3260.210356][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3260.210378][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3260.216197][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3260.221942][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3260.227742][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3260.239314][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3260.290410][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3260.296269][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:48:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:48:22 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004003e800000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000000)=0xe8) ioctl$TUNSETOWNER(r2, 0x400454cc, r3) sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fb205ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:22 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16251, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:22 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xf0ffffff00000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:22 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004001ef00000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:22 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000001c0)='[posix_acl_access*\x00', 0xffffffffffffffff}, 0x30) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000240)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000a80)='\x1a\x00\x05\x00v\xc3\xb1\x00m}:S\xee\x11\xd1G=\xcc\xcc\x16\xfa|\x13\xc4\xfc\xe3.`\'OI\xe9#\xa6\x89\xe3CB\x97\x14-`\t\x1f\xcf\xb9t(\xdf_AbXY\xbd\x0f\xe2P\xe1\xcb\x1f\x19\xea\x80\x92\x1c)F_\xc3\xd2hwy\x1f\x88\xca\x9a\xf6\x95\x84R\x14\x18\x89R\x81\xberU\x19\xa87Pe9\xedl8\x9b\xe4\xa0\xae\xee\xa6\xa3n\x00\x04\x00\x00t\xb6\x11K\x05\xa3\xc8\xf5&W\x97b\x1a3\xbd\xf7\xe0\xc1\xaa\x82c\b\xb2!\xad\xfbNs\x96\x9ew\x7f\xd7\xae-\x9e\xf0mB\x92\x87\a\xc6\x8fz\x1c\xf0+\xc4s=\x91\xa3kB\x1d]h\xebH\x80\xa6\x114\x15\x18\xfdQ\b\xb6\x8cz\x1a\x94\xdd\xab\xea\xce\x16\xeb\xa8\xcfj\xed\xe3\x00\x91V\xd5\xea\xd6{\xf2\xe8\xcf=hER,Z\xd5an\x1a\xe1\x04\x02\xe7~\xf7\xc7\a\xd1]\xfe\xf3\x90\x05\xf4C!k\xe2b\xb5 \xf4\x82\xd8\xa8\xf3\xb8\xb0\xf6\x14\xfe\x8c\xc2\xb1\xba\x17x\xfb\xcc\xe8\xe2\x80.[\xcfM\a\"\xecU\x86\x9f\xd5\xdf\xc1x&`T\x05>\xbac\xec\xe6\x993\xbf\x00\x00\x00\x00\x00\x00') lseek(r1, 0x0, 0x1) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f0000000140)=0x7) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') perf_event_open(&(0x7f00000000c0)={0x6, 0x70, 0x23dc, 0x6, 0x3, 0xb2, 0x0, 0x29, 0x2, 0x4, 0x7, 0x20, 0x3, 0xc1, 0x7, 0x3, 0x100000000, 0xffffffffffffffff, 0x2, 0x0, 0x6, 0x3f, 0x4, 0x0, 0x5, 0x5, 0x293, 0x1, 0x1, 0x0, 0x400, 0xfffffffffffffff8, 0x8001, 0x2, 0x1, 0x1ff, 0x3, 0x9, 0x0, 0xeafa, 0x3, @perf_bp={&(0x7f0000000000), 0x4}, 0x8, 0x3, 0x8, 0xf, 0xff, 0x0, 0xfffffffffffffff9}, r0, 0xd, 0xffffffffffffffff, 0xa) r5 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r4, r5, 0x0, 0x1) pwritev(r3, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:23 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004001f400000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:23 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16252, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:23 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xf160010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r1 = getpgrp(0x0) r2 = syz_open_procfs(r1, &(0x7f0000000000)='e\xbbf-\xcb\x86\x05\x123j\xf8\xd6\xd4\xcd#\x90\x9f\xa9M9\xf8\xedK\xf4\xaf|\x1f\x84\x97h\x81\x06\x1d\x9fz\x9a]\x16\xb8\x8d\xd0\xd1S\x7f\x19\x8a\x13*SW\x14<\x024\x12\xdb4\x94\x11D\xd8n\x1c\x1e\x0ew\xe6\xbe\xa4{\xbd\x98\xee\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00\x00\x00') sendfile(r0, r2, 0x0, 0x2) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0x40, 0x0) accept4$tipc(r1, &(0x7f00000002c0)=@id, &(0x7f0000000340)=0x10, 0x80000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r2 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r2, 0x15) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r1, 0xc040564a, &(0x7f0000000040)={0x7cee, 0x0, 0x3018, 0x100000000, 0x4, 0x8, 0x7, 0x1}) read$FUSE(r0, 0x0, 0x2f) 21:48:25 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040fffe00000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x101, 0x2}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={r1, 0xffff, 0x5, [0x0, 0x200, 0x0, 0x3c9, 0xffffffffffffffc1]}, 0x12) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r3 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r2, r3, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fb305ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:25 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16253, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:25 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xf260010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040feff00000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:26 executing program 1: syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x3f, 0x375f40) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) r3 = syz_open_procfs(r0, &(0x7f0000000140)='net/ip_mr_vif\x00') r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') ioctl$DRM_IOCTL_SET_UNIQUE(r3, 0x40106410, &(0x7f00000000c0)={0x5d, &(0x7f0000000000)="fd795fb0096ab9c825df19c3bab1f6f9cb9c27f970dfa513c34454372ad5caeb4bdae697785ec43e12abe2a8152359b3017296a0d7197d9297b2fafaa04dbd3f5bd118bd67b55040a58b739408f51e1ddc3ccb76e378b067f8155d7a48"}) r5 = msgget(0x0, 0x100) msgctl$IPC_SET(r5, 0x1, &(0x7f0000000240)={{0x9, r1, r2, r1, r2, 0x20, 0xfa56}, 0xdd, 0x9, 0x44, 0x2, 0x401, 0x3, r0, r0}) r6 = fcntl$getown(r3, 0x9) r7 = syz_open_procfs(r6, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r4, r7, 0x0, 0x1) pwritev(r3, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000002000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x100000f5, 0x0) 21:48:26 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16254, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040801002000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3266.370430][ C0] net_ratelimit: 25 callbacks suppressed [ 3266.370440][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3266.381960][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3266.450390][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3266.456334][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3266.460453][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3266.467949][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3266.484343][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3266.490107][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3266.530691][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3266.536516][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:48:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000000)={0x8001, 0x1, 0x5}) sendfile(r1, r2, 0x0, 0x1) pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:29 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xf360010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:29 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000004000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:29 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16255, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() mremap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x4000, 0x3, &(0x7f0000ffb000/0x4000)=nil) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:48:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fb405ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:29 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040c80f16000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:29 executing program 1: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x2000, 0x0) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000480)=0xaed, 0x4) syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x40000) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000740)=""/105) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8, &(0x7f0000000100)=0x0) r5 = dup2(r2, r3) setsockopt$packet_tx_ring(r5, 0x107, 0xd, &(0x7f00000006c0)=@req={0x5, 0x7ff, 0x8, 0x380000}, 0x10) io_submit(r4, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r3, &(0x7f0000000140), 0x7000}]) socket$l2tp(0x18, 0x1, 0x1) r6 = syz_open_procfs(r0, &(0x7f0000000040)='map_files\x00') lsetxattr$security_smack_transmute(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x2) listxattr(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)=""/42, 0x2a) fcntl$lock(r6, 0x26, &(0x7f00000001c0)={0x2, 0x2, 0x4600000000000000, 0x100000001, r0}) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='clear_refs\x00\xa0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\x05\x00\xdbs\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xe6a\x86\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x95\xb3\x1b\xea\xea\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'\x9b\xf0i\xa5\xb6\xc2\x98\xfc\x93\xea\xb2\xb1E6I6\xfc?mbZ-\x8eIY\xf4\xc2\x8b\x81N\x8e\x82\x94\x86du5\xf6\xddFES\xba4\xb2\xf1\xab\x8c\x1eKk+\xb7\x00y@\xad\xf8\f\x88h\x83\xd1R\\\xee\xea(\xe7Q\xb4p\xa9\t\xc7\xe7\xa9\x1a\xfd\xabi\xf0\xf1\x9e}\xd8\xca\x7f\xb2f\x00\xbey\xdd!%\xf2\xd0\xe0BPa\xc3\xdck4O\x812\xcd\x86\xca\xd7\xf0\xd7k\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r8 = syz_open_procfs(0x0, &(0x7f00000004c0)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf\x93\x89t\xf4\x8dB\fI\xe5\xb3\t\x00\x00\x00\x00\x00\x00\x00\x19/\x04\x00\x00\x00\x9a+\x9c5\xbf%32\xe8\x83>\xfa\xb8L\xde\xc6<\x1fs\xe1\xdf\x14\xa2^\xd1\xd0n\x14[\xf60 G]\xa8\xd9U\xc0\x99$\x8a\'\fx\xa2\xb1\xc9/\xb4\xfdp4\xc3\"\xea\x95\xce\x10R\xa8p\xc6\xdf\xc8|x\x14\xb8\xa2\xbb\xcaG\xebL\x90\xf5P\xc5\x7f\xe2\x97\x1cr\x84\xc7\xba\x86\x96k1v\x17z{\x91+\xe5r0\x0ez4\x12E\xb2[\xb5\x94\x00\x05\x8b\x83Rl\xd1\xec\x89)Xdig\"2*^\xcd=\xdf\xda\x83%4\xe5_q A!I\xfe\x7f\x9c\x13\xff0G\xc9\x92A\xcf\x03\xaa\xc0G\xaerd\x11\xe6\x00\x00\x00\x00|;\xb1@2\xdbs\x8b4PkG1\xa1`\x90\xd9\a2eL\xef\x8eGX\x8c\xbbA\xa6J\x15=\x17]\xe4Xh\xcfW\xfbt%!\x17`v\xeb\xae,\x9a\xf7\xc0A\xf9\"\\O\x11\xe4\x17\xa6\xb8=\xdb\x1c\xf0E\x8aV%\t\xc1x\xdb\x10\x1e\xe6 \x92YM\xbe*0h\xfa\xf3\r\xca\xd2;\xaai\xd0I\x06d/\xba\x1f\xbez\x1f\xaf\xb7\xbc\xfaa\xf1z+r\xa4\b?\'C\xdezj\x9dg\nI\xb7I\xe4\xcdj\xcc\x1fC\xcfA\xc0\xff$b~\x14)\x94S:\xcb\xcc\xf3\xf0b\xcc\xe3\xaa}\x9f\xba\xdb\xe6\xac#\x9a\xe9\xcf@\x02Rd\n6p\xd02N\xbc\x1a\xf8H$\xf6b\x10\'\xc2\x89\xac9\xc9X|{') sendfile(r7, r8, 0x0, 0x1) pwritev(r6, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) 21:48:29 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xf460010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:29 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000064000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:29 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16256, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:29 executing program 1: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000080)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2f) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="8603000000006a533d1533eaa2a850e0b71bc369006493f900008013ed1aaff22123d0ef7b0bb60b65050000000000000082557d5043cef49c"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 21:48:29 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000080000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3267.494777][ T3698] ptrace attach of "/root/syz-executor.1"[3694] was attempted by "/root/syz-executor.1"[3698] 21:48:29 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000005000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x8}) 21:48:29 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xf560010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b37, &(0x7f0000000240)='wlan0\x00\xba\x01k\xc5\xa4\xba\x1f\x00\x00\xff\xff\xff\xff\xa0\x01\x00\x00\x00\x00\b\xb4\x9e\x01\x00\x00\x00\x00\x00\x00\x00do\xf7n\xd4\xf3(eq]\xa5\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x84, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESOCT=0x0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES32=r1, @ANYRESDEC=r1, @ANYRES16=r1, @ANYRES64, @ANYRESOCT=r1], @ANYRES64=r1, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r1, &(0x7f0000001f00), 0x1000) r2 = gettid() r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r2, 0x15) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000000c0)=0x81, 0x4) read$FUSE(r1, 0x0, 0x2f) 21:48:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fb505ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:30 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16257, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000010000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:30 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xf603000000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3267.961097][ C1] sd 0:0:1:0: tag#7441 FAILED Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK [ 3267.970281][ C1] sd 0:0:1:0: tag#7441 CDB: Read(6) 08 00 00 00 00 00 21:48:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000020000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x1f, 0x502) write$cgroup_pid(r0, &(0x7f0000000080), 0xdc0f8a25) 21:48:30 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16258, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="cf"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:48:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000030000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:30 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xf660010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000040000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',m']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) fcntl$setown(r0, 0x8, r1) 21:48:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fb605ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000001040000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:33 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16259, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:33 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xf760010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="cf"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:48:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000050000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000070000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:33 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1625a, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:33 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xf860010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000080000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000090000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3272.610433][ C0] net_ratelimit: 25 callbacks suppressed [ 3272.610440][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3272.621973][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3272.690334][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3272.690490][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3272.696174][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3272.701907][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3272.707718][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3272.719537][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3272.770399][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3272.776184][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:48:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x102, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000080), 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group\a\x00d=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r1, &(0x7f0000001f00), 0x1000) r2 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r2, 0x15) read$FUSE(r1, 0x0, 0x2f) 21:48:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fb705ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:36 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1625b, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:36 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000400000000a0000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:36 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xf960010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="cf"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:48:36 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000400000000e0000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:36 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000100000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:36 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xfa60010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:37 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1625c, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:37 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000160000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fb805ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="a1643d6e505f5d9dfd353e406ffc8f395e366d4ebc2761c38f826eb68c9fdd96", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:48:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000400000011f0000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:39 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xfb60010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="cf"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:48:39 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1625d, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fb905ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000200000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:39 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xfc03000000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:40 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1625e, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000075300000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000340000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fba05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 3278.850357][ C0] net_ratelimit: 25 callbacks suppressed [ 3278.850369][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3278.861922][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3278.930357][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3278.930379][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3278.936193][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3278.941924][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3278.947875][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3278.959283][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3279.010451][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3279.016277][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:48:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',root\\ode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:48:42 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xfc60010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:42 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1625f, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000400000003e0000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="cf"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:48:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fbb05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000400000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="cf"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) 21:48:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000002400000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:43 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16260, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="cf"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) 21:48:43 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xfcffffff00000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000040)={{0x0, @remote, 0x4e21, 0x0, 'none\x00', 0x20, 0x4, 0x51}, {@broadcast, 0x4e24, 0x10002, 0x0, 0x101, 0x4}}, 0x44) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r2 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r2, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:48:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000480000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fbc05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="cf"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) 21:48:45 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16261, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:45 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xfd60010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3283.639416][ T3980] IPVS: set_ctl: invalid protocol: 0 172.20.20.187:20001 21:48:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="cf"]) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 21:48:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000001d4c0000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:46 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16262, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:46 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xfe03000000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="cf"]) 21:48:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000400000004f0000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3284.429417][ T3980] IPVS: set_ctl: invalid protocol: 0 172.20.20.187:20001 [ 3285.090377][ C0] net_ratelimit: 26 callbacks suppressed [ 3285.090387][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3285.102003][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3285.170379][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3285.170385][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3285.170480][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3285.176235][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3285.193626][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3285.199403][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3285.250409][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3285.256294][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:48:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = semget$private(0x0, 0x4, 0x0) semctl$GETNCNT(r1, 0x2, 0xe, &(0x7f0000000480)=""/227) r2 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r2, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:48:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000680000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fbd05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:48:49 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3ffff, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:49 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xfe60010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040ff0110800000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:49 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 21:48:49 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 21:48:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000210800000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:49 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xfeff000000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:49 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x40000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000830000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:52 executing program 1: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 21:48:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fbe05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:52 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xff0f000000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\b\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f0000000080)) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x0) 21:48:52 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0xf0ffff, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:48:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000003a980000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:48:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:48:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040ff0110b00000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:52 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xff60010000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:52 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:53 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 21:48:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fbf05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000c80000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3291.330354][ C0] net_ratelimit: 26 callbacks suppressed [ 3291.330365][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3291.342006][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3291.410318][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3291.410348][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3291.416148][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3291.422035][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3291.433500][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3291.494948][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3291.500806][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3291.970444][ C0] protocol 88fb is buggy, dev hsr_slave_0 21:48:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x200, 0x0) write$uinput_user_dev(r1, &(0x7f0000000480)={'syz0\x00', {0x7bccb236, 0x4, 0x1, 0x10000}, 0x10, [0x3, 0xd417, 0x7f404f3c, 0xd811, 0xb5, 0xfffffffffffffff7, 0x1, 0x8c, 0xed, 0x4, 0x1, 0x10001, 0xc, 0x0, 0x2, 0x7, 0xa8d6, 0x2, 0x800, 0x101, 0x3, 0x1ff, 0x8, 0x1, 0x6, 0x1, 0x542, 0x8, 0x101, 0x9, 0xfffffffffffffffd, 0x200, 0x1f, 0xf5bad16000000000, 0xbb86000000000, 0x7, 0xfffffffffffffffd, 0x7fff, 0x100000001, 0x9389, 0x8001, 0x401, 0xc4e, 0xad, 0xab, 0xe2, 0x10000, 0x9, 0x5fb, 0x100000001, 0xab, 0x7f, 0x4, 0xfff, 0x2, 0x10000, 0x7, 0x4615, 0xffffffffffffff01, 0x37c, 0x40, 0x1, 0x1, 0x2], [0x5, 0x2c07, 0xe63, 0xffffffff, 0x3, 0x4, 0x7, 0x401, 0x8, 0x4, 0x3, 0x3, 0x7, 0x8, 0x0, 0x9, 0x8000, 0x6, 0x8, 0x7, 0x7, 0x4, 0xffffffff, 0x5, 0x4, 0x34f0, 0x6, 0xdb8, 0x0, 0x8, 0x3, 0x7fffffff, 0x4, 0x4, 0x800, 0x7ff, 0x1, 0x101, 0x0, 0x5, 0xe3, 0x2, 0x8001, 0x5, 0x5, 0x400, 0x9, 0x401, 0x80, 0x8, 0x401, 0x6, 0x5, 0x71, 0xfffffffffffffffd, 0x401, 0x5, 0x200, 0x80000001, 0x6, 0x4000000, 0x1000, 0x1, 0x8], [0x1cc, 0x4, 0x3f, 0x3287, 0x7d6b, 0x0, 0xad29, 0xb3b5, 0x9, 0x0, 0x1, 0x6, 0x7, 0x3, 0x4, 0x7, 0x7ec, 0x8, 0x8, 0x2, 0x101, 0x100, 0x40, 0x9, 0x1, 0x8, 0xfffffffffffff9c0, 0x7, 0x6, 0x200, 0x2, 0x9, 0x8, 0x7fffffff, 0x2, 0x0, 0x6, 0xfffffffffffff800, 0x7, 0x20, 0x5, 0x3ff, 0x48, 0x6621, 0x7, 0x1, 0x7, 0x7, 0x8, 0x5, 0x0, 0xfffffffffffeffff, 0x1, 0x6, 0x239a, 0x77b, 0x7fffffff, 0x5, 0xfffffffffffffff8, 0xfffffffeffffffff, 0xffc1, 0x3, 0x6, 0x7ff], [0x200800, 0x3f, 0x78bf, 0x8, 0x800, 0x2, 0x0, 0xa23, 0x4a4c9e83, 0x7fff, 0x6, 0x400, 0x2, 0xa241, 0xd7, 0x4, 0x81, 0x80000001, 0x8, 0x81, 0x3, 0x2, 0x6, 0x3, 0x3, 0x1e, 0x0, 0x7, 0x20, 0x1a70000, 0x78, 0x2, 0x1f, 0xaf, 0x1, 0x40, 0x4, 0xffffffffffffffc0, 0xfffffffffffffff9, 0x0, 0x81, 0x800, 0x0, 0x5, 0x7ff, 0x0, 0x3a2, 0x6, 0x3, 0x1, 0xfdd7, 0x512, 0x7fffffff, 0xf73, 0xc7, 0xffffffff, 0x80, 0x4, 0x1, 0xe92, 0x8, 0x265, 0x2, 0x101]}, 0x45c) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x8000, 0x0) ioctl$TIOCSSOFTCAR(r2, 0x541a, &(0x7f0000000080)=0x7) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r3 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r3, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:48:55 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 21:48:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000160fc80000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:55 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xff7f000000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:55 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x2000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fc005ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:55 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) 21:48:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000d00000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:55 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xffff030000000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040ff0110d00000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:55 executing program 1: 21:48:56 executing program 1: 21:48:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) epoll_create1(0x80000) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000002f00), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() r2 = open(&(0x7f0000000200)='./file0\x00', 0x40001, 0x0) tkill(r1, 0x15) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) fstat(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r3, r4) ioctl$VHOST_SET_VRING_CALL(r2, 0x4008af21, &(0x7f00000000c0)={0x2}) read$FUSE(r0, 0x0, 0x2f) 21:48:58 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000003e80000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:58 executing program 1: 21:48:58 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xffffff7f00000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fc105ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:48:58 executing program 1: 21:48:58 executing program 1: 21:48:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000001ef0000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:48:59 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x4000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:48:59 executing program 1: 21:48:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000001f40000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3297.580523][ C0] net_ratelimit: 24 callbacks suppressed [ 3297.580533][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3297.592101][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3297.650397][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3297.658073][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3297.660438][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3297.664059][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3297.669666][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3297.675459][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3297.730429][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3297.736324][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:49:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:49:01 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xffffffff00000000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd60b409000030000000000000000000000000ffffe0"], 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 21:49:01 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x5000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fc205ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040fffffffe0000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040801001ff0000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040b01001ff0000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:02 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x6000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:02 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xffffffff87600000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:02 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) close(r0) 21:49:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040d01001ff0000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) userfaultfd(0x80000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = getpgrp(0xffffffffffffffff) ptrace(0x8, r1) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c000a40aec4148d113d9437482c88e741968f43b0564366fc5b42d3beeec3b1237fa491490349851edb13ab8a2668a8ddfd994834624ff5ed27e29fbe828c382f136f09f7bbbaa9562a"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r2 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r2, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:49:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fc305ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040feffffff0000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:02 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x7000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:02 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0xfffffffffffff000, 0x0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:02 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) close(r0) 21:49:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000020000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:03 executing program 1: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16231, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fc405ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000040000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:03 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x2, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:03 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x8000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000640000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x4000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) sched_setscheduler(0x0, 0x0, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x0) ioctl(0xffffffffffffffff, 0xffffffffffffff80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) write$binfmt_misc(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="000000008e9464a206bd25e188bc0994ddc3d9575e6dec2aa5588b8bff2e1c2222551fbc604e3e3b37d33db65ff8d115168aaccef4eeb7e1eb24c5700ebdff10ece5ca1f61e06965b298c8ce3dd02c68a147a8ec7063e732be04"], 0x5a) io_setup(0x101, &(0x7f0000000040)=0x0) shmget$private(0x0, 0x3000, 0x16a424badf40a786, &(0x7f0000ffd000/0x3000)=nil) r4 = fcntl$getown(r0, 0x9) ptrace$setopts(0x4200, r4, 0xfffffffffffffff8, 0x1) openat$sequencer(0xffffffffffffff9c, 0x0, 0x80, 0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x201, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x50002, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r5 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r5, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:49:06 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x8030000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:06 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x5, 0x101000) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f0000000080)) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r2 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r2, 0x15) 21:49:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fc505ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 3303.810433][ C0] net_ratelimit: 25 callbacks suppressed [ 3303.810443][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3303.822075][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:49:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000800000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3303.890362][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3303.890582][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3303.896201][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3303.908576][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3303.916138][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3303.922614][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3303.970431][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3303.976648][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:49:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000100000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:06 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x9000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:06 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x4, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000200000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fc605ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:06 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000300000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:07 executing program 1 (fault-call:1 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:49:07 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0xa000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:07 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x5, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3304.811155][ T4366] FAULT_INJECTION: forcing a failure. [ 3304.811155][ T4366] name failslab, interval 1, probability 0, space 0, times 0 [ 3304.876052][ T4366] CPU: 0 PID: 4366 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 3304.884096][ T4366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3304.894183][ T4366] Call Trace: [ 3304.897515][ T4366] dump_stack+0x172/0x1f0 [ 3304.901906][ T4366] should_fail.cold+0xa/0x15 [ 3304.906525][ T4366] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3304.912372][ T4366] ? ___might_sleep+0x163/0x280 [ 3304.917260][ T4366] __should_failslab+0x121/0x190 [ 3304.922228][ T4366] should_failslab+0x9/0x14 [ 3304.926757][ T4366] kmem_cache_alloc_node_trace+0x270/0x720 [ 3304.932767][ T4366] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3304.938290][ T4366] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3304.943771][ T4366] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3304.949089][ T4366] __get_vm_area_node+0x12b/0x3a0 [ 3304.954153][ T4366] __vmalloc_node_range+0xd4/0x790 [ 3304.959333][ T4366] ? vmx_vm_alloc+0x44/0x60 [ 3304.963870][ T4366] ? retint_kernel+0x2d/0x2d [ 3304.968495][ T4366] __vmalloc+0x44/0x50 [ 3304.972618][ T4366] ? vmx_vm_alloc+0x44/0x60 [ 3304.977148][ T4366] vmx_vm_alloc+0x44/0x60 [ 3304.981503][ T4366] kvm_dev_ioctl+0x1ba/0x15e0 [ 3304.986240][ T4366] ? kvm_debugfs_release+0x90/0x90 [ 3304.991393][ T4366] ? __fget+0x35a/0x550 [ 3304.995579][ T4366] ? kvm_debugfs_release+0x90/0x90 [ 3305.000741][ T4366] do_vfs_ioctl+0xd6e/0x1390 [ 3305.005376][ T4366] ? ioctl_preallocate+0x210/0x210 [ 3305.010504][ T4366] ? __fget+0x381/0x550 [ 3305.014685][ T4366] ? ksys_dup3+0x3e0/0x3e0 [ 3305.019122][ T4366] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3305.025385][ T4366] ? fput_many+0x12c/0x1a0 [ 3305.029834][ T4366] ? tomoyo_file_ioctl+0x23/0x30 [ 3305.034794][ T4366] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3305.041068][ T4366] ? security_file_ioctl+0x93/0xc0 [ 3305.046215][ T4366] ksys_ioctl+0xab/0xd0 [ 3305.050402][ T4366] __x64_sys_ioctl+0x73/0xb0 [ 3305.055013][ T4366] do_syscall_64+0x103/0x610 [ 3305.059631][ T4366] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3305.065536][ T4366] RIP: 0033:0x458209 [ 3305.069446][ T4366] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3305.089679][ T4366] RSP: 002b:00007fb3e0e0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3305.098114][ T4366] RAX: ffffffffffffffda RBX: 00007fb3e0e0ac90 RCX: 0000000000458209 [ 3305.106108][ T4366] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000003 [ 3305.114091][ T4366] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3305.122083][ T4366] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3e0e0b6d4 [ 3305.130073][ T4366] R13: 00000000004c0c7a R14: 00000000004d2ad0 R15: 0000000000000004 [ 3305.215987][ T4366] syz-executor.1: vmalloc: allocation failure: 41992 bytes, mode:0x400dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null),cpuset=syz1,mems_allowed=0-1 [ 3305.232327][ T4366] CPU: 0 PID: 4366 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 3305.240303][ T4366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3305.250398][ T4366] Call Trace: [ 3305.250433][ T4366] dump_stack+0x172/0x1f0 [ 3305.250454][ T4366] warn_alloc.cold+0x87/0x17f [ 3305.250469][ T4366] ? zone_watermark_ok_safe+0x260/0x260 [ 3305.250485][ T4366] ? rcu_read_lock_sched_held+0x110/0x130 [ 3305.250503][ T4366] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3305.250520][ T4366] ? lockdep_hardirqs_on+0x418/0x5d0 [ 3305.250541][ T4366] ? __get_vm_area_node+0x2df/0x3a0 [ 3305.250563][ T4366] __vmalloc_node_range+0x48a/0x790 [ 3305.250576][ T4366] ? retint_kernel+0x2d/0x2d [ 3305.250600][ T4366] __vmalloc+0x44/0x50 [ 3305.250618][ T4366] ? vmx_vm_alloc+0x44/0x60 [ 3305.250635][ T4366] vmx_vm_alloc+0x44/0x60 [ 3305.250661][ T4366] kvm_dev_ioctl+0x1ba/0x15e0 [ 3305.301277][ T4366] ? kvm_debugfs_release+0x90/0x90 [ 3305.301296][ T4366] ? __fget+0x35a/0x550 [ 3305.301316][ T4366] ? kvm_debugfs_release+0x90/0x90 [ 3305.301334][ T4366] do_vfs_ioctl+0xd6e/0x1390 [ 3305.301362][ T4366] ? ioctl_preallocate+0x210/0x210 [ 3305.301376][ T4366] ? __fget+0x381/0x550 [ 3305.301396][ T4366] ? ksys_dup3+0x3e0/0x3e0 [ 3305.301413][ T4366] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3305.301425][ T4366] ? fput_many+0x12c/0x1a0 [ 3305.301448][ T4366] ? tomoyo_file_ioctl+0x23/0x30 [ 3305.301468][ T4366] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3305.338537][ T4366] ? security_file_ioctl+0x93/0xc0 [ 3305.338561][ T4366] ksys_ioctl+0xab/0xd0 [ 3305.338592][ T4366] __x64_sys_ioctl+0x73/0xb0 [ 3305.379291][ T4366] do_syscall_64+0x103/0x610 [ 3305.379315][ T4366] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3305.379328][ T4366] RIP: 0033:0x458209 [ 3305.379355][ T4366] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3305.422250][ T4366] RSP: 002b:00007fb3e0e0ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3305.422267][ T4366] RAX: ffffffffffffffda RBX: 00007fb3e0e0ac90 RCX: 0000000000458209 [ 3305.422275][ T4366] RDX: 0000000000000000 RSI: 000000000000ae01 RDI: 0000000000000003 [ 3305.422282][ T4366] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3305.422291][ T4366] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3e0e0b6d4 [ 3305.422299][ T4366] R13: 00000000004c0c7a R14: 00000000004d2ad0 R15: 0000000000000004 [ 3305.434497][ T4366] Mem-Info: [ 3305.484029][ T4366] active_anon:270005 inactive_anon:852 isolated_anon:0 [ 3305.484029][ T4366] active_file:9847 inactive_file:51944 isolated_file:0 [ 3305.484029][ T4366] unevictable:3 dirty:101 writeback:0 unstable:0 [ 3305.484029][ T4366] slab_reclaimable:21676 slab_unreclaimable:220855 [ 3305.484029][ T4366] mapped:58850 shmem:908 pagetables:14514 bounce:0 [ 3305.484029][ T4366] free:931664 free_pcp:737 free_cma:0 [ 3305.620827][ T4366] Node 0 active_anon:1067848kB inactive_anon:3372kB active_file:39244kB inactive_file:190644kB unevictable:12kB isolated(anon):0kB isolated(file):0kB mapped:235336kB dirty:280kB writeback:0kB shmem:3596kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 616448kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 3305.667423][ T4366] Node 1 active_anon:11888kB inactive_anon:36kB active_file:144kB inactive_file:17124kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:168kB writeback:0kB shmem:36kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 3305.709402][ T4366] Node 0 DMA free:10436kB min:220kB low:272kB high:324kB active_anon:4124kB inactive_anon:0kB active_file:0kB inactive_file:76kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:8kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3305.738300][ T4366] lowmem_reserve[]: 0 2553 2555 2555 [ 3305.748456][ T4366] Node 0 DMA32 free:68908kB min:66952kB low:76008kB high:85064kB active_anon:1063724kB inactive_anon:3372kB active_file:39244kB inactive_file:190568kB unevictable:12kB writepending:280kB present:3129332kB managed:2617996kB mlocked:0kB kernel_stack:22976kB pagetables:55236kB bounce:0kB free_pcp:1096kB local_pcp:640kB free_cma:0kB [ 3305.779900][ T4366] lowmem_reserve[]: 0 0 2 2 [ 3305.785122][ T4366] Node 0 Normal free:8kB min:28kB low:32kB high:36kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2204kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 3305.812180][ T4366] lowmem_reserve[]: 0 0 0 0 [ 3305.816931][ T4366] Node 1 Normal free:3645776kB min:53624kB low:67028kB high:80432kB active_anon:11888kB inactive_anon:36kB active_file:144kB inactive_file:17124kB unevictable:0kB writepending:168kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:1120kB pagetables:2588kB bounce:0kB free_pcp:2288kB local_pcp:900kB free_cma:0kB [ 3305.847685][ T4366] lowmem_reserve[]: 0 0 0 0 [ 3305.852537][ T4366] Node 0 DMA: 7*4kB (UME) 11*8kB (UME) 5*16kB (UM) 2*32kB (UM) 3*64kB (UE) 4*128kB (UME) 1*256kB (E) 2*512kB (ME) 2*1024kB (ME) 1*2048kB (E) 1*4096kB (M) = 10436kB [ 3305.869349][ T4366] Node 0 DMA32: 2549*4kB (MEH) 749*8kB (UMEH) 252*16kB (UMEH) 350*32kB (UMEH) 348*64kB (UME) 29*128kB (UME) 3*256kB (UE) 15*512kB (UE) 3*1024kB (U) 0*2048kB 0*4096kB = 68924kB [ 3305.887227][ T4366] Node 0 Normal: 0*4kB 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8kB [ 3305.899413][ T4366] Node 1 Normal: 86*4kB (UME) 5*8kB (UME) 1*16kB (E) 3*32kB (UME) 3*64kB (UME) 1*128kB (U) 32*256kB (UE) 19*512kB (U) 6*1024kB (UE) 6*2048kB (UME) 881*4096kB (M) = 3645744kB [ 3305.917269][ T4366] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3305.927417][ T4366] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3305.937058][ T4366] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 3305.946945][ T4366] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 3305.956611][ T4366] 62699 total pagecache pages [ 3305.961557][ T4366] 0 pages in swap cache [ 3305.965920][ T4366] Swap cache stats: add 0, delete 0, find 0/0 [ 3305.972730][ T4366] Free swap = 0kB [ 3305.976661][ T4366] Total swap = 0kB [ 3305.981146][ T4366] 1965979 pages RAM [ 3305.985168][ T4366] 0 pages HighMem/MovableOnly [ 3305.990039][ T4366] 339406 pages reserved [ 3305.994819][ T4366] 0 pages cma reserved 21:49:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000040)) 21:49:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000400000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fc705ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:09 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x12000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:09 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x6, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:49:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000010400000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x2, 0x0) 21:49:09 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5421, 0x0) 21:49:09 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x7, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:09 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000500000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:09 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x13620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3310.050389][ C0] net_ratelimit: 26 callbacks suppressed [ 3310.050400][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3310.061993][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:49:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="666751651c703fba201572643d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0600"]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(0x0, 0x15) read$FUSE(r0, 0x0, 0x2f) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000000c0)=0x0) ptrace$poke(0x5, r2, &(0x7f0000000140), 0xbfd3) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x1, {0x7, 0x1d, 0x2a1, 0x200, 0x800, 0xffff, 0x3, 0x6}}, 0x50) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) 21:49:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5450, 0x0) 21:49:12 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000700000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fc805ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 3310.130344][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3310.130358][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3310.130422][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3310.136274][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3310.153649][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3310.159463][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:49:12 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x8, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:12 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x14620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3310.210331][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3310.216168][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:49:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5451, 0x0) 21:49:12 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000800000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5452, 0x0) 21:49:12 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x15620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) write$P9_RLOCK(r1, &(0x7f0000000280)={0x8, 0x35, 0x2, 0x3}, 0x8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000007c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x800}}, {@allow_other='allow_other'}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000580)={0x101, {{0xa, 0x4e24, 0x80, @remote, 0x10000}}, {{0xa, 0x4e22, 0x81, @remote, 0x1}}}, 0x108) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r3 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f00000000c0)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={@loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, 0x6, 0x7, 0x39f9, 0x500, 0x0, 0x100, r4}) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r3, 0x15) write$P9_RXATTRWALK(r5, &(0x7f0000000080)={0xf, 0x1f, 0x2, 0x1800000000000000}, 0xf) read$FUSE(r0, 0x0, 0x2f) 21:49:13 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x9, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000900000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5460, 0x0) 21:49:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae00, 0x0) 21:49:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fc905ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000a00000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:13 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x16620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae02, 0x0) 21:49:13 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0xa, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000e00000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x0) 21:49:15 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000001000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:15 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae04, 0x0) 21:49:15 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x17000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:15 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x12, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:49:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fca05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae05, 0x0) 21:49:16 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000001600000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:49:16 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000011f00000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:16 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x17, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae08, 0x0) 21:49:16 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x17620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae0b, 0x0) 21:49:16 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000002000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:16 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000753000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3316.290541][ C0] net_ratelimit: 25 callbacks suppressed [ 3316.290552][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3316.302109][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3316.370325][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3316.370353][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3316.376136][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3316.382014][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3316.393557][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3316.450409][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3316.456270][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:49:19 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffd) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r1, &(0x7f0000001f00), 0x1000) r2 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r2, 0x15) read$FUSE(r1, 0x0, 0x2f) 21:49:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae14, 0x0) 21:49:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fcb05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:19 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000003400000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:19 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x36, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:19 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x18620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae25, 0x0) 21:49:19 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000003e00000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3316.930338][ C0] protocol 88fb is buggy, dev hsr_slave_0 21:49:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x40049409, 0x0) 21:49:19 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000004000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:19 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x48, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x4008ae06, 0x0) 21:49:22 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000024000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000000480), 0x1000) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:49:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x4020940d, 0x0) 21:49:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fcc05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:22 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x4a, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:22 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x19620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc0045878, 0x0) 21:49:22 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000004800000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc0045878, 0x0) 21:49:22 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x4c, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:22 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1a620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:22 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000400000000000001d4c00000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:22 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc0189436, 0x0) 21:49:23 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x8000, 0x0) r1 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x1, 0x200000) mkdirat(r1, &(0x7f00000000c0)='./file0\x00', 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x117}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000000), 0x4, {0xa, 0x4e24, 0x9, @rand_addr="6113836fe34487d780a31c484f72d46c", 0x401}, r2}}, 0x38) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYRES32=r3, @ANYRESHEX=r3, @ANYPTR64, @ANYRESDEC=0x0, @ANYBLOB="76b238e6e3d1ef34cd462b4e2e85af13448154629f9de32cc2e0b83300971e8bd00f7f694a0301f648f403665574281f6904fe768afa8b2577a876a7eced1b8e656a7c31f33148f33d50a39bb99c", @ANYRESDEC=0x0, @ANYBLOB="3c402b276d9feda50f51cb6e8f9f46460e40addce801aa7c7678d4e2fea64233649485d7312037c42d32eb7ca90100000099a4015f6297f52590596e37cce4da272d8b34214b0685d4f19337dd1edea3553ab6c157c5a5993decab942abda4c5599678c0f1053ef4f036c3670a2054aed2adbc0b9720522dbc7c52f261316e0d22555f1b99f93ede2d3db85851a07418d91c707c8f882311622326"]) read$FUSE(r3, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r3, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r3, &(0x7f0000000480), 0x1000) read$FUSE(r3, &(0x7f0000001f00), 0x1000) r4 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r4, 0x15) read$FUSE(r3, 0x0, 0x2f) 21:49:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc020660b, 0x0) 21:49:23 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000004f00000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:23 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x60, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fcd05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:23 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1b620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x2) 21:49:23 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000006800000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x3) 21:49:23 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000000ff01108000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x4) 21:49:23 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x68, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3322.530419][ C0] net_ratelimit: 25 callbacks suppressed [ 3322.530430][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3322.542054][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3322.610340][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3322.610371][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3322.616167][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3322.621966][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3322.627812][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3322.639326][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3322.700411][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3322.706287][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:49:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) fcntl$dupfd(r0, 0x406, r0) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) ioctl$VIDIOC_G_MODULATOR(r2, 0xc0445636, &(0x7f0000000040)={0x2, "ab96b648b06bea381cef4b746ef7ee43bfe20fef93f04234cc3c7095225cde03", 0xa22, 0x800, 0x3, 0x4, 0x4}) 21:49:26 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1c620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000002108000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x5) 21:49:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fce05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:26 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x6c, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x6) 21:49:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000008300000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x7) 21:49:26 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x74, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:26 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000400000000000003a9800000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x10) 21:49:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x4000, 0x0) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x200) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67956f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r1, &(0x7f0000001f00), 0x1000) r2 = gettid() r3 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r2, 0x15) ioctl$KVM_KVMCLOCK_CTRL(r3, 0xaead) read$FUSE(r1, 0x0, 0x2f) 21:49:29 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1d620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:29 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000000ff0110b000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x48) 21:49:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fcf05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:29 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x7a, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x4c) 21:49:29 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000000000000c800000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x68) 21:49:29 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1e620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:30 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0xc0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000400000000000160fc800000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3328.770591][ C0] net_ratelimit: 26 callbacks suppressed [ 3328.770602][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3328.782146][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3328.850321][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3328.850393][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3328.856355][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3328.862169][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3328.867999][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3328.879398][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3328.930462][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3328.936323][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:49:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0xffffffa1) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:49:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x6c) 21:49:32 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000000000000d000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fd005ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:32 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1f000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:32 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0xf0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:32 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000000ff0110d000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x6e) 21:49:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x70) 21:49:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000000000003e800000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:33 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1f620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x74) 21:49:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000580)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000080)=0xe8) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',Nroup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x4, 0x204800) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000480)="adb62ee2bbf927c5ca5df871d98d8b3dd5184568b877d2e3668c76279ddf871e34dc2a065b3bdc6252f749fef2950d57611ae5f8962bc470c739490231b69cc9989fcfc286cf06beeddfae38e2b9c692f288e638f0b95be6e659c910e3e860302691a93df87b15006f104e1083389c29dac069527ffbeb8ae6672b9f078b47ed37728d298a4791392624b5c68163ea12ece79ff07dc84cf61c97b0a56c4f9108c564069a250b94a118faff8cbadccc1c757f96475e733f3ddf5cbaee464f260696ccf69b503d2ec829c5b8ba6de5ecc53c496d2dfb88718b4e284e0a688d7b") r3 = gettid() bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r2, 0x50, &(0x7f0000000280)={0x0, 0x0}}, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r3, r2, 0x0, 0x21, &(0x7f00000000c0)='mime_type&keyring^]systemmd5sum]\x00', r4}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r5 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r5, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:49:35 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x128, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:35 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000000000001ef00000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:35 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x20000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fd105ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x7a) 21:49:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xe0) 21:49:36 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000000000001f400000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x1fe) 21:49:36 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040fffffffffffffffe00000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:36 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x20620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:36 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x17e, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3335.010337][ C0] net_ratelimit: 26 callbacks suppressed [ 3335.010347][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3335.021857][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3335.090377][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3335.096256][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3335.100379][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3335.107784][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3335.113680][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3335.119448][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3335.170393][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3335.176950][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:49:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x2b2, 0x2080) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000480)={0x0, 0x0, 0x1, 0x0, [], [{0x3, 0x0, 0xfff, 0xfffffffffffffffa, 0x2, 0x1}, {0x9, 0x1000, 0x100000001, 0x1ff, 0x3, 0x2}], [[]]}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1000) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) write$FUSE_INTERRUPT(r1, &(0x7f0000000200)={0xffffffffffffff4b}, 0x10) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x4000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000080)=[@in={0x2, 0x4e23, @multicast2}, @in6={0xa, 0x4e20, 0x100, @ipv4={[], [], @loopback}, 0x7}], 0x2c) read$FUSE(r1, &(0x7f0000001f00), 0x1000) r3 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r3, 0x15) read$FUSE(r1, 0x0, 0x2f) 21:49:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x2b0) 21:49:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000000ffffffff00000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fd205ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:39 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1a0, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:39 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x21620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040feffffffffffffff00000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x300) 21:49:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000200000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:39 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x22620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x320) 21:49:39 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1c4, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x390) 21:49:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000300000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:42 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x230f0000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fd305ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40, 0x0) write$P9_RREAD(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="33000000757dae34e9a9f678f28454f03026f8214f5bb31a3d6b1f3821661005611cec00000000000000000000000000000000"], 0x33) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r2 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x100) tkill(r2, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:49:42 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x24e, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000400000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x500) 21:49:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000500000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x600) 21:49:42 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x29a, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000700000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:42 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x23620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x700) 21:49:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xf23) 21:49:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fd405ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 3341.250433][ C0] net_ratelimit: 26 callbacks suppressed [ 3341.250447][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3341.261998][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3341.330329][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3341.330381][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3341.336140][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3341.347752][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3341.353581][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3341.410399][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3341.416208][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3341.890343][ C0] protocol 88fb is buggy, dev hsr_slave_0 21:49:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:49:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000800000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x1f00) 21:49:45 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x2a1, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:45 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x24620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fd505ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000900000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x2000) 21:49:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000a00000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x2003) 21:49:45 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x2bd, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x230f) 21:49:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:49:48 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x25620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000e00000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:48 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x2e4, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x3f00) 21:49:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fd605ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x4000) 21:49:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040001000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x4800) 21:49:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040001600000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:49 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x26620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x4c00) [ 3347.490442][ C0] net_ratelimit: 25 callbacks suppressed [ 3347.490452][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3347.505678][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3347.570389][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3347.576876][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3347.580355][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3347.588433][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3347.594329][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3347.600091][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3347.650326][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3347.656135][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:49:51 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x20400) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0)={0x0, 0x6, 0x18}, 0xc) r2 = gettid() lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}}}, &(0x7f0000000a80)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ac0)={0x0, 0x0, 0x0}, &(0x7f0000000b00)=0xc) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/ptmx\x00', 0x10000, 0x0) r9 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b80)={{{@in=@broadcast, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f0000000c80)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000000e00)={&(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000340)="d044aa0d80c6d99cdb36bad4db5890659cea1cfcaa9697ff8c776ac2faba9f298325fd66596fad09de93d45c55ef8c6dae02b1b5b0ff2d6930a9cf7086f2f709468ccea41754f7bd0e0b80473e41b7db3845a2d96963123ee461995a9ecedbd422bedd2f0f1eaed687dcf414341cd3ca6351965ada5b1ab1936bea1139343edeea1492d3b2d8202b61bce156fab20af9591666416aadab84ceb885ab013f18ed446aa44d90", 0xa5}, {&(0x7f0000000140)="6ad9b3172b2c1fc287817e050aebacd5181cc63c759c5beb5a8a2acda1502d92956baaa856b54af6e34f94db96721e9826285365", 0x34}, {&(0x7f0000000480)="39b0d514412a06779fe5fe1e3444937e108f7e3af5e80ff07bf3f513c33fd9fcf3d484502b0fcaa7dac822481a8c1d9e6010e5fea028364ed81bfe8649e33c6335133ae83eaab4e011bfa641e78584be08af14363b8a5a398534afb06481f63040cac951fc47a5cceb72761ccb225101d361d511a9f3ccc802d8db5c91ea6c6c14ceaaa8a73642cbd5e224f869e8dc6a62e10b4f00e6fd66920577e15398dd66cfe1f3f601e72c91c4f44a160feccdfa346630b8a78d908a71bd61abfb08401e5901e1419b8c7ecc", 0xc8}, {&(0x7f0000000580)="7267c29917699d78f2517017aa561e168054cabb8010495faadd820044567533734c10f34a8fd50481a3bf08a41dc2c464cbf7b26965334e6ecdfdfc8224fa4215aa4807881bc84abcad3bf50925ca44aea2fbca78d1100b279c0031bad462276465d1e9e2e4bde8927e996e1de76d2b5a1a29a6f1becb7290e35bb3b211209e528c75bb350eaa845fb56517aa0939b8a1c52ada014a576d9501d593425d267063b456d7be029e65dc1c5dd80aa8f68a3fc862fef7d2180be3926f", 0xbb}, {&(0x7f0000000640)="3893b037e97ad208feeba7533ecd42584d4ce7f2238806ed87df72a97094064426d9d43642254a15d293a9a6011496c16ec4ba9c01e4d740c034d4cffb854d987d3da8ea3dc01c569fa3baabff9ebdb0b6fd1611369e6d39287aa7026f1eee3232132ab5709e86e461dfb985389cb1d8c15f44ad804fd134a367d7337bdf3305daa41b5e7e02abc27b9a90d87aa98151dc7fee16e960f4cd866c974cf9032974fe7e5c", 0xa3}, {&(0x7f0000000200)="8d00538e103287ac07d2f02963d9012dd43d6fe8b534cfc601b252", 0x1b}, {&(0x7f0000000700)="cf749cd40e5f4e2655794cd8397403907d3df4e5e4bfc689bbddb68f0858ede658a8ea91c892627d10c60f36523a34a38d53ca9387ee90ebe604b2d3cb3ea5cbe6005e07b716ac0bc8bea684a1bedc93734db0e643e62952071fde02fe8f336c76e190b501be1bfc04a91a3bf4d63e562d736615df248ff04ccdff08378b8fdcee03b73816d1dec89cc3872574d9cf9357a9d4eb01484bf0edca749fd5ae67feeda0004f44787b8dffd6b0f4aa1366c3", 0xb0}], 0x7, &(0x7f0000000d40)=[@rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x18, 0x1, 0x1, [r8]}, @cred={0x20, 0x1, 0x2, r9, r10, r11}], 0x90, 0x4000}, 0x4000) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r12 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r12, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',gsoup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r12, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r12, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r12, &(0x7f0000001f00), 0x1000) r13 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r13, 0x15) read$FUSE(r12, 0x0, 0x2f) 21:49:51 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x2e8, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x6800) 21:49:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fd705ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040003400000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:51 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x27620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x6c00) 21:49:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040003e00000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x6e00) 21:49:52 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x2ee, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x7000) 21:49:52 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x28620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x7400) 21:49:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040004800000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fd805ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) read$FUSE(r0, 0x0, 0x2f) 21:49:55 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x29620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:55 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x300, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x7a00) 21:49:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040004f00000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x9003) 21:49:55 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x308, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040006400000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:55 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x2a620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xb002) 21:49:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040006800000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fd905ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 3353.730338][ C0] net_ratelimit: 25 callbacks suppressed [ 3353.730407][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3353.741929][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3353.810655][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3353.811011][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3353.816542][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3353.822429][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3353.835574][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3353.841992][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3353.890390][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3353.896325][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:49:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) setsockopt$sock_void(r0, 0x1, 0x3f, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000340)={@sco={0x1f, {0x7, 0x3, 0x2, 0x3f, 0xfffffffffffffff8, 0x5}}, {&(0x7f0000000480)=""/236, 0xec}, &(0x7f0000000080), 0x8}, 0xa0) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:49:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xe000) 21:49:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040008300000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:58 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x358, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:58 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x2b620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fda05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:49:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xfe01) 21:49:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000c800000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x40000) 21:49:58 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x2c620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:49:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000d000000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:49:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x400000) 21:50:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0xfffffffffffffd90) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x3) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:50:01 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x382, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x80ffff) 21:50:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000fe00000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fdb05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:01 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x2d620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000401000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x1000000) 21:50:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x2000000) 21:50:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040001f01000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:01 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x2e620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:01 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x3000000) [ 3359.970555][ C0] net_ratelimit: 26 callbacks suppressed [ 3359.970565][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3359.982252][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3360.050405][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3360.056292][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3360.060349][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3360.067807][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3360.073732][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3360.079518][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3360.130420][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3360.136235][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:50:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000ef01000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:04 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x384, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x4000000) 21:50:04 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x2f620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="4a1c3d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="1983a42ee5a5c4dd4b11f7c39e81601118240655a7f5a4297ac50a6508ac8cd4df29c7ec6605a93901fe3190ca033ed1ce89ad23b60fb69d8b9bc190a13361aea670314d3cef5cb63e36d1d629430eabcd89c8401a306e4e810c"]) read$FUSE(r1, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r1, &(0x7f0000001f00), 0x1000) r2 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r2, 0x15) read$FUSE(r1, 0x0, 0x2f) 21:50:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fdc05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x5000000) 21:50:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000f401000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x6000000) 21:50:04 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040004002000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:04 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x390, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x7000000) 21:50:05 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000003000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:05 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x30620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:05 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x10000000) 21:50:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fdd05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="66643d85ad06300af57a8515d0b79f7d597be0fc19e7f87efdf20ba627f17b2a413538423af339ec", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0xffffffffffffff02) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000140)={'vcan0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000340)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@rand_addr="16a990464ab325953c420fad0cd5771d", @in6=@mcast1, 0x4e21, 0x3, 0x4e20, 0x1200000000, 0xa, 0x20, 0x20, 0x2f, r3, r4}, {0x8f7, 0x0, 0x1, 0x3f, 0x800, 0xa9, 0x2, 0x80}, {0x7, 0x3, 0x9, 0x1}, 0x4, 0x6e6bb8, 0x2, 0x0, 0x0, 0x3}, {{@in=@local, 0x4d6, 0x3b}, 0xa, @in6=@mcast2, 0x3505, 0x3, 0x0, 0x401, 0x9, 0x6, 0x9}}, 0xe8) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:50:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000e803000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:07 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x39a, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x1f000000) 21:50:07 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x31620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fde05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x20000000) 21:50:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000005000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:07 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x20030000) 21:50:08 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x32620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:08 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000007000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:08 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3d8, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3366.210499][ C0] net_ratelimit: 24 callbacks suppressed [ 3366.210509][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3366.222052][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3366.290334][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3366.290398][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3366.296216][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3366.302005][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3366.307928][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3366.319298][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3366.370352][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3366.376146][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:50:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000009000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x230f0000) 21:50:10 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x33620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:50:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fdf05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:10 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3e4, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:10 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x3f000000) 21:50:10 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000a000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x40000000) 21:50:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000e000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:11 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x34620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:11 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3e8, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x48000000) 21:50:11 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000016000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:11 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x4c000000) 21:50:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xffffffffffffffda, 0x4}, 0x10) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x10ce) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:50:13 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x35620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:13 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x68000000) 21:50:13 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040004c1d000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fe005ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:13 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3f6, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x6c000000) 21:50:14 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000011f000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x6e000000) 21:50:14 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x36620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:14 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3fc, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x70000000) [ 3372.450385][ C0] net_ratelimit: 26 callbacks suppressed [ 3372.450403][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3372.462020][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3372.530335][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3372.530364][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3372.536168][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3372.541973][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3372.547833][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3372.559215][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3372.620327][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3372.626154][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:50:17 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x80, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030303030341f3030302c757365725f69643d3795754f4eb453085ff87c39ddac9ca0bb19ea38c5f12b649b245de11bd2fa3cb74bc2be81ed2f422e7ad0fbe73dd383917849bda335abc4aefc8498012596465382a09a8e79513dd6f3e3eaf5f8cf635188fce19047782ecb69b5cd67e01d7ce8e0cf34d882c0d0a7a6d3563fad85ee3cbd70002f45", @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRES64=r0, @ANYRES16=r0, @ANYRESOCT=r0, @ANYRES32=r0], @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYRES32=r0], @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) r2 = dup2(r0, r0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000000c0)={'gretap0\x00', 0x6}) sched_setaffinity(r1, 0x8, &(0x7f0000000080)=0x6) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x10001}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000280)={r3, 0x7}, &(0x7f00000002c0)=0x8) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x175, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r4 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r4, 0x15) read$FUSE(r0, 0x0, 0x2f) sched_yield() 21:50:17 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000020000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x74000000) 21:50:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fe105ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:17 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x37620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:17 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3fe, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:17 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040007530000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x7a000000) 21:50:17 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000034000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:17 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x38620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:17 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x90030000) 21:50:17 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x500, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000050c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) open(&(0x7f0000000040)='./file0\x00', 0x400001, 0x80) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:50:20 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000983a000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x97ffffff) 21:50:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fe205ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:20 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x600, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:20 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x39620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xb0020000) 21:50:20 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000003e000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xe0000000) 21:50:20 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000040000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:20 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x700, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xfdffffff) [ 3378.690393][ C0] net_ratelimit: 25 callbacks suppressed [ 3378.690413][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3378.701978][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3378.770348][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3378.776257][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3378.780313][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3378.787955][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3378.793981][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3378.799755][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3378.850414][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3378.856450][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:50:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x12) read$FUSE(r0, 0x0, 0x2f) 21:50:23 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3a000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:23 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000240000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xfe010000) 21:50:23 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x803, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fe305ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xfeffffff) 21:50:23 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000048000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:23 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3a030000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:23 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xffff8000) 21:50:23 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x900, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:23 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040001d4c000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c677a7f7d70414b", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0xffffffffffffff6f) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:50:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xffffff97) 21:50:24 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000004f000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fe405ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:24 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3a620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:24 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0xa00, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xfffffffd) 21:50:24 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000064000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:24 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xfffffffe) 21:50:24 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3b620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:24 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000068000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:24 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0xf23, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3384.930552][ C0] net_ratelimit: 26 callbacks suppressed [ 3384.930562][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3384.942089][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3385.010338][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3385.010344][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3385.010411][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3385.016258][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3385.034840][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3385.041612][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:50:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fe505ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x1000000000) 21:50:27 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040003075000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:27 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3c620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:27 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f546d6f64653d3030303030303030303030b66d8714303030343030ac96a68d7365725f69643d4bf87e0f10eb97761968a08dcca444d4549a236a3f9746a06161497d84bddd6ecc6a25b0e891287dd203df4174233a027245f4c60513b6ecdba87ddba6a6ac30f74650f6ce6f2530fa93339bad61b9954e83d61bbe15e6797931387bc89b0ffedaa15c", @ANYRES32=r0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYRESOCT=0x0]) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000002f00), 0xff02) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x4, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x37f, 0x4, [0x4, 0x51d, 0x40, 0x0]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000440)={r2, 0x1000, "f4274bc2da829395a486bedea38257cb6b44019a0ce2c1cccec7cbf9185b133218efcce7758b07d01a6602be77d9e9106c024e09a4343ce3fdfa664a052a720352ac15c323dac4f85fc9bdf2225280947d83327eac22a162a5cecfd7146d6f070b42d18ed86222f10b2670f2b81520cbf08f3466496a14d6c007e53f28c4c0268c490b8273a3813e4a3ebdc2436b370842fb1510099c4f82fae54ad5a5ad4d7b8b45ebeea1b8b2d1724fbec4f0587cf89dc2cd8dd26eb4a3e20e00b76ed723171ecd9ffc1038f4d4ef25cee2a4b15221e51030f99368d62135d70807b30e974feaba0c9cd3bf15aef7f9515bd4ab6ba598a561c5ca762b739109e566495121b841cd919e87e6aee15d06169ca576d3a547424217ad3b0ea5871eb70ea40025bdd1f14dff62fd5720375c430bcd6e6950b9bbfe6b4080649947d9df95c1735dd265ba4f4cc82b980218d067fd11c44b835970a6ab083fca3599fc1c827ea36e2a28dc663d2f89ef5f35a378dacd3dca5cd9f98eca0ce8730e898140d89346e1c40fc4e4ce89b3aaac1d61694688a5497e04fb1676a8238c1366c711c18d84df5a42456e5a05cfa16238e6c1f2528154f428bc3c323e988722f7a34a52f78b06deb232105164d6ab2a10d7792142e99fbf261ca74158b83bdf0f12cfab9f5cb67643122fd74f46ff6ae30d9b250eb66b11d2238e5d6e87b67c8cecb4d1560c7886cc522290cce96afdb7d8778d45e0d66a879624864e9d23b96d81c1ebd0e17132cc67127c92ad9b8323dd3bf0d0e9ebae9e47f6505b1f95dc3d34c7edd5e4e45eb8a757b87d277cf1115a094a4dd16b5a8f46cb82f1f40d279159d619fc03893faba433802e9cd46ebc57dbbf04d56ed96f2977721ff055be27009d9135e070e34ba6e0045514b88d748b3fb7b27d564ec75ece8803c697a8a784ab6f70faa99b2a19be39516c1becdc24ba33130d195ddd75c41a7ca632473008bed560c1895f37f94a159560899248679503671756f66ee6985abc79ac6c32f516a1e603102c09329f1be5daf7861dcdd41216d764f872582338739ec8f9502ee341d35c31f757be113016215929cc4ab1a52ad20416489ae0f5ff818c4c0bb88fe56469f8f437279335bf427213df3c63669c22035743fd60a5e569cfd05b2be5eeff6738d668aae3c91070ce8cd68f8f9c9841897d04196c222ea99b0efbf6c1529c6f89ac2820e452699fd66b2ea8f57c90d0a9d182eebce0bc3c415c8c73657fc0299340cbbc28d97077118d1a6a0b6a009e302a9f4a122084baad00675420002b0f50bb0916aa97b49cc8b0790f81bd33bc7e020cd0c5c7781ca2b4e9f8a638d68138423944b2f3a46c0667eaa9e28b132b1e6359c5c356fd086f13138940294949dc66bb52b5220e6626cacd9c3c9e46308115271fa9473e71ee5e4d2f8e6297f532a73ee0b32908150100e0122035c327505ab393f14fc89d4350cc169da83031b1b64859ec45cbabac9d2384dad2cf04281e11df68ebeefb218225aee703c25299466a72d4afece4d3b2def651f3a46b790bf9f6085151c6ed5a788a60e5a811c856cf26aa390c98a652e67283073372d911434da732f08d5943ecef93c55d02027538946a4f8e57c06539c8643568acd73187c10c84f905534ec1e158e14ee5fde9d1f7028f4801abbf5b709f6ed2966adf02d4999c8bc2c45a0950297ec0bdfc2aa73f51f3634c8b5f0cc4b8aa0e455ba76bb1b7d2e3fa2a2d68873a176c830f69093aca196bb696e39e5241f3a6a097a3c58adbb8e9a50fcd4e780cad99f0cbac2ee558fab45a5eca820862a270b152101c02fb2fcf3b5c32099ee781f74c878853fda986b052308cb8621a05c087281f9de1b4a8be7717df933a26c0d6e0303251b0fa4ec6e5813f4ffac1fedb264b0b9f8eab484eb4dd24e0c138244fd662d0c90b261e73abf0b9a529308bb8ad2711f1b01baaba98e5b20a7657e8702b671138d683667563a1388050552fe760594572983a4fb85e281b901eb6639da1823fdb6b8b1df5c79229dd517ef122d76202023e193138e40fa7b61cc33bde5b439300e627033b612df202feccb94e698e7e1864200d30a5a917d3714478d4a1852764948b2849f587449873f13bb69cadaeb41c5b4ed319b6fd38bf536c02f65ba0ba70219054b25588ddd0353f6918f3d77df4acd116560f47c329413924a8f38c54cff59f9cd5a346dbeb2afaad16b0e14e1754a68f1f664315f98b634e9ceee3725204c20fe442e47bcfd96df057f55751faf738bfb444ce6ede5c59f30dce89eb52b7b45d4fb5bd3601f7fb4ca0301664ba5befbcb6fbbdd042d261bc6a64706addf5e65567360936e54927ec994a78f0a0c2716197e5c7e76854178280a7c3b7474826338b100712e2125bce16ad7b36e4bddde4e2210ab43e372602ea2e3228ad7725c9df36f5193924f7adb76c86e0a819189094a51ae295c329bc50dfc71382b3af65f00ae2e037a6ad24acd30ce97119852d9d434926f0544020b3857fa5b6aba34f7fd8126dd72e25036dd65d75530cad52180c5ed8064ef6fd65429a16cee7101ea1b61b0c7cd34f7e804f5f3e0ca1d99ac6030bce1603967ebc7fba1b1831bf5d2503049557ec3203e640b36d4d0aee671eb2915d877d725dbc04233daaf5ac931e7fc7d7d181cc0a461dea8be68286efb982be5b1e82ef48d42984140d400c42ec42b320ea4892e9e48901521f86b35e6c46c9435ca51f071dcb9c28eaee8857e3d635c1a866303ece8b4752638f97db10b0f0c94a07623231e676875d023088d49bc734e4caefd42afb1fe2445732beaf91416b7122952314c8a45c630f8e7b32cd266b38c5aa8a1696515f4ed26b0d8e0c9b01979b434fa6ebaf78748e0e4cbfc7219aa4e1771883b588bdbfe7e4885e268e2e31120c814600d7449d57470f800b0e5ca4c09d608be45aff37dc18b5c7b9898c50f4a8f103a7b4f4c934eace220b9c7fbf51b9332c6b34d6766604d914223cc4e9c3ef285f86fa238fdd5fa0bda78f6193c7e68a50948117ea7b0c02a26543f0180ba574fed372b981861e5c92005daa85183005f9b5779b69b4cf2ba83058acab4d962fd7c8fb5356e19698a150c2991cc99677fc751d962023ae3d9bb145131e025a3d0c5777990917ece791cee6f2c146540362484a30e24dbfe684926c0907458659389a66fdd82bac9af5b8c826b5980e2e6d8cb9451ed4712660f9b48fc04f472b31da4e99a87405f71d951e7d14f26a59fc222293355272f06eca7b60d1cbe46246b5de3635e5b1c4bf543fc85328c0c4eecde07f5db5e7dcb59aeda41fce7ded4052f7ddb2e64109c0aa9ac133fd1854c51090250d4f6288126b318cd400726db8ab10ea821ab683b1268f14f20fc75cffbdfc4e2f3c3078ac1b7f96af8ac44ccdebab4ffffa99aeb9bd71bfc4688925c45e117e5b5a20e5609ece74ae1b97ec85b3d18fcc2911f42fadc5af99dd517c708b36495e4449b54b32ae49168f26537b20b2c78cccb6ccbd63891794ea0ca15bf7e35e1c9007a66950290475b08f282ce75d5871ee8fac2937b256519a2e6be33aec85848b8919e0befb24ccd49f2cfa0ab5a434a72c54fc95bb5df5f08e15b7782cb128405016a70e5e698576259c4072a97f9665da478c35ff602ac19f0e5e6598238e68a3605500c0b1eae84cd58d932a448fec301aaadb062569ca58938492b245af1ef3cf155bab315c764dbf40748805b31c9b224f3306d66e4b18f5234168cfd266a214aa4055c126ff910e5cd60199a5774cb083bb7824564deb503028eae22c18b060684249c2b36d5a8dcc7852dbb3462942f0fc1d8ec5684ec357b98948f5d10225166c71af738806b0036baec527bee5065cda934111fd1a77e7fc379c4298cf58320054a222395f0b75ceb164e43bec9aa6c7faaf1da5b688dea383c60c411a38dc81e45ea4e8c90633df8e43671a242a6aa25818ee634b9ca117a1d6c8e3e4c80642a9d95f502e9b6d2e1235c91527e1e48e0020b0d97988e48ba38ccc554b5ed9f93f06a6b11bd8a8c563704e3b0298181d27754af916ba6246d94919001291135f6ac675b1f58a6ed22b5bbab515116534d9bf24c6d049e26208bd57250c0aedcb93d8a152ae5eab02779eb4832b6169ea08a8eae7c37fdb3d565f4e8d54014b715f98f2d33b2ba328059cc86d21700b02037dbfccc11f9e5d9d602a15ce3bae2289f28e38d5076e68a40c63ac55b44ba68064be3be4056e00b9de0257369221dc7043ccd649e862924c3797dc468816a3bf190aac5f2469864d0dbf05204d38743ba8cbb5913c3baf3250ef1d3649e6a2317e3cf5653a916928ed88b0d06f5d18ec6ea815b6c7bc53de2da27eb0a12b8f5a3dc36cf18992518c2ec5d0bb91310e9375d13f01a66f41e3147a5c0275968c4f91a1d51dfe12954ae7fcd854e3571442f449ea2511c417eb0df045540f27cebd60b703c6ac039a83549b0accbd1fc49e5e36496211bc8ce19e23326d9940ec2bbe9940600cc44325060658e48062299bf29036bc51130581e54c7fa7ffdc5197c8624b67bfbd556db5bbbc3d36ccb63360f30d8c01942762517cc6381d6eb4f8f73da62df949d738767206c0fff4a068a7634f4940dc6f995f564e08b94d9a00c790b7267a104c74784f473caecb6065738664392c9dbc620053e848114a560201101978e9f6c5f72821f2424db65751a50642a669a5402f50ab6db62d4af05afe6cc38c9ec4f4f021c672d7e2a27f317c772378665844b67169b26b61582bbdb11a87c7df49f308ef569494def77beaf47a6adc50dea1d8b2022103be86af2d31589586c62965edb3f1d50d5a52d0a71cb0e59f34db16d04d69c2ebb14c20e44e37b0d2479d5f18adf46e91479280f3d270b41909d127b4734109f1fd9e8a9ee5eca7f01e97ec4e9ae55f10bb5f47180d7a58d6d591e9b0286ad1cda36aa5765826c4566e639ce5ba7789d125e8028c994aec05d8fbc175edf99d672aeafc48528e27cf247d32cfe8ecab4f542bad32f39bcbe2c9a215e93de670b847b1cfdd25404784d7893b1d8d162123f633d4489139e621e7519ad15ad577a68ef336bb10e0ea4814695e1e31a8e1ffd809bb3326d4b5abee30112c87fd0dfbee8662993b28d647e2eda55175768a00a3d693d48966acc4038e7c43f70d8cde7a8028f926eadfa56dba078e6062d29060d7731ed5460e5d421a07939032a17739eaac0e6b89a26f31856744961d24531dbfe096b58d3956418980749209f6e328d3e21294a88db32b9e1c0fb04b95ed4911e17fe8cf11b8b53683fa3fe03a6f37891ca7cf114005da6f153d4c32368fed670804ada289d512fa453a08ede422121214c126daaaf8c91c21c77c45de1eca5385efd9894b78e22aff181c6894aa2ca5c276953f028aa01f10caa4f924a784fee52fd132cd4918ffec8c99544e3f92ab2ccb863866e06abe8a11446096779a2f5cdd1f5f292b248402be7580b09b4d720a83c4defa30bb3ba58a7bcf3abbc64eebd61fa06203e59e50a6a45ebf9b4afad995e5a2df96bbc886a565e950d994d2d2ce006991494aade95739ce1900db5031718a98d3ac22370a2959020a831ab91b29858e0109c7763bd9ae488886ac497d91b13d5518a0349170ca279ed5daa4bdd78cff84de91cd76ce11d14f5473f83f13d77e56d8e11b2336eb15ed94c108313958b4b075e1f04062a60e1ee8db0d4c573b5d74d1727213f32f767e2bb59205e731dbf3b3c9f1d094"}, &(0x7f0000000180)=0x1008) r3 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r3, 0x15) read$FUSE(r0, 0x0, 0x2f) 21:50:27 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1200, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3385.090352][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3385.096235][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:50:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x1000000000000) 21:50:27 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000083000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x4000000000000) 21:50:27 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040003a98000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:27 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x40000000000000) 21:50:28 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3d620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fe605ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:28 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1700, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x80ffff00000000) 21:50:28 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000400000c8000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='bd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) r1 = gettid() r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f00000000c0)=0x9) tkill(r1, 0x15) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000480)={0x8, 0x120, 0xfa00, {0x1, {0xffffffffffffff81, 0x3ff, "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", 0x6, 0x7f, 0x7f, 0x8001, 0xffffffff, 0x81, 0x2}, r3}}, 0x128) read$FUSE(r0, 0x0, 0x2f) 21:50:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x100000000000000) 21:50:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000400000d0000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:30 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3e620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:30 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x1f00, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fe705ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x200000000000000) 21:50:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000400003e8000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x300000000000000) 21:50:30 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x400000000000000) 21:50:30 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000400001ef000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:30 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3f000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3391.170507][ C0] net_ratelimit: 25 callbacks suppressed [ 3391.170517][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3391.182012][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3391.250326][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3391.250372][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3391.256152][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3391.267782][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3391.273592][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:50:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001f00), 0x1000) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x800, 0x0) r1 = gettid() open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) tkill(r1, 0x15) sched_getaffinity(r1, 0x8, &(0x7f0000000040)) read$FUSE(r0, 0x0, 0x2f) 21:50:33 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x2000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x500000000000000) 21:50:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000400001f4000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fe805ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:33 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3f620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3391.330357][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3391.336178][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:50:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x600000000000000) 21:50:33 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000fffe000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x700000000000000) 21:50:34 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x2258, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:34 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000feff000000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:34 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x1f00000000000000) [ 3391.810324][ C0] protocol 88fb is buggy, dev hsr_slave_0 21:50:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x800, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x2007b, 0x0, [0x0, 0x8]}) 21:50:36 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x40000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:36 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000020000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fe905ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:36 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x230f, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:36 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x2000000000000000) 21:50:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x2003000000000000) 21:50:37 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040008010020000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x230f000000000000) 21:50:37 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) listxattr(&(0x7f0000000100)='./file0//ile0\x00', &(0x7f0000000380)=""/162, 0xa2) 21:50:37 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x2801, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:37 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000040000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:37 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x40620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x3f00000000000000) 21:50:37 executing program 2: r0 = memfd_create(&(0x7f0000000240)='/dev/autofs\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x5, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {}, 0x0, 0x0}, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') 21:50:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fea05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x4000000000000000) 21:50:37 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000c80f160000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:37 executing program 2: r0 = perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x12, r0, 0x0) mlock2(&(0x7f0000007000/0x2000)=nil, 0x2000, 0x0) 21:50:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x4800000000000000) 21:50:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000640000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:38 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3600, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:38 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000982ff9)='mqueue\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000540)='./file0/bus\x00', 0x0) mq_notify(r0, 0x0) 21:50:38 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x41620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x4c00000000000000) 21:50:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000800000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:38 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) 21:50:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067feb05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x6800000000000000) 21:50:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:50:38 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x3f00, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000100000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:38 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x42620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x6c00000000000000) 21:50:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:50:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000200000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:50:39 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x4000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x6e00000000000000) 21:50:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000300000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:39 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x43620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fec05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:39 executing program 2: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae07, 0x0) 21:50:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x7000000000000000) 21:50:39 executing program 2: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae07, 0x0) 21:50:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000400000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x7400000000000000) 21:50:39 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x44620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3397.410370][ C0] net_ratelimit: 24 callbacks suppressed [ 3397.410380][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3397.423363][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:50:39 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x4800, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:39 executing program 2: ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae07, 0x0) [ 3397.490388][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3397.491253][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3397.496420][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3397.502755][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3397.515567][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3397.522304][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3397.570353][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3397.577292][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:50:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000010400000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000500000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:50:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fed05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x7a00000000000000) 21:50:40 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x45620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000700000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:50:40 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x4a00, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x9003000000000000) 21:50:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:50:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000800000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:40 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x46620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:40 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x97ffffff00000000) 21:50:40 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae07, 0x0) 21:50:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fee05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:41 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000900000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:41 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x4c00, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:41 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae07, 0x0) 21:50:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xb002000000000000) 21:50:41 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x47620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xe000000000000000) 21:50:41 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae07, 0x0) 21:50:41 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000a00000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:41 executing program 2 (fault-call:1 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:50:41 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xfdffffff00000000) 21:50:41 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x4e02, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fef05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:42 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x48000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000e00000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:50:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xfe01000000000000) 21:50:42 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x5803, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xfeffffff00000000) 21:50:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x2, 0x0) 21:50:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000001000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5421, 0x0) 21:50:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0xffffffff00000000) 21:50:42 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x48620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067ff005ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000001600000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5450, 0x0) 21:50:42 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x5822, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:42 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x17, 0x3, &(0x7f0000000180)=@raw=[@jmp={0x5, 0x0, 0xf, 0xe, 0x9, 0xfffffffffffffffc}, @generic={0x9, 0x5, 0x40, 0x51, 0x9}, @call={0x85, 0x0, 0x0, 0x3a}], &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, &(0x7f0000000200), 0x41f00, 0x1, [], 0x0, 0x5}, 0x48) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x12, r0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f0000000000)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f0000000040)={r2}) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 21:50:42 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x49620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5451, 0x0) 21:50:42 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000011f00000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:43 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x200400) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)=0x14) openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:50:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5452, 0x0) 21:50:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000002000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:43 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x6000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067ff105ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:50:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x5460, 0x0) 21:50:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000753000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:43 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x4a000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:43 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x6087, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae00, 0x0) 21:50:43 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000003400000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) 21:50:44 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x6800, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:50:44 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x4a620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067ff205ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:44 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000003e00000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:50:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae03, 0x0) 21:50:44 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x6c00, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae04, 0x0) 21:50:44 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000004000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:44 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="1cfd78a24c32a83758147cc64010c5530273aafed8b0410dae2cdc939f8f44f8047ad69eb9a81d148e398246", 0x2c, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x220000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000080)={0xfff, 0x900000000000, 0xa7eeceb}) 21:50:44 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x4b620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae08, 0x0) 21:50:45 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x7400, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x103040, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:50:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067ff305ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x40049409, 0x0) 21:50:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000024000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:45 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x4c000000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x800) ioctl$sock_inet_SIOCRTMSG(r1, 0x890d, &(0x7f0000000080)={0x0, {0x2, 0x4e20, @local}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}, {0x2, 0x4e24, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000040)='veth1_to_bridge\x00', 0x6, 0x40, 0x81}) 21:50:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x4008ae06, 0x0) 21:50:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000004800000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:45 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x7a00, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:45 executing program 1: ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(0xffffffffffffffff, 0x40106614, &(0x7f0000000040)={0x0, @speck128}) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x10000, 0x0) 21:50:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0x4020940d, 0x0) [ 3403.650379][ C0] net_ratelimit: 25 callbacks suppressed [ 3403.650388][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3403.662256][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:50:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000400000001d4c00000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3403.730330][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3403.730362][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3403.736707][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3403.743798][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3403.756664][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:50:46 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x4c620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3403.810379][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3403.817262][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:50:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067ff405ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x2000000000000000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:50:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc0045878, 0x0) 21:50:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000004f00000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:46 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x7e01, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc0045878, 0x0) 21:50:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000006800000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3404.290393][ C0] protocol 88fb is buggy, dev hsr_slave_0 21:50:46 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc0189436, 0x0) 21:50:46 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x4d620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:46 executing program 1: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000040)) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f00000000c0)) fcntl$setstatus(r2, 0x4, 0x0) 21:50:46 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000ff01108000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xc020660b, 0x0) 21:50:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067ff505ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:47 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x8100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f00000000c0)={0x40, 0x3, 0x3}, 0x10) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1b) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) readahead(r2, 0x3, 0xaa7) 21:50:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000002108000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:47 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x4e020000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x400000003, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x100) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000000080)) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) 21:50:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x101000, 0x4) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000040)={{0x9, 0x5, 0x3, 0x59f530ec, 0x3ff, 0x10000}}) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:50:47 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000008300000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:47 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000080)={0x26, 0x10000, 0x5, 0x0, 0x0, [], [], [], 0x8, 0x8000}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 21:50:47 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x4e620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:47 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x2, 0x440800) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x1ff, 0x4) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000040)) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:50:47 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x8203, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067ff605ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000400000003a9800000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x2004, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000400)={'nat\x00', 0x2, [{}, {}]}, 0x48) 21:50:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x8000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:50:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x800, 0x0) 21:50:48 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x8403, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000ff0110b000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:48 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x4f620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:50:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000240)=[@text64={0x40, &(0x7f0000000100)="c422f930b800000000c7442400e1000000c744240200800000ff2c240f3265420f06640f08460f0019c48145dec266ba400066ed66b81d010f00d0410f30", 0x3e}], 0x1, 0x20, &(0x7f0000000280)=[@flags={0x3, 0x40000}], 0x1) fsetxattr$security_evm(r0, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="030100000000000700a4b269a0a4d06e9edd13bc0f3cba02acfc667a0a8188fff967986c9eefb0733ceed584b59de3f2ef703133903a6eb36b1b2333f2e8f801a8fa5820e6731d6835ae4fa22c45b2429334706274e106d4b55039e9a1319d3f0536b948a0e6f6b5df1ecd90400c923529b905f87833425a8f4c1bcfa6226f6773a01e1646c7b3c61bf8ac739aab74b15dbde08d0000000000000000000000000000"], 0xae, 0x1) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40000, 0x0) accept4$tipc(r1, &(0x7f0000000040)=@id, &(0x7f0000000080)=0x10, 0x80800) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:50:48 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000000c800000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:48 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) 21:50:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067ff705ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:49 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x9003, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x12003, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x800, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000040)=[0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x3, 0x2, 0x1, 0x7}) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) 21:50:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000060000000000400000160fc800000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:49 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x50620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:49 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8001, 0x400000) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000040)=0x1f) ioctl$RTC_ALM_SET(r0, 0x40247007, &(0x7f00000000c0)={0x16, 0x1d, 0x14, 0x14, 0x6, 0xa6ab, 0x2, 0x80, 0x1}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae07, 0x0) r2 = creat(&(0x7f0000000080)='./file0\x00', 0xf0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000100)={0x5, 0x7, 0x2}) ioctl$NBD_SET_SIZE_BLOCKS(r2, 0xab07, 0x8) 21:50:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, &(0x7f0000000000)) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:50:49 executing program 2: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae07, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200a00, 0x0) getsockopt$XDP_MMAP_OFFSETS(r1, 0x11b, 0x1, &(0x7f0000000180), &(0x7f0000000100)=0x60) 21:50:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000000d000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:50:49 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000080)={&(0x7f0000000040)=[0x3, 0x2, 0x5, 0x7, 0x5], 0x5, 0x0, 0x1, 0x8, 0x8001, 0x4, {0x0, 0x8000, 0x9, 0x7, 0xffff, 0x0, 0x2, 0x21c1, 0x4, 0x5, 0xffffffff, 0x1f, 0xe9, 0x40, "7f868cadcccbb9aa6c911a45297fc04accb640cdf8a8fdf6d9a98ce44f0fd0de"}}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x725b8e1558ee1dfb, 0x0) connect$bt_rfcomm(r0, &(0x7f0000000180)={0x1f, {0x8001, 0x9, 0x6a6, 0x3, 0x5b73, 0xffffffff}, 0x3ff}, 0xa) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000100)={0x4, 0x8, "ed8f90f871c6786a3cadc99273e0360083c53b2d4e37d3c8", {0xffffffff}, 0x6}) ioctl$KVM_CREATE_VM(r1, 0xae07, 0x0) 21:50:49 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x9a02, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067ff805ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000ff0110d000000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:49 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x51620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:49 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:50:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:50:50 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x9a03, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000003e800000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:50 executing program 2: syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fsetxattr$security_evm(r1, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@md5={0x1, "4d6c7707b2e0488dc6e4a82f71e2fdad"}, 0x11, 0x3) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000003c0)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f0000000440)={0x5, 0x10, 0xfa00, {&(0x7f00000001c0), r3, 0x2}}, 0x18) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280)=ANY=[], 0x25b, 0x0, 0x0}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) accept$packet(r0, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000004c0)=0x14) r6 = getuid() setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in=@broadcast, @in6=@mcast1, 0x4e23, 0x100, 0x4e20, 0x8, 0x2, 0x20, 0xa0, 0x33, r5, r6}, {0x100, 0x0, 0x7, 0x8, 0x5, 0x127, 0x7}, {0x6, 0x2, 0xcf, 0x4}, 0x2, 0x6e6bc0, 0x1, 0x0, 0x2, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x25}, 0x4d4}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0x18}, 0x3506, 0x1, 0x3, 0x2a3, 0x0, 0x3090, 0xe7}}, 0xe8) ioctl$KVM_CREATE_VM(r4, 0xae07, 0x0) 21:50:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x404002, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:50:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000001ef00000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:50 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x101000) ioctl$RTC_VL_CLR(r0, 0x7014) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 21:50:50 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x52620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:50 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0xa001, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067ff905ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:50 executing program 2: recvmmsg(0xffffffffffffff9c, &(0x7f0000006980)=[{{&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f00000014c0)=[{&(0x7f0000000080)=""/90, 0x5a}, {&(0x7f0000000180)=""/140, 0x8c}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/234, 0xea}, {&(0x7f0000001340)=""/80, 0x50}, {&(0x7f00000013c0)=""/196, 0xc4}], 0x6, &(0x7f0000001540)=""/176, 0xb0}, 0x6}, {{0x0, 0x0, &(0x7f0000003800)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000000100)=""/46, 0x2e}, {&(0x7f0000002600)=""/205, 0xcd}, {&(0x7f0000002700)=""/230, 0xe6}, {&(0x7f0000002800)=""/4096, 0x1000}], 0x5, &(0x7f0000003880)=""/33, 0x21}, 0x7ff}, {{&(0x7f00000038c0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000003a40)=[{&(0x7f0000003940)=""/212, 0xd4}], 0x1, &(0x7f0000003a80)=""/62, 0x3e}, 0x5}, {{&(0x7f0000003ac0)=@can, 0x80, &(0x7f0000003c00)=[{&(0x7f0000003b40)=""/191, 0xbf}], 0x1, &(0x7f0000003c40)=""/84, 0x54}, 0x7f}, {{&(0x7f0000003cc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000004180)=[{&(0x7f0000003d40)=""/54, 0x36}, {&(0x7f0000003d80)=""/218, 0xda}, {&(0x7f0000003e80)=""/106, 0x6a}, {&(0x7f0000003f00)=""/74, 0x4a}, {&(0x7f0000003f80)=""/161, 0xa1}, {&(0x7f0000004040)=""/87, 0x57}, {&(0x7f00000040c0)=""/53, 0x35}, {&(0x7f0000004100)=""/54, 0x36}, {&(0x7f0000004140)=""/53, 0x35}], 0x9, &(0x7f0000004240)=""/190, 0xbe}, 0x7}, {{&(0x7f0000004300)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000005600)=[{&(0x7f0000004380)=""/4096, 0x1000}, {&(0x7f0000005380)=""/175, 0xaf}, {&(0x7f0000005440)=""/149, 0x95}, {&(0x7f0000005500)=""/231, 0xe7}], 0x4, &(0x7f0000005640)=""/37, 0x25}, 0x3}, {{&(0x7f0000005680)=@rc, 0x80, &(0x7f00000068c0)=[{&(0x7f0000005700)=""/59, 0x3b}, {&(0x7f0000005740)=""/33, 0x21}, {&(0x7f0000005780)=""/70, 0x46}, {&(0x7f0000005800)=""/4096, 0x1000}, {&(0x7f0000006800)=""/184, 0xb8}], 0x5, &(0x7f0000006940)=""/32, 0x20}, 0xffff}], 0x7, 0x40010000, &(0x7f0000006b40)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000006c00)='/proc/capi/capi20\x00', 0x4000, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000006c40)) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000006b80)={0x8, 0x430, 0x40, 0x15d, 0x584edfa7, 0xffffffffffffffb1, 0x2, 0x9, 0x8, 0x800, 0x2}, 0xb) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae07, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000006bc0)=0xfff, 0x4) 21:50:50 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000001f400000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:50 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x3ffffe, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f00000000c0)=0x80, 0x800) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000100)={0x3}, 0x1) accept4$alg(r1, 0x0, 0x0, 0x84800) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r3, 0x10, &(0x7f00000001c0)) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000240)=r3) r5 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0xfffffffffffffffc, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={0x0, 0x401}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={r6, 0x853}, 0x8) 21:50:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x8001000000002, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:50:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000fffffffe00000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x80050b04e, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) 21:50:51 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x53620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:51 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0xa102, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000801001ff00000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000000)={0x3, 0x80, 0x6}) 21:50:51 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x3, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x2000, 0x0) r2 = dup(r0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000002000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f00000000c0)="66b99303000066b80800000066ba000000000f300f0767660f382587060000000f0fdab666b90403000066b89400000066ba000000000f30440f20c0663501000000440f22c066b8008800000f23c00f21f8663502000f000f23f80f20d86635200000000f22d8ffc0baf80c66b868ad218166efbafc0c66ed", 0x79}], 0x1, 0x0, &(0x7f00000001c0), 0x0) r3 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f00000001c0)) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:50:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f00000001c0)=0x1f) pwrite64(r0, &(0x7f0000000000)="1bc359326a538ac8c297e81642d91fb7981df1ab20641d5a0ace736c3553bb24cdce19f4b698c87f10d80ee99374d6140db05ebefcf3a6dd01ad8929565b71361141aed9b4bb95ad4670af6f869dcdcaaf4b65bb6874d99910f6c4dd831a952de9b2768d705e2c081ac178371030b0aaedd79a487839d841c8b7c5", 0x7b, 0x0) r2 = ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000080)="d8e02c8fcb14036005ad731d2b4cb95b3efcb4343ea35f3ca0178198cff8ccfb652e770848458262e8a19b019466e3fc62c02f7ae4dff11cc05f3144ad727957", 0x40}, {&(0x7f00000000c0)="292ff35ba2607f4fe19eb262b6253d1d6c726c0ea781f9f2b6f161977e379a810ec9b809b5753becaab87ba5f3b5b43ed3fbf9a7cbb303cf1457507e8546a969da4a73109a88f530b8c8b6a41740f9ffd73537ede17cc6aa6e3cb0bdf414d8a1222bff", 0x63}], 0x2, 0x0) 21:50:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067ffa05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000b01001ff00000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:51 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x400004, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000040)=""/75) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f00000001c0)={0x9c0000, 0x3, 0x2, [], &(0x7f0000000100)={0x990bfd, 0x8, [], @ptr=0x8000}}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000200)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) ioctl$RTC_WIE_ON(r0, 0x700f) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@known='trusted.overlay.impure\x00') 21:50:51 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000040)) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x2c, r2, 0x12, 0x70bd2d, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x1f}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x9935}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:50:51 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x54620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000d01001ff00000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:52 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0xbd02, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(r1) ioctl$UI_SET_SNDBIT(r2, 0x4004556a, 0x1) 21:50:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000feffffff00000000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:52 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3ff, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x3, 0x2401) ioctl$KVM_IOEVENTFD(r0, 0x4040ae79, &(0x7f00000000c0)={0x6000, &(0x7f0000000040), 0x0, r1, 0x1}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$KVM_CREATE_VM(r2, 0xae07, 0x0) [ 3409.891355][ C0] net_ratelimit: 23 callbacks suppressed [ 3409.891432][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3409.903750][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3409.970338][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3409.970382][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3409.976210][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3409.982207][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3409.993763][ C1] protocol 88fb is buggy, dev hsr_slave_1 21:50:52 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x55620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3410.050366][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3410.056290][ C0] protocol 88fb is buggy, dev hsr_slave_1 21:50:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000200000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:52 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067ffb05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:52 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-control\x00', 0x0, 0x0) signalfd(r0, &(0x7f00000001c0)={0x7fff}, 0x8) r2 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000100)=r2) r3 = ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) set_thread_area(&(0x7f0000000080)={0x1, 0x20000800, 0x4400, 0x80000001, 0x7ff, 0x7, 0x1, 0x7, 0xa950, 0xffffffffffff0001}) ioctl$VIDIOC_G_AUDOUT(r2, 0x80345631, &(0x7f0000000200)) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000000)={{0x3a, @loopback, 0x4e23, 0x0, 'lc\x00', 0x4, 0x0, 0x75}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x4e20, 0x3, 0x6a7e, 0x7, 0x8}}, 0x44) sched_yield() 21:50:52 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001440)='/dev/sequencer2\x00', 0x4000, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000001480)='/dev/admmidi#\x00', 0x8000, 0x101000) ioctl$NBD_SET_SOCK(r0, 0xab00, r1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f00000014c0)={0x2d8, 0xfc9, 0x1, 0x93c5, 0x1, [{0xfffffffffffffffc, 0x1, 0x1800, 0x0, 0x0, 0x1005}]}) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) pwritev(r3, &(0x7f00000013c0)=[{&(0x7f0000000000)="f4712d8c0dc46eceb5aebd7d83f0bd0e7947542351bae289ca41f604b24d8d7bcc60c71f8cdaa4bbcf47a664adee59aac96e846cceaf445a0a953ec212a4c67b65934cc4", 0x44}, {&(0x7f0000000080)="b8fd71cc229ed24f98cb4369c40a7fbaccbf8a144c806ef9e742f7e1bf246fafadd60b3c7302a8f7b7452c40700e437f31f7182a0240e4246b4cf2cfd010c5ee443cf6520d75b5764bb1a1d16bdfc7c8338ae555f478e6f7c8166f113dd5e39dbae3743e226904a3c712e2836e0dee1672f376289a77fb29c589b1c647ede4ef0516958fa12f4a38b4014d365e9310cddf039a90e5a5772692fd19396c5ac18568737a15de45be22490b44d600ef943e2adef722828bf9", 0xb7}, {&(0x7f0000000180)="e2a91d7fa2038e1622def228e1b88457ff5b97a0ce7ed2ed9a83f2a09e953b0363bb3103044e1137d6aa61781e5592f5f222df4fb1eec5e44bbc3c3e92f5ffa74dba211ad1077024307cfc5239bcb58d73eb73b7b2302cdc1a55409559a21acc7fd834490d68d5f7c9a9c1fe20d7938e6e27f03e15348eee2bb27cf32d0e184c8a6eda4f040f3b453d3ba5f99501292f229d59d06462735054de83c79b4b0adb153806625e13ec642600b6a585361c89150c69a7ddc14fd2fcb96d04c7d10637a3d1a5e35fb206f5f9efd048ea0506264f8938f1644fe9f3dd122c8fe1977bfd56c98f8a61f1d2346cf173ca6dd610b8f5c8781fb2de1893f7283e03314f795614a9c35bd05ea8aa82ab9936b30342a396c2b523325d71a37e966969a4bbe2c85a3478062ecb0749669d09f2f583bf6d012ef0b3692952f6e6ae5d75e6f736850de9c1c59189c811f58ca17d76ebe3a46400b7b4a6b2545ee6f5560a657db126bafff9382580e5db9a98d83153671c6120a22aef2c973217edcd5b0f8c9ba4f3558eb3cbe2d004d6958f606a4dd8d886d1f73c89935f19d183004e4ac01166bc7be718c5881d5fe41d767d551733174d45d942861d2bd277797280249f6d79136bd530d8568b975a0f6fbb15fb7e16327814dfe86291aa1f1ffb2fb46d5652f8f51f99fedfa88ce045eb87e1052c491ccfc2a95752947cb789616959c136ec7fc9339e5bbd6cc18dd21a9242a6f8615bda82b7b27242521fd31d23945f798cf369ddaf9913387407331fc5b4a158bc30ffb9c788d30ecea2d94b4280198880d8a66d88b238d19ccc0bc5f41c9830037a5b0ed85604bb68bf3377179a93d9b7c64e81805ab734c8773dd81d37c3ead4b08151a0c7b7f86d805f8c3877c78f6a7f1c52a62e3d3dce09c14f457a641f91971634dd65b9a8b44f92d2cdf2604d802541f2120e9104844a4e80538706769edaa7ef9fcaf5b4f97a395d0cd6f8310096267a2350eef3229b203b70a0fc32fbe73a5b13460ce57ac20d8b62e92413cba1a15363e3f79ed6e85ac5f5c5b6968575964ff0fe6052f9e1bfc9b3222d0f085e54d524086a3ff9a2b83f06ef90debf028c32da7b1c0c3fbe463f1e5913ac30052c7f65176478384b0fa3660e9a669fdc7da2cf13e9fd2c52195fafa64b1c5613fa8e432879a6423a934d16b056294176a11f8d3b90516593f549c8266c118617241f6aa8b5ac66eb6bcdaecb9ed67c4e8803a5b3b828d8470da741c1f3a6b22fe5fa57cf92be42d41e687f2efb86fc6cad0d050f579033b5b71fc42c729ba49f80d7fa6fef82b9aadb334f43dd44f2e525f9a6b8c1e5626a3fa58bb805b89d58d9a027c44bdb909413128e5f3d1493213950694fe7200a10687c4afc3ca1265176ee27f61610bb0f516df6b0c2fc9a9c98dedcf74311705ae8a810b5d71d53015dae14781cc03716583c1fca56445d4e37975c42333cb672143864a55c09f12ad8bd0a3107b4664e2d025519d82adfa8190b67c8a80f9858473e58d364ed5f95fc17a0afbc75dd713ea141b4d3953925d5a3e596bdf65ecb9bfda7d8e643a90aa93f7b4aa851de37ae878c6e1ece6d6099dcd1ddeb08cc3a088e620d452acae52c379db8ec2c300c67d25be31ab0d6b1e8ac832bdd60601b1f60e898b67b5fa3d936bf3ee1f45d3e7aac3b5d5c7515ffae582efe2b5742ed22f3cde31d950a4066a6535eed8a5da0425cdd4ea3d9681faa7a67debdb95bef204b8a55efa894b073df7fa78cb629cc5faef6af1bcd383c865454e19fcb604de11f5f57fd4222db8faaec6efbc75bbeda3c30172b75f7faf0fc79092d163a7174641218fc56da83c85be74a3556d8d7ad85d960d858f12c86ec031716817674d990ec7a2ca3cb80fb7def5e667ff7f31e3d040f6aea63f5e4ed160002b5569d3bf1c36ec3dcf38dfbfaab4fd6b698160ba2ec37b6a645353d84bb9856e7102577cce0a01b4fd399dffff335562353dbdd6e9dfc73e4074788fb4b87b5187f496b1679a70070c3d0402cd5fdd1209bf46936103ec2f7f201c367714f8f4688528842d2a86ee28c3a1e1800e3ab9142aebad0be6bb999e393440c590b87c6d16b47841ed0f456094e190249fa9dff8d79579f7985dceb1441bd79efd738bf6be1eb24da694ac06db81480c3436358753b8131633d9bef2748d53563ad545e329a6465f435cfc8ced19b18c1c4e4beaa4d8302c4502c907813d432aacf6a40664154f8811601fea9671baee31a28d291c8e2d040ae77c740645ed875336fd6d9e09c2ef2db2cbdebc0a3f86632c039cbaed95abc1ab2202a2b24573cdf8c8c29ac4f6f474940a8d11ef348b6c24cbd353d28cde6b8cafaf8eda546c79c45ee7b9b1a364201ead27a045e28aa07fc9389bdebadca4d3c3995997425c392f32feb37f1100ef7816c029c403eb119a16d7e36d914b1f176dc432616f0f6ebec77cb4b3d1cdd0496837f0fcbe1c44538b7d2383da2673880cb08f2fa9d2d265afe1bacda3f3830013c8fed777db7d0cb95fee68d278136de60bf1b10427fee9aa646972f4e1480d2a62f8eee28945138b1ff74f741b4980f38e7784b03f77e7d40adca990d58b3f8c040ebf353da3785940cc5ef4ba89de43a3b30bb6f8f82e5882072e741273df19aa3cf0f4b4671fbcb95b41ccc451e5124b8dcbc1d029348fbaa3f13ec72b9718da4f3860ca172356464d73129cf1fa131d5580af660cc43c3310fcd1448125c957bf46b95a52e1b3ce199d81e45adec4dc75ef17429acbc5330c5aeaf1c8d2930c79193207499498b46f7d9de48c49ec7a14020fbd70700b193f502bab4cc404a7522250a254c0f4052a9b9da1951e89eca070b1669795db7013e4fb74a68a8439c481fd09aff46f6f285e2eb7efa28f33d5254e8cd461653e787295fcff0196a9ade3411262a80dd540067eebacd19b63a739a48341b18091c47f81511a8ee1886017a95fd947e0aba056a1392349f0c02fe65e22a12f7f175f8eac9b4f25d51f24fb07fb3f3db5ac4a1a44a7fc32d19e2780572f99bd02d65f91a110114e720f553f47de1e751f2492e42d73d9f49e9a1782531db0cb39ca5b8cfb33fd11e4a99f006ee10889fd48b13df0ec3bfda9cf9d9cde0c81504f51d7dc8cbfa726bd70d6b5757a7eae58802091f6bc9ceae545bebe8d0ff0126723895662127886d6fe59588d6bd23c436efbbc3e8727fc739371b69eda66a3a8bdb6ce0fcdb042463a22930b51e660de774eceb190486a13edd106de2638d2f322de496f1e200662a8f7d9106026eb49489c19bda5046cc5c91b1ce2afd12a24c28911d45f2515098c505555f8d6dd2ea425aea604d9274f60b819ea8bc58929ab79445a24494712efa797c1cb2f6a7f5d703206b0092531d6c0392306e4d9921f2f3f0b8ca516a5da7d1a09ac4314ccfa15d3acea9104ccf984157ebfc5f27ffbde33b9a8a356089d594cc006861a0bf6294037850240b597a555f9671f511bf477255064cb5597d6c08251451c3e09aa9394a0dea4c9623b4ca885aebefe590c815f691243b5c5247e2f8894335658a4a69be3641c8ba42c8f08be8a300e7f645bcd00bfbce14422da3b00f1cc2a71c24b48b25a9c751ecc2949e5961dbb93dac239b07a72eb669cf7031e27bac19752906c2deb680c7086ab079680d0320478a8c7b50a79190427fb7bbf4760c52f5f5e26c3796dbef1ba0d01cbed9eb24d329911134c8f6d6103e2a5139a8034e841f9a80c39d6c87ae814f624963c9498f7c0062f05c1afdedfca115b85bef2bed2259e1aa86e407a4d14219d5b5dc3a69169a724c779729d3d013d6547f7b6ae10427f7cecf294262883a76f6125f5216b84c5eb76aae76fea92bd412894c50d660ebbdd4c979ce3cf5727b1eaf21f04693c34b4b22d16c8c77a8476a413de22fbe0aed33316d25fdca6d14d396f6d10b421a1cfe075f135332cedf9c7143d5720a24cb93cad56b0e1cfa83782420b7c49aed7f8697149f5f5719ec45434763bc47cc8f65d655831255b84130e3a21f510b9027ea6623f0ad9ef387368cd2390f034d74edcf6ecbc85de8a5625fb1972e61d5de483bba3e9245d0863a24e6d299c015aa16ba6a35b321ac0db4c7d7367c68b58b62c30497172c125565b7175dd25018dbb33629768e9ecbcb12cbfd3b537f409fd3fcd77dcda926a2a74288c77cc300fac0dfeb8e35546fbc93ad1215217649ca3b6241583cdc045729edba552a19d8b85f49bdcce3013b5c4360226e42c951a4882634d6760e960c404ffcf192a3ce91f45c6fa105cdce9443ca683d9f12faa5776991f7fa92976e7c3537b633a045926d2313b98da89264509182021ce55f2b17482452d817410ed53c04ba60fee4fb69d22e385429e073d73529d72cd23d5db3a033a8cbf54d428466492c69bbcac669b22165b89e29db2b3773c87eccd35870bce4b1f86b0df7c12507cebce2edfb88108da60026e329e815de237fbd5c1d524571d30524528f8961e04d5f822b9342e38b0d02c8a67b6368d85fe75fcc688245c66bf6465abf421f1ef23036ec7836aeebf31d9ec5e57b92675cf00ed534c3b6b5fbcd5fa5a86496fb9735bcf60d67a8eaefda8c3f4dbbf2364ad12a7cc8147947abc88417f4b7328c10919cabfc2b6c2ed8a7b8276bc21d8965072c151b088c86427219a42313be344a41c70ac974a1abf38035098d81dc884e6e80fefdfd1c991262b97da5ee9ce2586308a334f5901761484b9260bef72c4a4e2449301d3b3fbaaffc714bb41518589636bf708e21c53073390921d87a38546e83d7c9cec8c57498877dc54c6e0ce6d2a39767234628f2cef3ef861ce2dccc68aa6174939dafedfe1a12296d2f799a6a4b4cc1f3a8c88428bd6583722b813258f0aa15fa65d339abf54fdc0735a1e86235d3ba38f1108ec8dfebbc1ff3b74c54061434b3f1ed7d38ee24000a6165001c05b9ecef2dec691d7a6d5a6f3ccc7700eb4859d16b3f021cede1a405d350099bea0630fe3df0d64a935029bfb46ddf90d13b7ff802e9fc82ce5aceae4ae406290827d6faf41abb96e1d537d026d456c18b91452cb6fae8d0858d327a3b31b26846385e47bbe87c149d15c106100b2422b4ac2b5b29678d6fde58d3afbae8beee1cb53e8d8ddc44887e90b4151d52b86b90db36d92019c0c30aa7865610306bf4b41645ece181531d2aecce57cf7029cc32ceafb04899010a1002c4c2209c3dca4da5cb46c1d60316df8eea5f9607a56ca7a900622750937976ffe9e9bb57ebed23b614c81ccb8cd7d4d17a147bfe20b4368e44771ca208f9d6d6ace126c2742e42029d444198eda41b180c16e885e4bd78230b316001f18d6f09f6bc50892cfa2b7f8a3c5c7842cac268450ddd32386867528875c5a8e61ca4539249dda79e157c49722ee3f5079a48b3d66115a6d515ff3cea8cb0f0e81b3c8a39ceccbd0912b898f9ed16a5d4740fd24825b18503dde40f4cd78e66b0002b92cdf392209cc0ceb1d7978a020f45974a1af0391ff0eb0437beca14cf4f5d2da1a4734968947f755950d885139af6cc982863df5e9febf3b1136186f3e40d9bd0da6a3a28d4316f67c440c7a9e14c9c70c0bcef6beb61147ec307867c8500882a430077ef9ddc2b1838212758c4cc8397d8642110c66fc4ec84dc8e906414559a1ee92161d1c34c9db18aa00f71fce95cf38ebef22a1e90b6953bf32e9708b745853c8f83ef2f093916b4fae42aaff2f27b223d82e21ca54179f010962338199f", 0x1000}, {&(0x7f0000001180)="c5956d3c218b79855471c507617286012afba52ab0fd631b612df6bf48be37c616c2dbceec2b1879190d628896f9759a44bdf45b116a642d18c2c256b4d81b75ba21ede3150e8ac764b144505551826172b16efc4da9da818684dda066f864d54049f812da32b3e5cf6630326572cb47a0291f11bb8506d36de41f83fe13649491c6e62451f8ce49020782235cd6eb765e4a89dd9ac2eda75418bfa46f1f7ba5ad5a0717520c50e4ca0504913c3f", 0xae}, {&(0x7f0000001240)="5a2db762f2583be81bcf740aeee8958d047b850ad9665ee1ae8f0023f2ee594a2d0492fc4ef923a11981feae1e132b", 0x2f}, {&(0x7f0000001280)="c35cfc5711f7457696a2a41b4335f097d8099c3e048e5ea0afdbdb3779296f05d2b90995bc9d6ef80a94b4eb79ce7accfb8099a81c8e4e479cb343994876583da7c8f43ffb0906490ecc5ea6bcaad33bfeda1d8c196ba67c6b7f524affc73fe973e64ec6dd70e3842a9bc1b54ead2388406b8ad333ad8055", 0x78}, {&(0x7f0000001300)="2f29ff882db76f7c8ccf8920cc9176c70e0aab554835fd67e2a3ceeba3bb6c333e8851b3e2b80aa99caca8e1f3f1cc24c4ea986eabf570288734f9033314f050690b121f193ab5324cefb69aaf09be60599a96995e3fd61d2020332832a635b089c9e6afd087083b786cd5dfe7679c6dcd473479f72d986b5f5a43ef4a5fdb8e2c162e7c9d6b563c15a305eeb6f1bf6a0d7f165ed1f6866383d397f8cda0d9", 0x9f}], 0x7, 0x0) 21:50:52 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0xc000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000400000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3410.530381][ C0] protocol 88fb is buggy, dev hsr_slave_0 21:50:52 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0xffffffffffff0ca5, 0x88400) write$P9_RWSTAT(r1, &(0x7f0000000100)={0x7, 0x7f, 0x1}, 0x7) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000180)) socketpair(0x3, 0x6, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = creat(&(0x7f0000000080)='./file0\x00', 0xc) ioctl$UI_DEV_CREATE(r3, 0x5501) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000040)=0x9, 0x4) 21:50:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000006400000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:53 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x56620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:53 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x200) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) syz_kvm_setup_cpu$x86(r0, r1, &(0x7f0000fe7000/0x18000)=nil, &(0x7f00000000c0)=[@text64={0x40, &(0x7f0000000040)="f20f2da9c24774e066ba4100ec0f219164660f38829d7ba13d63460f01ca0f0766baf80cb814e46e88ef66bafc0c66ed66baf80cb89602d48eef66bafc0cec262e67660feb95a78c00000f20d835200000000f22d8", 0x55}], 0x1, 0x18, &(0x7f0000000100)=[@dstype0={0x6, 0xd}, @vmwrite={0x8, 0x0, 0xe2, 0x0, 0x4000, 0x0, 0x80000000, 0x0, 0x2}], 0x2) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae07, 0x0) socket$kcm(0x29, 0x10000005, 0x0) 21:50:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000008000000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:53 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x20000) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x7) 21:50:53 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0xc401, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067ffc05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:53 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xa, 0x88a01) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000040), 0x1) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000080)=0xffffffffffffff01) 21:50:53 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000040)={0xaa, 0x72}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000002fe0)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) clone(0x0, &(0x7f0000000080), 0x0, 0x0, 0x0) read(r1, &(0x7f0000000180)=""/100, 0x107) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:50:53 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000001000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:53 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x60, r1, 0x311, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bpq0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x23}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xb74}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x20}]}, 0x60}, 0x1, 0x0, 0x0, 0x80}, 0x800) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae07, 0x0) 21:50:53 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x57620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) [ 3411.422877][ T6750] [ 3411.425263][ T6750] ===================================================== [ 3411.432505][ T6750] WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected [ 3411.440063][ T6750] 5.1.0-rc2+ #39 Not tainted [ 3411.444662][ T6750] ----------------------------------------------------- [ 3411.451620][ T6750] syz-executor.1/6750 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 3411.459596][ T6750] 0000000042a15c1a (&ctx->fault_pending_wqh){+.+.}, at: userfaultfd_read+0x540/0x1940 [ 3411.470430][ T6750] [ 3411.470430][ T6750] and this task is already holding: [ 3411.477832][ T6750] 00000000c0817c4d (&ctx->fd_wqh){....}, at: userfaultfd_read+0x27a/0x1940 [ 3411.486452][ T6750] which would create a new lock dependency: [ 3411.492346][ T6750] (&ctx->fd_wqh){....} -> (&ctx->fault_pending_wqh){+.+.} [ 3411.499564][ T6750] [ 3411.499564][ T6750] but this new dependency connects a SOFTIRQ-irq-safe lock: [ 3411.509098][ T6750] (&(&ctx->ctx_lock)->rlock){..-.} [ 3411.509111][ T6750] [ 3411.509111][ T6750] ... which became SOFTIRQ-irq-safe at: [ 3411.522038][ T6750] lock_acquire+0x16f/0x3f0 [ 3411.526651][ T6750] _raw_spin_lock_irq+0x60/0x80 [ 3411.531600][ T6750] free_ioctx_users+0x2d/0x4a0 [ 3411.536680][ T6750] percpu_ref_switch_to_atomic_rcu+0x3e7/0x520 [ 3411.543125][ T6750] rcu_core+0x928/0x1390 [ 3411.547505][ T6750] __do_softirq+0x266/0x95a [ 3411.552214][ T6750] run_ksoftirqd+0x8e/0x110 [ 3411.556813][ T6750] smpboot_thread_fn+0x6ab/0xa10 [ 3411.561926][ T6750] kthread+0x357/0x430 [ 3411.566094][ T6750] ret_from_fork+0x3a/0x50 [ 3411.570603][ T6750] [ 3411.570603][ T6750] to a SOFTIRQ-irq-unsafe lock: [ 3411.578354][ T6750] (&ctx->fault_pending_wqh){+.+.} [ 3411.578366][ T6750] [ 3411.578366][ T6750] ... which became SOFTIRQ-irq-unsafe at: [ 3411.591451][ T6750] ... [ 3411.591478][ T6750] lock_acquire+0x16f/0x3f0 [ 3411.598776][ T6750] _raw_spin_lock+0x2f/0x40 [ 3411.603558][ T6750] userfaultfd_release+0x48e/0x6d0 [ 3411.609825][ T6750] __fput+0x2e5/0x8d0 [ 3411.613897][ T6750] ____fput+0x16/0x20 [ 3411.618002][ T6750] task_work_run+0x14a/0x1c0 [ 3411.622894][ T6750] exit_to_usermode_loop+0x273/0x2c0 [ 3411.628276][ T6750] do_syscall_64+0x52d/0x610 [ 3411.632974][ T6750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3411.638959][ T6750] [ 3411.638959][ T6750] other info that might help us debug this: [ 3411.638959][ T6750] [ 3411.649198][ T6750] Chain exists of: [ 3411.649198][ T6750] &(&ctx->ctx_lock)->rlock --> &ctx->fd_wqh --> &ctx->fault_pending_wqh [ 3411.649198][ T6750] [ 3411.663461][ T6750] Possible interrupt unsafe locking scenario: [ 3411.663461][ T6750] [ 3411.671810][ T6750] CPU0 CPU1 [ 3411.677187][ T6750] ---- ---- [ 3411.682559][ T6750] lock(&ctx->fault_pending_wqh); [ 3411.687769][ T6750] local_irq_disable(); [ 3411.694703][ T6750] lock(&(&ctx->ctx_lock)->rlock); [ 3411.703121][ T6750] lock(&ctx->fd_wqh); [ 3411.709800][ T6750] [ 3411.713288][ T6750] lock(&(&ctx->ctx_lock)->rlock); [ 3411.718661][ T6750] [ 3411.718661][ T6750] *** DEADLOCK *** [ 3411.718661][ T6750] [ 3411.726823][ T6750] 1 lock held by syz-executor.1/6750: [ 3411.732221][ T6750] #0: 00000000c0817c4d (&ctx->fd_wqh){....}, at: userfaultfd_read+0x27a/0x1940 [ 3411.741823][ T6750] [ 3411.741823][ T6750] the dependencies between SOFTIRQ-irq-safe lock and the holding lock: [ 3411.752246][ T6750] -> (&(&ctx->ctx_lock)->rlock){..-.} { [ 3411.758678][ T6750] IN-SOFTIRQ-W at: [ 3411.762798][ T6750] lock_acquire+0x16f/0x3f0 [ 3411.769317][ T6750] _raw_spin_lock_irq+0x60/0x80 [ 3411.776014][ T6750] free_ioctx_users+0x2d/0x4a0 [ 3411.782634][ T6750] percpu_ref_switch_to_atomic_rcu+0x3e7/0x520 [ 3411.790650][ T6750] rcu_core+0x928/0x1390 [ 3411.796734][ T6750] __do_softirq+0x266/0x95a [ 3411.803375][ T6750] run_ksoftirqd+0x8e/0x110 [ 3411.809737][ T6750] smpboot_thread_fn+0x6ab/0xa10 [ 3411.818078][ T6750] kthread+0x357/0x430 [ 3411.824196][ T6750] ret_from_fork+0x3a/0x50 [ 3411.830470][ T6750] INITIAL USE at: [ 3411.834504][ T6750] lock_acquire+0x16f/0x3f0 [ 3411.840761][ T6750] _raw_spin_lock_irq+0x60/0x80 [ 3411.847389][ T6750] free_ioctx_users+0x2d/0x4a0 [ 3411.854004][ T6750] percpu_ref_switch_to_atomic_rcu+0x3e7/0x520 [ 3411.862061][ T6750] rcu_core+0x928/0x1390 [ 3411.868053][ T6750] __do_softirq+0x266/0x95a [ 3411.874576][ T6750] run_ksoftirqd+0x8e/0x110 [ 3411.880926][ T6750] smpboot_thread_fn+0x6ab/0xa10 [ 3411.887616][ T6750] kthread+0x357/0x430 [ 3411.893443][ T6750] ret_from_fork+0x3a/0x50 [ 3411.899699][ T6750] } [ 3411.902314][ T6750] ... key at: [] __key.52644+0x0/0x40 [ 3411.909851][ T6750] ... acquired at: [ 3411.913771][ T6750] lock_acquire+0x16f/0x3f0 [ 3411.918591][ T6750] _raw_spin_lock+0x2f/0x40 [ 3411.923280][ T6750] io_submit_one+0xe35/0x1cf0 [ 3411.928146][ T6750] __x64_sys_io_submit+0x1bd/0x580 [ 3411.933480][ T6750] do_syscall_64+0x103/0x610 [ 3411.938516][ T6750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3411.944888][ T6750] [ 3411.947352][ T6750] -> (&ctx->fd_wqh){....} { [ 3411.951958][ T6750] INITIAL USE at: [ 3411.955898][ T6750] lock_acquire+0x16f/0x3f0 [ 3411.962240][ T6750] _raw_spin_lock_irqsave+0x95/0xcd [ 3411.969126][ T6750] __wake_up_common_lock+0xc7/0x190 [ 3411.975916][ T6750] __wake_up+0xe/0x10 [ 3411.981481][ T6750] userfaultfd_release+0x4ec/0x6d0 [ 3411.988266][ T6750] __fput+0x2e5/0x8d0 [ 3411.994000][ T6750] ____fput+0x16/0x20 [ 3411.999819][ T6750] task_work_run+0x14a/0x1c0 [ 3412.006075][ T6750] exit_to_usermode_loop+0x273/0x2c0 [ 3412.012941][ T6750] do_syscall_64+0x52d/0x610 [ 3412.019109][ T6750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3412.026773][ T6750] } [ 3412.029382][ T6750] ... key at: [] __key.45453+0x0/0x40 [ 3412.036839][ T6750] ... acquired at: [ 3412.040663][ T6750] __lock_acquire+0x239c/0x3fb0 [ 3412.045701][ T6750] lock_acquire+0x16f/0x3f0 [ 3412.050393][ T6750] _raw_spin_lock+0x2f/0x40 [ 3412.055092][ T6750] userfaultfd_read+0x540/0x1940 [ 3412.060305][ T6750] __vfs_read+0x8d/0x110 [ 3412.064805][ T6750] vfs_read+0x194/0x3e0 [ 3412.069186][ T6750] ksys_read+0xea/0x1f0 [ 3412.073526][ T6750] __x64_sys_read+0x73/0xb0 [ 3412.078216][ T6750] do_syscall_64+0x103/0x610 [ 3412.082994][ T6750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3412.089231][ T6750] [ 3412.091563][ T6750] [ 3412.091563][ T6750] the dependencies between the lock to be acquired [ 3412.091569][ T6750] and SOFTIRQ-irq-unsafe lock: [ 3412.105085][ T6750] -> (&ctx->fault_pending_wqh){+.+.} { [ 3412.110561][ T6750] HARDIRQ-ON-W at: [ 3412.114563][ T6750] lock_acquire+0x16f/0x3f0 [ 3412.120764][ T6750] _raw_spin_lock+0x2f/0x40 [ 3412.126948][ T6750] userfaultfd_release+0x48e/0x6d0 [ 3412.133734][ T6750] __fput+0x2e5/0x8d0 [ 3412.139371][ T6750] ____fput+0x16/0x20 [ 3412.145012][ T6750] task_work_run+0x14a/0x1c0 [ 3412.151263][ T6750] exit_to_usermode_loop+0x273/0x2c0 [ 3412.158204][ T6750] do_syscall_64+0x52d/0x610 [ 3412.164467][ T6750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3412.172015][ T6750] SOFTIRQ-ON-W at: [ 3412.176020][ T6750] lock_acquire+0x16f/0x3f0 [ 3412.182192][ T6750] _raw_spin_lock+0x2f/0x40 [ 3412.188364][ T6750] userfaultfd_release+0x48e/0x6d0 [ 3412.195168][ T6750] __fput+0x2e5/0x8d0 [ 3412.200816][ T6750] ____fput+0x16/0x20 [ 3412.206465][ T6750] task_work_run+0x14a/0x1c0 [ 3412.212722][ T6750] exit_to_usermode_loop+0x273/0x2c0 [ 3412.219695][ T6750] do_syscall_64+0x52d/0x610 [ 3412.225948][ T6750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3412.233490][ T6750] INITIAL USE at: [ 3412.237411][ T6750] lock_acquire+0x16f/0x3f0 [ 3412.243505][ T6750] _raw_spin_lock+0x2f/0x40 [ 3412.249859][ T6750] userfaultfd_release+0x48e/0x6d0 [ 3412.256553][ T6750] __fput+0x2e5/0x8d0 [ 3412.262113][ T6750] ____fput+0x16/0x20 [ 3412.267674][ T6750] task_work_run+0x14a/0x1c0 [ 3412.273931][ T6750] exit_to_usermode_loop+0x273/0x2c0 [ 3412.280801][ T6750] do_syscall_64+0x52d/0x610 [ 3412.286984][ T6750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3412.294453][ T6750] } [ 3412.296982][ T6750] ... key at: [] __key.45450+0x0/0x40 [ 3412.304469][ T6750] ... acquired at: [ 3412.308286][ T6750] __lock_acquire+0x239c/0x3fb0 [ 3412.313349][ T6750] lock_acquire+0x16f/0x3f0 [ 3412.318146][ T6750] _raw_spin_lock+0x2f/0x40 [ 3412.323024][ T6750] userfaultfd_read+0x540/0x1940 [ 3412.328158][ T6750] __vfs_read+0x8d/0x110 [ 3412.332609][ T6750] vfs_read+0x194/0x3e0 [ 3412.337212][ T6750] ksys_read+0xea/0x1f0 [ 3412.341821][ T6750] __x64_sys_read+0x73/0xb0 [ 3412.346532][ T6750] do_syscall_64+0x103/0x610 [ 3412.351303][ T6750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3412.357452][ T6750] [ 3412.359845][ T6750] [ 3412.359845][ T6750] stack backtrace: [ 3412.365777][ T6750] CPU: 0 PID: 6750 Comm: syz-executor.1 Not tainted 5.1.0-rc2+ #39 [ 3412.373672][ T6750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3412.383835][ T6750] Call Trace: [ 3412.387267][ T6750] dump_stack+0x172/0x1f0 [ 3412.391608][ T6750] check_usage.cold+0x60f/0x940 [ 3412.396477][ T6750] ? check_usage_forwards+0x360/0x360 [ 3412.401872][ T6750] check_prev_add.constprop.0+0x2e3/0x23c0 [ 3412.407718][ T6750] ? check_prev_add.constprop.0+0x2e3/0x23c0 [ 3412.413720][ T6750] ? check_usage+0x570/0x570 [ 3412.418329][ T6750] ? kasan_check_write+0x14/0x20 [ 3412.423276][ T6750] ? is_dynamic_key+0x1c0/0x1c0 [ 3412.428133][ T6750] ? __lockdep_reset_lock+0x450/0x450 [ 3412.433531][ T6750] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3412.439790][ T6750] ? find_first_zero_bit+0x9a/0xc0 [ 3412.444926][ T6750] __lock_acquire+0x239c/0x3fb0 [ 3412.449823][ T6750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3412.456081][ T6750] ? debug_smp_processor_id+0x3c/0x280 [ 3412.461642][ T6750] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3412.468184][ T6750] ? mark_held_locks+0xf0/0xf0 [ 3412.473093][ T6750] lock_acquire+0x16f/0x3f0 [ 3412.477616][ T6750] ? userfaultfd_read+0x540/0x1940 [ 3412.482831][ T6750] _raw_spin_lock+0x2f/0x40 [ 3412.487358][ T6750] ? userfaultfd_read+0x540/0x1940 [ 3412.492488][ T6750] userfaultfd_read+0x540/0x1940 [ 3412.497472][ T6750] ? userfaultfd_event_wait_completion+0xa50/0xa50 [ 3412.503994][ T6750] ? fsnotify+0xbc0/0xbc0 [ 3412.508465][ T6750] ? fsnotify_first_mark+0x210/0x210 [ 3412.513767][ T6750] ? __fget+0x381/0x550 [ 3412.517941][ T6750] ? wake_up_q+0xf0/0xf0 [ 3412.522217][ T6750] ? security_file_permission+0x94/0x380 [ 3412.527872][ T6750] __vfs_read+0x8d/0x110 [ 3412.532834][ T6750] ? userfaultfd_event_wait_completion+0xa50/0xa50 [ 3412.539370][ T6750] vfs_read+0x194/0x3e0 [ 3412.543539][ T6750] ksys_read+0xea/0x1f0 [ 3412.547711][ T6750] ? kernel_write+0x120/0x120 [ 3412.552403][ T6750] ? do_syscall_64+0x26/0x610 [ 3412.557175][ T6750] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3412.563288][ T6750] ? do_syscall_64+0x26/0x610 [ 3412.567993][ T6750] __x64_sys_read+0x73/0xb0 [ 3412.572519][ T6750] do_syscall_64+0x103/0x610 [ 3412.577157][ T6750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3412.583066][ T6750] RIP: 0033:0x458209 [ 3412.586974][ T6750] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3412.606591][ T6750] RSP: 002b:00007fb3e0dc8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3412.615022][ T6750] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458209 [ 3412.623022][ T6750] RDX: 0000000000000107 RSI: 0000000020000180 RDI: 0000000000000006 [ 3412.631025][ T6750] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 3412.639019][ T6750] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3e0dc96d4 [ 3412.647023][ T6750] R13: 00000000004c3cbe R14: 00000000004d87e8 R15: 00000000ffffffff [ 3412.656370][ T3876] kobject: 'loop2' (00000000a93cd850): kobject_uevent_env 21:50:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067ffd05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000000c0)={'broute\x00', 0x0, 0x3, 0x6d, [], 0x1, &(0x7f0000000000)=[{}], &(0x7f0000000040)=""/109}, &(0x7f0000000180)=0x78) r1 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x1, 0x2) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000200)={0x2, {{0xa, 0x4e20, 0x0, @mcast1, 0x40}}}, 0x88) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000002c0)=0x9) 21:50:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000002000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3412.673879][ T6744] kobject: 'sit3454' (00000000a7386574): kobject_add_internal: parent: 'net', set: 'devices' [ 3412.677662][ T3876] kobject: 'loop2' (00000000a93cd850): fill_kobj_path: path = '/devices/virtual/block/loop2' 21:50:55 executing program 2: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xffffffff, 0x40000) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae07, 0x0) [ 3412.747641][ T6744] kobject: 'sit3454' (00000000a7386574): kobject_uevent_env [ 3412.787830][ T3876] kobject: 'loop5' (0000000030e275db): kobject_uevent_env [ 3412.791901][ T6744] kobject: 'sit3454' (00000000a7386574): fill_kobj_path: path = '/devices/virtual/net/sit3454' 21:50:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000003000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3412.833063][ T3876] kobject: 'loop5' (0000000030e275db): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3412.863319][ T6744] kobject: 'queues' (00000000d2aebeaf): kobject_add_internal: parent: 'sit3454', set: '' [ 3412.899096][ T6744] kobject: 'queues' (00000000d2aebeaf): kobject_uevent_env [ 3412.911829][ T3876] kobject: 'loop5' (0000000030e275db): kobject_uevent_env [ 3412.919005][ T3876] kobject: 'loop5' (0000000030e275db): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3412.934157][ T6744] kobject: 'queues' (00000000d2aebeaf): kobject_uevent_env: filter function caused the event to drop! [ 3412.986745][ T6744] kobject: 'rx-0' (000000001f5dc589): kobject_add_internal: parent: 'queues', set: 'queues' [ 3413.023068][ T6744] kobject: 'rx-0' (000000001f5dc589): kobject_uevent_env [ 3413.041241][ T3876] kobject: 'loop2' (00000000a93cd850): kobject_uevent_env [ 3413.059453][ T3876] kobject: 'loop2' (00000000a93cd850): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3413.068618][ T6744] kobject: 'rx-0' (000000001f5dc589): fill_kobj_path: path = '/devices/virtual/net/sit3454/queues/rx-0' [ 3413.110883][ T6744] kobject: 'tx-0' (000000009240d2b2): kobject_add_internal: parent: 'queues', set: 'queues' [ 3413.135274][ T6744] kobject: 'tx-0' (000000009240d2b2): kobject_uevent_env [ 3413.144982][ T3876] kobject: 'loop1' (0000000020f27248): kobject_uevent_env [ 3413.152570][ T3876] kobject: 'loop1' (0000000020f27248): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 3413.163698][ T6744] kobject: 'tx-0' (000000009240d2b2): fill_kobj_path: path = '/devices/virtual/net/sit3454/queues/tx-0' 21:50:55 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0xd803, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:55 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000180)=@assoc_id=0x0, &(0x7f00000001c0)=0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000200)={r2, @in={{0x2, 0x4e23, @multicast1}}, 0x8, 0xaf, 0x100, 0x8, 0x10000}, &(0x7f00000002c0)=0x98) ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x80000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="b2f9523baa144220f199ed2757fdcf5c156fbe0515432db0c405d304a92a8b8f6d7bc33fbdbfd077", 0x28, 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) 21:50:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000004000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067ffe05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:55 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) clock_gettime(0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, &(0x7f0000000180), 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netstat\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f00000000c0)={0x1, 0x4, 0x1, 0x2, 'syz1\x00', 0x3fc837b4}) write$binfmt_elf64(r1, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x40, 0x5, 0x100000001, 0x9, 0x20, 0x3, 0x0, 0x9, 0x36c, 0x40, 0x27a, 0x5, 0x1, 0x38, 0x2, 0x80, 0x1, 0x9}, [{0x6474e551, 0xa3a, 0x8, 0x6, 0x7, 0x6, 0x6, 0x7}, {0x7, 0x100000001, 0x0, 0x6, 0x3ff, 0x80000001, 0x7fff, 0x1}], "1ae2dfa97368acd881aa82024ebb2e3537f4c313d5ea5c01b21c51b448675c526fda0e35caaab4ae8f8edb0fadd4dbd0bd1ac4eb7c2b8f2aac919e7dfb2f25ab9b578a80ba6261b3b2d523b561211712d67e9b8d6b5f72663a9c8495", [[], [], [], [], [], [], []]}, 0x80c) [ 3413.206598][ T6753] kobject: 'sit4021' (000000002cb6c666): kobject_add_internal: parent: 'net', set: 'devices' [ 3413.220043][ T6753] kobject: 'sit4021' (000000002cb6c666): kobject_uevent_env [ 3413.228035][ T3876] kobject: 'loop4' (00000000a2bdb7aa): kobject_uevent_env [ 3413.254088][ T6790] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3413.265073][ T3876] kobject: 'loop4' (00000000a2bdb7aa): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3413.275920][ T6753] kobject: 'sit4021' (000000002cb6c666): fill_kobj_path: path = '/devices/virtual/net/sit4021' [ 3413.287280][ T6790] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3413.305533][ T6753] kobject: 'queues' (0000000074038143): kobject_add_internal: parent: 'sit4021', set: '' 21:50:55 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000104000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3413.349406][ T6753] kobject: 'queues' (0000000074038143): kobject_uevent_env [ 3413.363462][ T6790] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3413.371420][ T6753] kobject: 'queues' (0000000074038143): kobject_uevent_env: filter function caused the event to drop! [ 3413.391351][ T6790] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3413.403156][ T3876] kobject: 'loop2' (00000000a93cd850): kobject_uevent_env [ 3413.414503][ T6753] kobject: 'rx-0' (0000000033de78b9): kobject_add_internal: parent: 'queues', set: 'queues' [ 3413.426189][ T3876] kobject: 'loop2' (00000000a93cd850): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3413.437844][ T6789] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3413.445204][ T6753] kobject: 'rx-0' (0000000033de78b9): kobject_uevent_env [ 3413.458308][ T3876] kobject: 'loop5' (0000000030e275db): kobject_uevent_env [ 3413.468418][ T6753] kobject: 'rx-0' (0000000033de78b9): fill_kobj_path: path = '/devices/virtual/net/sit4021/queues/rx-0' [ 3413.487545][ T6789] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3413.497620][ T3876] kobject: 'loop5' (0000000030e275db): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3413.539870][ T6789] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3413.551236][ T6753] kobject: 'tx-0' (000000005f81f0ea): kobject_add_internal: parent: 'queues', set: 'queues' [ 3413.581672][ T3876] kobject: 'loop5' (0000000030e275db): kobject_uevent_env [ 3413.588883][ T3876] kobject: 'loop5' (0000000030e275db): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3413.604735][ T6753] kobject: 'tx-0' (000000005f81f0ea): kobject_uevent_env [ 3413.611947][ T6789] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3413.632790][ T6753] kobject: 'tx-0' (000000005f81f0ea): fill_kobj_path: path = '/devices/virtual/net/sit4021/queues/tx-0' [ 3413.709373][ T3876] kobject: 'loop1' (0000000020f27248): kobject_uevent_env [ 3413.721369][ T3876] kobject: 'loop1' (0000000020f27248): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 3413.755864][ T6761] kobject: 'sit4022' (0000000098502f4b): kobject_add_internal: parent: 'net', set: 'devices' [ 3413.767138][ T6761] kobject: 'sit4022' (0000000098502f4b): kobject_uevent_env [ 3413.776341][ T6761] kobject: 'sit4022' (0000000098502f4b): fill_kobj_path: path = '/devices/virtual/net/sit4022' [ 3413.787017][ T6761] kobject: 'queues' (00000000e26561b2): kobject_add_internal: parent: 'sit4022', set: '' [ 3413.798161][ T6761] kobject: 'queues' (00000000e26561b2): kobject_uevent_env [ 3413.805609][ T6761] kobject: 'queues' (00000000e26561b2): kobject_uevent_env: filter function caused the event to drop! [ 3413.816837][ T6761] kobject: 'rx-0' (00000000765866c3): kobject_add_internal: parent: 'queues', set: 'queues' [ 3413.827243][ T6761] kobject: 'rx-0' (00000000765866c3): kobject_uevent_env [ 3413.834582][ T6761] kobject: 'rx-0' (00000000765866c3): fill_kobj_path: path = '/devices/virtual/net/sit4022/queues/rx-0' [ 3413.846345][ T6761] kobject: 'tx-0' (0000000061823370): kobject_add_internal: parent: 'queues', set: 'queues' [ 3413.857093][ T6761] kobject: 'tx-0' (0000000061823370): kobject_uevent_env [ 3413.865207][ T6761] kobject: 'tx-0' (0000000061823370): fill_kobj_path: path = '/devices/virtual/net/sit4022/queues/tx-0' [ 3413.895394][ T6800] kobject: 'sit3455' (00000000ca407caf): kobject_add_internal: parent: 'net', set: 'devices' 21:50:56 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x58030000, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000340)={0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in=@initdev, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) lstat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000580)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8) fstat(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getpid() stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0xa, &(0x7f0000000840)=[0xee01, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xee01, 0xee01, 0xee00, 0xee01, 0xee00]) r11 = gettid() stat(&(0x7f0000000880)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={0x0, 0xffffffffffffff9c, 0x0, 0x9, &(0x7f0000000a00)='/dev/kvm\x00'}, 0x30) r15 = geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000a80)={0x0, 0x0, 0x0}, &(0x7f0000000ac0)=0xc) sendmmsg$unix(r1, &(0x7f0000000c40)=[{&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000300)=[{&(0x7f0000000180)="0f52521dfe8f64808621d728443487257ecac95695f81bb370c6d25fc1af9b6e1167cd0200867d9e9d4abcb5bd810e2b57a98e260eabaf48dba86f9c0aa091d96f54271d1c5028bda6a079f9f5129a9e47f1e8c184d0114e2312ad67e92c2d46e2a787c62778c921089e80", 0x6b}, {&(0x7f0000000200)="d67074077877d8694dd865722859a2890bc027533db5dd93e182eb7dfd738f271ac08471b6d5d193e7fd49c123868513a73f8171b5af88c2c09e58df4880f07155a76c88ff148d4567d81431c3d464ac7f8b4d8e322cf064069b384133d03fe8fe5458b749f8c8183f4c747dbe7c9e5d95405c0bba75d357ac3e8c799ab77c6f70d8d3f09637e8a05046e37aea7f6d16dccf12493e07ec947b7b42b3c6644f24599a5c5c7a2da7fef3ff2a55ab4a98dfe72a769cdb271c024c53084ec057", 0xbe}, {&(0x7f0000000100)="e411aed925aee6ac4cbfbcb4470cd86f6afee6cf9732c319bc586ab6f74febc2b0847bca062a2f4067c1e2b259b4f85d961c237f8b20163ae2", 0x39}, {&(0x7f00000002c0)="bbf274c41a8f63ac1666c4870d7b53", 0xf}], 0x4, &(0x7f0000000b00)=[@rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}], 0x130, 0x400c080}], 0x1, 0x54) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:50:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000005000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:56 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x80000, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x2200, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) 21:50:56 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067fff05ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 3413.910351][ T6800] kobject: 'sit3455' (00000000ca407caf): kobject_uevent_env [ 3413.917775][ T6800] kobject: 'sit3455' (00000000ca407caf): fill_kobj_path: path = '/devices/virtual/net/sit3455' [ 3413.943090][ T3876] kobject: 'loop3' (00000000849925e2): kobject_uevent_env [ 3413.954006][ T6819] kobject: 'kvm' (00000000b411681b): kobject_uevent_env 21:50:56 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000007000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3413.969570][ T3876] kobject: 'loop3' (00000000849925e2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3413.994454][ T6800] kobject: 'queues' (000000003e57edcc): kobject_add_internal: parent: 'sit3455', set: '' [ 3414.024020][ T3876] kobject: 'loop5' (0000000030e275db): kobject_uevent_env [ 3414.038957][ T6819] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3414.048629][ T6800] kobject: 'queues' (000000003e57edcc): kobject_uevent_env [ 3414.069948][ T3876] kobject: 'loop5' (0000000030e275db): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3414.100369][ T6800] kobject: 'queues' (000000003e57edcc): kobject_uevent_env: filter function caused the event to drop! [ 3414.117586][ T6818] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3414.125148][ T6819] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3414.133758][ T3876] kobject: 'loop2' (00000000a93cd850): kobject_uevent_env [ 3414.159111][ T6800] kobject: 'rx-0' (00000000d549ecea): kobject_add_internal: parent: 'queues', set: 'queues' [ 3414.163224][ T3876] kobject: 'loop2' (00000000a93cd850): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3414.176439][ T6819] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3414.234626][ T6800] kobject: 'rx-0' (00000000d549ecea): kobject_uevent_env [ 3414.242780][ T6818] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3414.257655][ T6800] kobject: 'rx-0' (00000000d549ecea): fill_kobj_path: path = '/devices/virtual/net/sit3455/queues/rx-0' [ 3414.290803][ T6800] kobject: 'tx-0' (00000000dd5ed954): kobject_add_internal: parent: 'queues', set: 'queues' [ 3414.310071][ T6818] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3414.321204][ T6818] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3414.346374][ T6800] kobject: 'tx-0' (00000000dd5ed954): kobject_uevent_env [ 3414.354035][ T3876] kobject: 'loop1' (0000000020f27248): kobject_uevent_env [ 3414.362493][ T3876] kobject: 'loop1' (0000000020f27248): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 3414.367312][ T6800] kobject: 'tx-0' (00000000dd5ed954): fill_kobj_path: path = '/devices/virtual/net/sit3455/queues/tx-0' [ 3414.423369][ T6825] kobject: 'sit4023' (00000000caedd19c): kobject_add_internal: parent: 'net', set: 'devices' [ 3414.438359][ T6825] kobject: 'sit4023' (00000000caedd19c): kobject_uevent_env [ 3414.446368][ T6825] kobject: 'sit4023' (00000000caedd19c): fill_kobj_path: path = '/devices/virtual/net/sit4023' [ 3414.460438][ T6825] kobject: 'queues' (000000004672a65c): kobject_add_internal: parent: 'sit4023', set: '' [ 3414.475005][ T6825] kobject: 'queues' (000000004672a65c): kobject_uevent_env [ 3414.483122][ T6825] kobject: 'queues' (000000004672a65c): kobject_uevent_env: filter function caused the event to drop! [ 3414.500596][ T6825] kobject: 'rx-0' (00000000cea758da): kobject_add_internal: parent: 'queues', set: 'queues' [ 3414.514311][ T6825] kobject: 'rx-0' (00000000cea758da): kobject_uevent_env [ 3414.522012][ T6825] kobject: 'rx-0' (00000000cea758da): fill_kobj_path: path = '/devices/virtual/net/sit4023/queues/rx-0' [ 3414.537260][ T6825] kobject: 'tx-0' (00000000ab5c1e27): kobject_add_internal: parent: 'queues', set: 'queues' [ 3414.548076][ T6825] kobject: 'tx-0' (00000000ab5c1e27): kobject_uevent_env [ 3414.559050][ T6825] kobject: 'tx-0' (00000000ab5c1e27): fill_kobj_path: path = '/devices/virtual/net/sit4023/queues/tx-0' [ 3414.595689][ T6836] kobject: 'sit3456' (00000000ec1e32c8): kobject_add_internal: parent: 'net', set: 'devices' [ 3414.606946][ T6836] kobject: 'sit3456' (00000000ec1e32c8): kobject_uevent_env [ 3414.617746][ T6836] kobject: 'sit3456' (00000000ec1e32c8): fill_kobj_path: path = '/devices/virtual/net/sit3456' [ 3414.628369][ T6836] kobject: 'queues' (00000000f9117d2f): kobject_add_internal: parent: 'sit3456', set: '' [ 3414.640555][ T6836] kobject: 'queues' (00000000f9117d2f): kobject_uevent_env [ 3414.647992][ T6836] kobject: 'queues' (00000000f9117d2f): kobject_uevent_env: filter function caused the event to drop! [ 3414.659782][ T6836] kobject: 'rx-0' (000000005e6d9098): kobject_add_internal: parent: 'queues', set: 'queues' [ 3414.674679][ T6836] kobject: 'rx-0' (000000005e6d9098): kobject_uevent_env [ 3414.682235][ T6836] kobject: 'rx-0' (000000005e6d9098): fill_kobj_path: path = '/devices/virtual/net/sit3456/queues/rx-0' 21:50:57 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0xe402, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:50:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000008000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067f0006ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:57 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x1, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) [ 3414.695044][ T6836] kobject: 'tx-0' (00000000a8414ee6): kobject_add_internal: parent: 'queues', set: 'queues' [ 3414.705815][ T6836] kobject: 'tx-0' (00000000a8414ee6): kobject_uevent_env [ 3414.713469][ T6836] kobject: 'tx-0' (00000000a8414ee6): fill_kobj_path: path = '/devices/virtual/net/sit3456/queues/tx-0' [ 3414.745254][ T3876] kobject: 'loop4' (00000000a2bdb7aa): kobject_uevent_env [ 3414.767753][ T6843] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3414.778373][ T3876] kobject: 'loop4' (00000000a2bdb7aa): fill_kobj_path: path = '/devices/virtual/block/loop4' 21:50:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x20000000000004, 0x46) poll(&(0x7f0000000080)=[{r1, 0x8}, {r1, 0x179aab71703b3167}, {r1}, {r0}, {r0, 0x4010}, {r0, 0x8202}], 0x6, 0x1) ioctl$DRM_IOCTL_GET_MAP(r2, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, 0xfffffffffffffff9, 0x7, 0x20, &(0x7f0000fec000/0x14000)=nil, 0x2}) ioctl$RFKILL_IOCTL_NOINPUT(r2, 0x5201) [ 3414.778907][ T6838] kobject: 'sit4024' (000000005edf29ac): kobject_add_internal: parent: 'net', set: 'devices' [ 3414.813405][ T6843] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3414.851430][ T3876] kobject: 'loop2' (00000000a93cd850): kobject_uevent_env [ 3414.891836][ T6838] kobject: 'sit4024' (000000005edf29ac): kobject_uevent_env [ 3414.892807][ T6842] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3414.904918][ T3876] kobject: 'loop2' (00000000a93cd850): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3414.918472][ T6843] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3414.945018][ T6838] kobject: 'sit4024' (000000005edf29ac): fill_kobj_path: path = '/devices/virtual/net/sit4024' [ 3414.963001][ T6843] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3414.994387][ T3876] kobject: 'loop5' (0000000030e275db): kobject_uevent_env [ 3415.002800][ T6838] kobject: 'queues' (000000007cefaa2d): kobject_add_internal: parent: 'sit4024', set: '' [ 3415.007944][ T3876] kobject: 'loop5' (0000000030e275db): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3415.033954][ T6842] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3415.045281][ T3876] kobject: 'loop2' (00000000a93cd850): kobject_uevent_env [ 3415.053434][ T6838] kobject: 'queues' (000000007cefaa2d): kobject_uevent_env [ 3415.064281][ T3876] kobject: 'loop2' (00000000a93cd850): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3415.084589][ T6838] kobject: 'queues' (000000007cefaa2d): kobject_uevent_env: filter function caused the event to drop! [ 3415.115469][ T6842] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3415.141678][ T6842] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3415.155462][ T6838] kobject: 'rx-0' (00000000820226f0): kobject_add_internal: parent: 'queues', set: 'queues' [ 3415.180509][ T6838] kobject: 'rx-0' (00000000820226f0): kobject_uevent_env [ 3415.188465][ T6838] kobject: 'rx-0' (00000000820226f0): fill_kobj_path: path = '/devices/virtual/net/sit4024/queues/rx-0' [ 3415.200412][ T3876] kobject: 'loop1' (0000000020f27248): kobject_uevent_env [ 3415.207638][ T3876] kobject: 'loop1' (0000000020f27248): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 3415.219627][ T6838] kobject: 'tx-0' (00000000035c3d49): kobject_add_internal: parent: 'queues', set: 'queues' [ 3415.235024][ T6838] kobject: 'tx-0' (00000000035c3d49): kobject_uevent_env [ 3415.242860][ T6838] kobject: 'tx-0' (00000000035c3d49): fill_kobj_path: path = '/devices/virtual/net/sit4024/queues/tx-0' 21:50:57 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x58620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:57 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000009000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:50:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067f0106ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:57 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x100, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000180)={{0x0, 0x9, 0x40, 0xffffffff, 0x4, 0x100}, 0x2, 0xe00000000000000, 0x6}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x240, 0x0) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbfd, 0x40}, 0xc) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0x1cc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000000c0)={@local, 0x0}, &(0x7f0000000100)=0xffffffffffffff39) recvfrom$packet(r2, &(0x7f00000001c0)=""/117, 0x16, 0x12000, &(0x7f0000000240)={0x11, 0x0, r3, 0x1, 0x1, 0x6, @broadcast}, 0x6) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) [ 3415.290795][ T6850] kobject: 'sit3457' (00000000a59d55a5): kobject_add_internal: parent: 'net', set: 'devices' [ 3415.309006][ T3876] kobject: 'loop3' (00000000849925e2): kobject_uevent_env 21:50:57 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) [ 3415.343702][ T6866] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3415.356837][ T3876] kobject: 'loop3' (00000000849925e2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3415.371380][ T6850] kobject: 'sit3457' (00000000a59d55a5): kobject_uevent_env [ 3415.401263][ T6866] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3415.403402][ T3876] kobject: 'loop2' (00000000a93cd850): kobject_uevent_env [ 3415.418800][ T6850] kobject: 'sit3457' (00000000a59d55a5): fill_kobj_path: path = '/devices/virtual/net/sit3457' [ 3415.456038][ T3876] kobject: 'loop2' (00000000a93cd850): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3415.480477][ T6850] kobject: 'queues' (0000000065a39219): kobject_add_internal: parent: 'sit3457', set: '' [ 3415.498491][ T6873] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3415.514422][ T3876] kobject: 'loop5' (0000000030e275db): kobject_uevent_env [ 3415.533953][ T3876] kobject: 'loop5' (0000000030e275db): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3415.533991][ T6865] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3415.607583][ T6850] kobject: 'queues' (0000000065a39219): kobject_uevent_env [ 3415.614824][ T6873] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3415.619687][ T6865] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3415.652896][ T6850] kobject: 'queues' (0000000065a39219): kobject_uevent_env: filter function caused the event to drop! [ 3415.665598][ T6850] kobject: 'rx-0' (00000000521cf7c6): kobject_add_internal: parent: 'queues', set: 'queues' [ 3415.677272][ T6865] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3415.679188][ T6850] kobject: 'rx-0' (00000000521cf7c6): kobject_uevent_env [ 3415.684923][ T6865] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3415.708921][ T6850] kobject: 'rx-0' (00000000521cf7c6): fill_kobj_path: path = '/devices/virtual/net/sit3457/queues/rx-0' [ 3415.736660][ T3876] kobject: 'loop1' (0000000020f27248): kobject_uevent_env [ 3415.746343][ T3876] kobject: 'loop1' (0000000020f27248): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 3415.752544][ T6850] kobject: 'tx-0' (00000000a5a63a3b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3415.770603][ T6850] kobject: 'tx-0' (00000000a5a63a3b): kobject_uevent_env [ 3415.780809][ T6850] kobject: 'tx-0' (00000000a5a63a3b): fill_kobj_path: path = '/devices/virtual/net/sit3457/queues/tx-0' [ 3415.820805][ T6869] kobject: 'sit4025' (00000000660ae689): kobject_add_internal: parent: 'net', set: 'devices' [ 3415.832696][ T6869] kobject: 'sit4025' (00000000660ae689): kobject_uevent_env [ 3415.844150][ T6869] kobject: 'sit4025' (00000000660ae689): fill_kobj_path: path = '/devices/virtual/net/sit4025' [ 3415.855975][ T6869] kobject: 'queues' (00000000f580ffce): kobject_add_internal: parent: 'sit4025', set: '' [ 3415.866749][ T6869] kobject: 'queues' (00000000f580ffce): kobject_uevent_env [ 3415.882031][ T6869] kobject: 'queues' (00000000f580ffce): kobject_uevent_env: filter function caused the event to drop! [ 3415.893208][ T6869] kobject: 'rx-0' (00000000fc3ca329): kobject_add_internal: parent: 'queues', set: 'queues' [ 3415.931007][ T6869] kobject: 'rx-0' (00000000fc3ca329): kobject_uevent_env [ 3415.938329][ T6869] kobject: 'rx-0' (00000000fc3ca329): fill_kobj_path: path = '/devices/virtual/net/sit4025/queues/rx-0' [ 3415.953102][ T6869] kobject: 'tx-0' (00000000a9cc1aca): kobject_add_internal: parent: 'queues', set: 'queues' [ 3415.964554][ T6869] kobject: 'tx-0' (00000000a9cc1aca): kobject_uevent_env [ 3415.974706][ T6869] kobject: 'tx-0' (00000000a9cc1aca): fill_kobj_path: path = '/devices/virtual/net/sit4025/queues/tx-0' [ 3416.000921][ T6878] kobject: 'sit3458' (00000000bd48c359): kobject_add_internal: parent: 'net', set: 'devices' [ 3416.015352][ T6878] kobject: 'sit3458' (00000000bd48c359): kobject_uevent_env [ 3416.022860][ T6878] kobject: 'sit3458' (00000000bd48c359): fill_kobj_path: path = '/devices/virtual/net/sit3458' [ 3416.033903][ T6878] kobject: 'queues' (00000000fa3a5555): kobject_add_internal: parent: 'sit3458', set: '' [ 3416.044575][ T6878] kobject: 'queues' (00000000fa3a5555): kobject_uevent_env [ 3416.051959][ T6878] kobject: 'queues' (00000000fa3a5555): kobject_uevent_env: filter function caused the event to drop! [ 3416.064258][ T6878] kobject: 'rx-0' (0000000029123e9e): kobject_add_internal: parent: 'queues', set: 'queues' [ 3416.074673][ T6878] kobject: 'rx-0' (0000000029123e9e): kobject_uevent_env 21:50:58 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0xe403, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000000000000000a000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:58 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x100, 0x0) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x4, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae07, 0x0) pkey_alloc(0x0, 0x2) 21:50:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067f0206ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:50:58 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x424000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000000)={0x577e, 0x0, 0xffffffffffffffe0, 'queue1\x00'}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) recvfrom(r1, &(0x7f0000000180)=""/188, 0xbc, 0x40000102, &(0x7f00000000c0)=@nfc={0x27, 0x1, 0x2, 0x7}, 0x80) [ 3416.082007][ T6878] kobject: 'rx-0' (0000000029123e9e): fill_kobj_path: path = '/devices/virtual/net/sit3458/queues/rx-0' [ 3416.093400][ T6878] kobject: 'tx-0' (00000000de0d88b4): kobject_add_internal: parent: 'queues', set: 'queues' [ 3416.103832][ T6878] kobject: 'tx-0' (00000000de0d88b4): kobject_uevent_env [ 3416.111817][ T6878] kobject: 'tx-0' (00000000de0d88b4): fill_kobj_path: path = '/devices/virtual/net/sit3458/queues/tx-0' [ 3416.138695][ T3876] kobject: 'loop4' (00000000a2bdb7aa): kobject_uevent_env 21:50:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) ioctl$VIDIOC_RESERVED(r1, 0x5601, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) [ 3416.198115][ T6880] kobject: 'sit4026' (00000000a839671e): kobject_add_internal: parent: 'net', set: 'devices' [ 3416.208538][ T3876] kobject: 'loop4' (00000000a2bdb7aa): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3416.251658][ T3876] kobject: 'loop2' (00000000a93cd850): kobject_uevent_env [ 3416.282387][ T6880] kobject: 'sit4026' (00000000a839671e): kobject_uevent_env [ 3416.292201][ T3876] kobject: 'loop2' (00000000a93cd850): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3416.324328][ T6880] kobject: 'sit4026' (00000000a839671e): fill_kobj_path: path = '/devices/virtual/net/sit4026' [ 3416.341077][ T3876] kobject: 'loop5' (0000000030e275db): kobject_uevent_env [ 3416.365569][ T3876] kobject: 'loop5' (0000000030e275db): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3416.378909][ T6880] kobject: 'queues' (00000000ef9ee269): kobject_add_internal: parent: 'sit4026', set: '' [ 3416.395489][ T6880] kobject: 'queues' (00000000ef9ee269): kobject_uevent_env [ 3416.410865][ T6880] kobject: 'queues' (00000000ef9ee269): kobject_uevent_env: filter function caused the event to drop! [ 3416.427989][ T6880] kobject: 'rx-0' (00000000eeeb004b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3416.441467][ T6880] kobject: 'rx-0' (00000000eeeb004b): kobject_uevent_env [ 3416.449030][ T6880] kobject: 'rx-0' (00000000eeeb004b): fill_kobj_path: path = '/devices/virtual/net/sit4026/queues/rx-0' 21:50:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000000000000000e000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:58 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000340)={0x7c00000000, 0xa9, 0x1, {0xf, @win={{0x2, 0x0, 0xfff, 0x7}, 0x3, 0x8000, &(0x7f0000000240)={{0x12d3, 0x3, 0x3f2, 0x5}, &(0x7f0000000200)={{0x5ee, 0x8, 0xd8, 0x7a2000000000000}, &(0x7f00000001c0)={{0x100, 0x0, 0x401, 0x2d3}}}}, 0x20, &(0x7f0000000280)="7ae174bfac8e9661df15bd63f91f0c3a950a253800b9f47b5f30074291385a41b925ebc92a20e796fd8ee78aa5affaae74f4a65c297ffd58bf980adc8181b6719673bf585ae82016d3173996d51e0b0dedcd2d42604f3dd9b37f0b9be52cd16fdf73fc62a9059ee66e75d0a2578ac9b88011cdfd4b446fb41aa5912f90f84f8b3853db8873c688beaa6aa4435f0e60550484b37a8618bd2e08eb35dbf7b486002c82cddf744c1fbf560bb03892", 0x19}}}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x4800, 0x0) getsockopt$packet_int(r1, 0x107, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r2, 0xae07, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 21:50:58 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x59620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067f0306ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 3416.473011][ T6880] kobject: 'tx-0' (000000006e4baa6f): kobject_add_internal: parent: 'queues', set: 'queues' [ 3416.486373][ T6880] kobject: 'tx-0' (000000006e4baa6f): kobject_uevent_env [ 3416.494321][ T6880] kobject: 'tx-0' (000000006e4baa6f): fill_kobj_path: path = '/devices/virtual/net/sit4026/queues/tx-0' [ 3416.531862][ T3876] kobject: 'loop3' (00000000849925e2): kobject_uevent_env [ 3416.539089][ T3876] kobject: 'loop3' (00000000849925e2): fill_kobj_path: path = '/devices/virtual/block/loop3' 21:50:58 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000010000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x400000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f0000000000)={0x1aa3, 0x3f, 0x7fff, 0x302}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x400400, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x24, "388947202b06e814390cdf4e639b3d5570197fcc2f9117ca1bc2bef73b6655b0da6b547b"}, &(0x7f0000000140)=0x2c) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={r3, 0x100}, 0x8) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r2, &(0x7f0000000500)={&(0x7f0000000800), 0xc, &(0x7f00000004c0)={&(0x7f0000000840)={0x324, r4, 0x1, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x50, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffff80000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x318}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xa52cb6f}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400000000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_NET={0x54, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9132}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x43e}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ADDR={0x8}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5312969a}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x40}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK={0xd8, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2c}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x100, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xb13}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x1, @local, 0x732}}, {0x14, 0x2, @in={0x2, 0x4e20, @loopback}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bridge0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x56d, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xffffffffffffff7f}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x8, @rand_addr="64d1dd4f13a7702d4817f00475524d8b", 0x5}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'veth1\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x400}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9940}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1800000000000000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x400}]}]}, 0x324}, 0x1, 0x0, 0x0, 0x8000}, 0x44080) setsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000001c0)={r3, 0x64, 0x2, 0x80000001}, 0x10) [ 3416.601583][ T6894] kobject: 'sit3459' (00000000338c6b63): kobject_add_internal: parent: 'net', set: 'devices' [ 3416.625749][ T3876] kobject: 'loop5' (0000000030e275db): kobject_uevent_env [ 3416.639710][ T3876] kobject: 'loop5' (0000000030e275db): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3416.653267][ T6894] kobject: 'sit3459' (00000000338c6b63): kobject_uevent_env [ 3416.694284][ T6894] kobject: 'sit3459' (00000000338c6b63): fill_kobj_path: path = '/devices/virtual/net/sit3459' [ 3416.717553][ T3876] kobject: 'loop2' (00000000a93cd850): kobject_uevent_env [ 3416.747824][ T3876] kobject: 'loop2' (00000000a93cd850): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3416.761908][ T6894] kobject: 'queues' (000000003667b46e): kobject_add_internal: parent: 'sit3459', set: '' [ 3416.770302][ C0] net_ratelimit: 25 callbacks suppressed [ 3416.770310][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3416.772551][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3416.778233][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3416.783996][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3416.789785][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3416.795566][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3416.801248][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3416.806970][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3416.812820][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3416.830322][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3416.876375][ T6894] kobject: 'queues' (000000003667b46e): kobject_uevent_env [ 3416.892575][ T6894] kobject: 'queues' (000000003667b46e): kobject_uevent_env: filter function caused the event to drop! [ 3416.924014][ T6894] kobject: 'rx-0' (00000000589a0d4e): kobject_add_internal: parent: 'queues', set: 'queues' [ 3416.934670][ T6894] kobject: 'rx-0' (00000000589a0d4e): kobject_uevent_env [ 3416.942321][ T6894] kobject: 'rx-0' (00000000589a0d4e): fill_kobj_path: path = '/devices/virtual/net/sit3459/queues/rx-0' [ 3416.954078][ T6894] kobject: 'tx-0' (00000000fb640fe6): kobject_add_internal: parent: 'queues', set: 'queues' [ 3416.966451][ T6894] kobject: 'tx-0' (00000000fb640fe6): kobject_uevent_env [ 3416.974004][ T6894] kobject: 'tx-0' (00000000fb640fe6): fill_kobj_path: path = '/devices/virtual/net/sit3459/queues/tx-0' [ 3417.009777][ T3876] kobject: 'loop4' (00000000a2bdb7aa): kobject_uevent_env [ 3417.015731][ T6909] kobject: 'sit4027' (00000000b0b41330): kobject_add_internal: parent: 'net', set: 'devices' 21:50:59 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0xe802, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:50:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) r1 = socket$inet6(0xa, 0x0, 0x4) setsockopt(r1, 0xfffffffffffffffb, 0x200, &(0x7f0000000000)="cd9d99940b00fd1a9e915a451f96e0b6119c2da066ae7976f8d054d1561a3257775c7f617ff59a97220a55a01e74b023d6a574aa3dbbc6ce1c47c7b2a425e3941f244c2489b92f58fac60c4d788bd56c4ec29201d8da9fc7914dc9dd9341dfaa02c77610c025efbb72c113a1269e9db5b81d45ba355b17fba2fbf786258e56313d5ab78ddb523d811e5a0133d8d944ddd12db3e0fae259906e3d233001c2784bb6bed8b5ef98008d9b81374aff142324512c9fa8adaf9de312f20ba9e0ea62bf30df6ca1e8ff4a8e017d56fc6e50444094c0eadbc23c670c06f1cbb1f2433fa17441e7b0e6da1648", 0xe8) 21:50:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000016000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:50:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067f0406ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 3417.053412][ T3876] kobject: 'loop4' (00000000a2bdb7aa): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3417.086278][ T6909] kobject: 'sit4027' (00000000b0b41330): kobject_uevent_env 21:50:59 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) 21:50:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000000000000011f000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3417.110197][ T6909] kobject: 'sit4027' (00000000b0b41330): fill_kobj_path: path = '/devices/virtual/net/sit4027' [ 3417.144161][ T3876] kobject: 'loop1' (0000000020f27248): kobject_uevent_env 21:50:59 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x400, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x10000, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) [ 3417.188421][ T6909] kobject: 'queues' (000000005cf3fdcf): kobject_add_internal: parent: 'sit4027', set: '' [ 3417.199913][ T3876] kobject: 'loop1' (0000000020f27248): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 3417.215816][ T6940] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3417.258553][ T6940] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3417.262329][ T6909] kobject: 'queues' (000000005cf3fdcf): kobject_uevent_env 21:50:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000020000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3417.302981][ T3876] kobject: 'loop5' (0000000030e275db): kobject_uevent_env [ 3417.334100][ T6909] kobject: 'queues' (000000005cf3fdcf): kobject_uevent_env: filter function caused the event to drop! [ 3417.339704][ T3876] kobject: 'loop5' (0000000030e275db): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3417.366709][ T6939] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3417.385358][ T6940] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3417.397106][ T6909] kobject: 'rx-0' (000000006870312e): kobject_add_internal: parent: 'queues', set: 'queues' [ 3417.420610][ T6939] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3417.433018][ T3876] kobject: 'loop2' (00000000a93cd850): kobject_uevent_env [ 3417.441738][ T6909] kobject: 'rx-0' (000000006870312e): kobject_uevent_env [ 3417.449264][ T6940] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3417.451640][ T3876] kobject: 'loop2' (00000000a93cd850): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3417.474520][ T6909] kobject: 'rx-0' (000000006870312e): fill_kobj_path: path = '/devices/virtual/net/sit4027/queues/rx-0' [ 3417.487949][ T6909] kobject: 'tx-0' (00000000953cfc80): kobject_add_internal: parent: 'queues', set: 'queues' [ 3417.502610][ T6909] kobject: 'tx-0' (00000000953cfc80): kobject_uevent_env [ 3417.509947][ T6909] kobject: 'tx-0' (00000000953cfc80): fill_kobj_path: path = '/devices/virtual/net/sit4027/queues/tx-0' [ 3417.538926][ T3876] kobject: 'loop5' (0000000030e275db): kobject_uevent_env [ 3417.553923][ T3876] kobject: 'loop5' (0000000030e275db): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3417.565543][ T6932] kobject: 'sit3460' (0000000080bc1298): kobject_add_internal: parent: 'net', set: 'devices' [ 3417.577521][ T3876] kobject: 'loop2' (00000000a93cd850): kobject_uevent_env [ 3417.586425][ T6932] kobject: 'sit3460' (0000000080bc1298): kobject_uevent_env [ 3417.588077][ T6939] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3417.594340][ T3876] kobject: 'loop2' (00000000a93cd850): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3417.619408][ T6932] kobject: 'sit3460' (0000000080bc1298): fill_kobj_path: path = '/devices/virtual/net/sit3460' [ 3417.627532][ T6939] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3417.634076][ T3876] kobject: 'loop5' (0000000030e275db): kobject_uevent_env [ 3417.647602][ T6932] kobject: 'queues' (0000000077c190f7): kobject_add_internal: parent: 'sit3460', set: '' [ 3417.659469][ T3876] kobject: 'loop5' (0000000030e275db): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3417.677564][ T6932] kobject: 'queues' (0000000077c190f7): kobject_uevent_env [ 3417.687112][ T3876] kobject: 'loop1' (0000000020f27248): kobject_uevent_env [ 3417.695798][ T6932] kobject: 'queues' (0000000077c190f7): kobject_uevent_env: filter function caused the event to drop! [ 3417.711471][ T3876] kobject: 'loop1' (0000000020f27248): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 3417.725069][ T6932] kobject: 'rx-0' (00000000124ec01e): kobject_add_internal: parent: 'queues', set: 'queues' [ 3417.745627][ T6932] kobject: 'rx-0' (00000000124ec01e): kobject_uevent_env [ 3417.760448][ T6932] kobject: 'rx-0' (00000000124ec01e): fill_kobj_path: path = '/devices/virtual/net/sit3460/queues/rx-0' [ 3417.787431][ T6932] kobject: 'tx-0' (000000001fac88ab): kobject_add_internal: parent: 'queues', set: 'queues' [ 3417.798572][ T6932] kobject: 'tx-0' (000000001fac88ab): kobject_uevent_env [ 3417.815623][ T6932] kobject: 'tx-0' (000000001fac88ab): fill_kobj_path: path = '/devices/virtual/net/sit3460/queues/tx-0' [ 3417.862581][ T6955] kobject: 'sit4028' (00000000cb25b1ae): kobject_add_internal: parent: 'net', set: 'devices' [ 3417.875866][ T6955] kobject: 'sit4028' (00000000cb25b1ae): kobject_uevent_env [ 3417.884812][ T6955] kobject: 'sit4028' (00000000cb25b1ae): fill_kobj_path: path = '/devices/virtual/net/sit4028' [ 3417.904255][ T6955] kobject: 'queues' (000000000ac67d6d): kobject_add_internal: parent: 'sit4028', set: '' [ 3417.915836][ T6955] kobject: 'queues' (000000000ac67d6d): kobject_uevent_env [ 3417.927338][ T6955] kobject: 'queues' (000000000ac67d6d): kobject_uevent_env: filter function caused the event to drop! [ 3417.938671][ T6955] kobject: 'rx-0' (0000000072c27582): kobject_add_internal: parent: 'queues', set: 'queues' [ 3417.952511][ T6955] kobject: 'rx-0' (0000000072c27582): kobject_uevent_env [ 3417.959820][ T6955] kobject: 'rx-0' (0000000072c27582): fill_kobj_path: path = '/devices/virtual/net/sit4028/queues/rx-0' [ 3417.976050][ T6955] kobject: 'tx-0' (000000000527b0b7): kobject_add_internal: parent: 'queues', set: 'queues' [ 3417.987299][ T6955] kobject: 'tx-0' (000000000527b0b7): kobject_uevent_env [ 3417.997991][ T6955] kobject: 'tx-0' (000000000527b0b7): fill_kobj_path: path = '/devices/virtual/net/sit4028/queues/tx-0' 21:51:00 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x5a620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:51:00 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x20000, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000000040)={0x1fe, 0x0, &(0x7f0000ffb000/0x3000)=nil}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000180)={r2, @in={{0x2, 0x4e20, @broadcast}}, [0x93, 0x1f, 0x100, 0x200, 0xffffffffffffff3a, 0x9, 0x3f, 0x6, 0x8001, 0x8, 0x5, 0x91, 0x8, 0x6, 0x200]}, &(0x7f0000000280)=0x100) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f0000000080)=0x7f) ioctl$KVM_CREATE_VM(r1, 0xae07, 0x0) 21:51:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000007530000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:51:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067f0506ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 3418.041082][ T6962] kobject: 'sit3461' (000000000f56c4c1): kobject_add_internal: parent: 'net', set: 'devices' [ 3418.066541][ T3876] kobject: 'loop3' (00000000849925e2): kobject_uevent_env [ 3418.078368][ T6968] QAT: Invalid ioctl [ 3418.086293][ T3876] kobject: 'loop3' (00000000849925e2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3418.101769][ T6968] QAT: Invalid ioctl [ 3418.144567][ T6968] QAT: Invalid ioctl [ 3418.149223][ T6962] kobject: 'sit3461' (000000000f56c4c1): kobject_uevent_env [ 3418.180562][ T6962] kobject: 'sit3461' (000000000f56c4c1): fill_kobj_path: path = '/devices/virtual/net/sit3461' [ 3418.194203][ T3876] kobject: 'loop5' (0000000030e275db): kobject_uevent_env [ 3418.208476][ T3876] kobject: 'loop5' (0000000030e275db): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3418.242440][ T6962] kobject: 'queues' (00000000e0216f9c): kobject_add_internal: parent: 'sit3461', set: '' [ 3418.259900][ T3876] kobject: 'loop2' (00000000a93cd850): kobject_uevent_env [ 3418.272618][ T6962] kobject: 'queues' (00000000e0216f9c): kobject_uevent_env [ 3418.281720][ T3876] kobject: 'loop2' (00000000a93cd850): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3418.294547][ T6962] kobject: 'queues' (00000000e0216f9c): kobject_uevent_env: filter function caused the event to drop! [ 3418.306473][ T6962] kobject: 'rx-0' (0000000036f448b4): kobject_add_internal: parent: 'queues', set: 'queues' [ 3418.327102][ T6962] kobject: 'rx-0' (0000000036f448b4): kobject_uevent_env [ 3418.338126][ T6962] kobject: 'rx-0' (0000000036f448b4): fill_kobj_path: path = '/devices/virtual/net/sit3461/queues/rx-0' [ 3418.354074][ T6962] kobject: 'tx-0' (0000000098034d69): kobject_add_internal: parent: 'queues', set: 'queues' [ 3418.380911][ T6962] kobject: 'tx-0' (0000000098034d69): kobject_uevent_env 21:51:00 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0xe803, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:51:00 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x101000, 0x0) ioctl$VT_RESIZEX(r2, 0x560a, &(0x7f00000002c0)={0x3, 0x2, 0x2, 0x4, 0x29e}) io_setup(0x9, &(0x7f0000000040)=0x0) io_pgetevents(r3, 0x4, 0x7, &(0x7f0000000180)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f0000000100)={&(0x7f00000000c0), 0x8}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x10001, 0x3, 0x4000, 0x1000, &(0x7f0000ffd000/0x1000)=nil}) 21:51:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000034000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:51:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x200000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xffffffffffffff7f) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f00000001c0)={@rand_addr="18d4eb8928bcb8e1eadb3622e00018b6", 0x3c, r2}) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000040)={0x7e, "177768fb927a9efd3f6776cba22818e4a23e55740141b872739992113949fa5f08c734ae8c00d7c95e8a62c7100548a7ab1164da44e52b0100eb781d711b7c1ca8cb8361369946e7d3b531661e836adbc97cf6f2cf1b0ee623221ea1466a8651d40f34e2598a4734fcadbebb326b7e8b0f9560d4e503f3dfbe8ddcc4ec19"}) 21:51:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067f0606ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) [ 3418.388037][ T6962] kobject: 'tx-0' (0000000098034d69): fill_kobj_path: path = '/devices/virtual/net/sit3461/queues/tx-0' [ 3418.447211][ T3876] kobject: 'loop4' (00000000a2bdb7aa): kobject_uevent_env [ 3418.468553][ T3876] kobject: 'loop4' (00000000a2bdb7aa): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3418.468928][ T6986] kobject: 'kvm' (00000000b411681b): kobject_uevent_env 21:51:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000600000000004000000000000000003e000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3418.501438][ T6971] kobject: 'sit4029' (0000000046903b16): kobject_add_internal: parent: 'net', set: 'devices' 21:51:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0xa000, 0x0) [ 3418.566985][ T3876] kobject: 'loop5' (0000000030e275db): kobject_uevent_env [ 3418.569871][ T6971] kobject: 'sit4029' (0000000046903b16): kobject_uevent_env [ 3418.618865][ T3876] kobject: 'loop5' (0000000030e275db): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3418.643539][ T6971] kobject: 'sit4029' (0000000046903b16): fill_kobj_path: path = '/devices/virtual/net/sit4029' 21:51:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x200, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000200)=""/202) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x3, 0x0, @pic={0x9, 0x9, 0x0, 0x7, 0x698, 0x7, 0x9, 0x3a54, 0x7ff, 0x2, 0x2, 0x1f, 0xffffffffffffffff, 0xc8, 0x4, 0x3}}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) [ 3418.675937][ T3876] kobject: 'loop2' (00000000a93cd850): kobject_uevent_env [ 3418.702706][ T6971] kobject: 'queues' (00000000a014e983): kobject_add_internal: parent: 'sit4029', set: '' [ 3418.725946][ T3876] kobject: 'loop2' (00000000a93cd850): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3418.727179][ T6986] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3418.767709][ T6971] kobject: 'queues' (00000000a014e983): kobject_uevent_env [ 3418.785362][ T6971] kobject: 'queues' (00000000a014e983): kobject_uevent_env: filter function caused the event to drop! [ 3418.814789][ T6986] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3418.829054][ T6971] kobject: 'rx-0' (000000003b788919): kobject_add_internal: parent: 'queues', set: 'queues' [ 3418.840781][ T6971] kobject: 'rx-0' (000000003b788919): kobject_uevent_env [ 3418.848094][ T6971] kobject: 'rx-0' (000000003b788919): fill_kobj_path: path = '/devices/virtual/net/sit4029/queues/rx-0' [ 3418.854514][ T6986] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3418.861931][ T6971] kobject: 'tx-0' (00000000beae758a): kobject_add_internal: parent: 'queues', set: 'queues' [ 3418.879964][ T6971] kobject: 'tx-0' (00000000beae758a): kobject_uevent_env [ 3418.889835][ T6971] kobject: 'tx-0' (00000000beae758a): fill_kobj_path: path = '/devices/virtual/net/sit4029/queues/tx-0' [ 3418.905074][ T7006] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3418.923222][ T6991] kobject: 'sit3462' (000000005dc7eba3): kobject_add_internal: parent: 'net', set: 'devices' [ 3418.934522][ T6991] kobject: 'sit3462' (000000005dc7eba3): kobject_uevent_env [ 3418.935198][ T7006] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3418.942423][ T6991] kobject: 'sit3462' (000000005dc7eba3): fill_kobj_path: path = '/devices/virtual/net/sit3462' [ 3418.980685][ T6991] kobject: 'queues' (00000000f30e95bb): kobject_add_internal: parent: 'sit3462', set: '' [ 3419.000519][ T6991] kobject: 'queues' (00000000f30e95bb): kobject_uevent_env [ 3419.008263][ T6991] kobject: 'queues' (00000000f30e95bb): kobject_uevent_env: filter function caused the event to drop! [ 3419.024066][ T6991] kobject: 'rx-0' (00000000053880bd): kobject_add_internal: parent: 'queues', set: 'queues' [ 3419.035711][ T6991] kobject: 'rx-0' (00000000053880bd): kobject_uevent_env [ 3419.046484][ T6991] kobject: 'rx-0' (00000000053880bd): fill_kobj_path: path = '/devices/virtual/net/sit3462/queues/rx-0' [ 3419.059119][ T6991] kobject: 'tx-0' (00000000fc2be2a6): kobject_add_internal: parent: 'queues', set: 'queues' [ 3419.067637][ T7006] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3419.073557][ T6991] kobject: 'tx-0' (00000000fc2be2a6): kobject_uevent_env [ 3419.084013][ T6991] kobject: 'tx-0' (00000000fc2be2a6): fill_kobj_path: path = '/devices/virtual/net/sit3462/queues/tx-0' [ 3419.099503][ T7006] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3419.116537][ T7008] kobject: 'sit4030' (0000000044228ca6): kobject_add_internal: parent: 'net', set: 'devices' [ 3419.128768][ T7008] kobject: 'sit4030' (0000000044228ca6): kobject_uevent_env [ 3419.136997][ T7008] kobject: 'sit4030' (0000000044228ca6): fill_kobj_path: path = '/devices/virtual/net/sit4030' [ 3419.152041][ T7008] kobject: 'queues' (0000000014aec19e): kobject_add_internal: parent: 'sit4030', set: '' [ 3419.163628][ T7008] kobject: 'queues' (0000000014aec19e): kobject_uevent_env [ 3419.173511][ T3876] kobject: 'loop1' (0000000020f27248): kobject_uevent_env [ 3419.184133][ T7008] kobject: 'queues' (0000000014aec19e): kobject_uevent_env: filter function caused the event to drop! [ 3419.195979][ T3876] kobject: 'loop1' (0000000020f27248): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 3419.206780][ T7008] kobject: 'rx-0' (00000000e6011f81): kobject_add_internal: parent: 'queues', set: 'queues' [ 3419.222142][ T7008] kobject: 'rx-0' (00000000e6011f81): kobject_uevent_env [ 3419.235304][ T7008] kobject: 'rx-0' (00000000e6011f81): fill_kobj_path: path = '/devices/virtual/net/sit4030/queues/rx-0' [ 3419.256755][ T7008] kobject: 'tx-0' (00000000dbfff9e8): kobject_add_internal: parent: 'queues', set: 'queues' [ 3419.267837][ T7008] kobject: 'tx-0' (00000000dbfff9e8): kobject_uevent_env [ 3419.275548][ T7008] kobject: 'tx-0' (00000000dbfff9e8): fill_kobj_path: path = '/devices/virtual/net/sit4030/queues/tx-0' 21:51:01 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x5b620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:51:01 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000040000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:51:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067f0706ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:51:01 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x1, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000000c0)={r1, 0x3ff}, 0x8) r2 = ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f0000000100)=0x2) [ 3419.314467][ T7009] kobject: 'sit3463' (0000000047675cd8): kobject_add_internal: parent: 'net', set: 'devices' [ 3419.333889][ T3876] kobject: 'loop3' (00000000849925e2): kobject_uevent_env [ 3419.364062][ T7009] kobject: 'sit3463' (0000000047675cd8): kobject_uevent_env [ 3419.378991][ T3876] kobject: 'loop3' (00000000849925e2): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3419.405373][ T7009] kobject: 'sit3463' (0000000047675cd8): fill_kobj_path: path = '/devices/virtual/net/sit3463' [ 3419.448045][ T3876] kobject: 'loop5' (0000000030e275db): kobject_uevent_env [ 3419.469951][ T7009] kobject: 'queues' (000000000163bdad): kobject_add_internal: parent: 'sit3463', set: '' [ 3419.487950][ T3876] kobject: 'loop5' (0000000030e275db): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3419.537396][ T7009] kobject: 'queues' (000000000163bdad): kobject_uevent_env [ 3419.564162][ T3876] kobject: 'loop2' (00000000a93cd850): kobject_uevent_env [ 3419.570350][ T7009] kobject: 'queues' (000000000163bdad): kobject_uevent_env: filter function caused the event to drop! [ 3419.579142][ T3876] kobject: 'loop2' (00000000a93cd850): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3419.645265][ T7009] kobject: 'rx-0' (000000002ee50e9c): kobject_add_internal: parent: 'queues', set: 'queues' [ 3419.656602][ T7009] kobject: 'rx-0' (000000002ee50e9c): kobject_uevent_env [ 3419.675341][ T7009] kobject: 'rx-0' (000000002ee50e9c): fill_kobj_path: path = '/devices/virtual/net/sit3463/queues/rx-0' [ 3419.695027][ T7009] kobject: 'tx-0' (00000000c54e28bf): kobject_add_internal: parent: 'queues', set: 'queues' [ 3419.726054][ T7009] kobject: 'tx-0' (00000000c54e28bf): kobject_uevent_env [ 3419.734682][ T7009] kobject: 'tx-0' (00000000c54e28bf): fill_kobj_path: path = '/devices/virtual/net/sit3463/queues/tx-0' 21:51:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000240000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:51:02 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xff, 0x1) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f0000000080)=r2) socket$alg(0x26, 0x5, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 21:51:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) 21:51:02 executing program 4: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0xee02, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:51:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067f0806ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:51:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x800) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x7, 0x0, 0x4, 0xffffffff}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000180)={r2, 0x78, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0xffffffffffffffff, @remote, 0x1}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e24, @multicast1}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e24, 0x1659, @local, 0x7}]}, &(0x7f00000001c0)=0x10) ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) ioctl$IMGETCOUNT(r1, 0x80044943, &(0x7f0000000200)) setxattr$security_evm(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.evm\x00', &(0x7f00000002c0)=@sha1={0x1, "f1b40c72d4b560eda0d6da0cd6d4f63d8a4370fa"}, 0x15, 0x3) [ 3419.811724][ T3876] kobject: 'loop4' (00000000a2bdb7aa): kobject_uevent_env [ 3419.816158][ T7015] kobject: 'sit4031' (000000005aeca6af): kobject_add_internal: parent: 'net', set: 'devices' [ 3419.818997][ T3876] kobject: 'loop4' (00000000a2bdb7aa): fill_kobj_path: path = '/devices/virtual/block/loop4' 21:51:02 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000000048000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) [ 3419.861891][ T7033] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3419.889083][ T7033] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3419.924231][ T7015] kobject: 'sit4031' (000000005aeca6af): kobject_uevent_env [ 3419.953971][ T3876] kobject: 'loop2' (00000000a93cd850): kobject_uevent_env [ 3419.959852][ T7032] kobject: 'kvm' (00000000b411681b): kobject_uevent_env 21:51:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000000)={[{0x6, 0xa5, 0x1000, 0x5, 0x8000, 0x8001, 0x3f, 0x7fd, 0x35, 0x7d7ce392, 0xef9, 0x7, 0x534}, {0x3, 0x8000, 0x36, 0x3f80000000000000, 0x3, 0x4, 0x8, 0x40, 0x8, 0x20, 0x81, 0x3ff, 0x3}, {0x4, 0xffffffffffff8001, 0x20, 0x20, 0x9, 0x9, 0x1ee5, 0x5, 0x9, 0x6, 0x3, 0x454, 0xffffffff}], 0xfa0c}) [ 3419.970685][ T7015] kobject: 'sit4031' (000000005aeca6af): fill_kobj_path: path = '/devices/virtual/net/sit4031' [ 3419.982394][ T3876] kobject: 'loop2' (00000000a93cd850): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3419.987781][ T7032] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3420.016761][ T3876] kobject: 'loop5' (0000000030e275db): kobject_uevent_env [ 3420.038242][ T7015] kobject: 'queues' (00000000670d55f3): kobject_add_internal: parent: 'sit4031', set: '' [ 3420.043909][ T3876] kobject: 'loop5' (0000000030e275db): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3420.072914][ T7033] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3420.098626][ T3876] kobject: 'loop2' (00000000a93cd850): kobject_uevent_env [ 3420.111395][ T7015] kobject: 'queues' (00000000670d55f3): kobject_uevent_env [ 3420.121107][ T7033] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3420.131040][ T3876] kobject: 'loop2' (00000000a93cd850): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3420.154949][ T3876] kobject: 'loop5' (0000000030e275db): kobject_uevent_env [ 3420.161278][ T7015] kobject: 'queues' (00000000670d55f3): kobject_uevent_env: filter function caused the event to drop! [ 3420.178646][ T3876] kobject: 'loop5' (0000000030e275db): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3420.227073][ T7015] kobject: 'rx-0' (00000000a7eb7d0a): kobject_add_internal: parent: 'queues', set: 'queues' [ 3420.246948][ T7033] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3420.259135][ T7015] kobject: 'rx-0' (00000000a7eb7d0a): kobject_uevent_env [ 3420.266519][ T7033] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3420.277583][ T7015] kobject: 'rx-0' (00000000a7eb7d0a): fill_kobj_path: path = '/devices/virtual/net/sit4031/queues/rx-0' [ 3420.304137][ T7015] kobject: 'tx-0' (00000000ed21a69f): kobject_add_internal: parent: 'queues', set: 'queues' [ 3420.316542][ T3876] kobject: 'loop1' (0000000020f27248): kobject_uevent_env [ 3420.319262][ T7015] kobject: 'tx-0' (00000000ed21a69f): kobject_uevent_env [ 3420.326202][ T3876] kobject: 'loop1' (0000000020f27248): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 3420.361678][ T7015] kobject: 'tx-0' (00000000ed21a69f): fill_kobj_path: path = '/devices/virtual/net/sit4031/queues/tx-0' [ 3420.393010][ T7037] kobject: 'sit3464' (00000000a56efa55): kobject_add_internal: parent: 'net', set: 'devices' [ 3420.404288][ T7037] kobject: 'sit3464' (00000000a56efa55): kobject_uevent_env [ 3420.414858][ T7037] kobject: 'sit3464' (00000000a56efa55): fill_kobj_path: path = '/devices/virtual/net/sit3464' [ 3420.426385][ T7037] kobject: 'queues' (00000000d7ccfc73): kobject_add_internal: parent: 'sit3464', set: '' [ 3420.440986][ T7037] kobject: 'queues' (00000000d7ccfc73): kobject_uevent_env [ 3420.448370][ T7037] kobject: 'queues' (00000000d7ccfc73): kobject_uevent_env: filter function caused the event to drop! [ 3420.464005][ T7037] kobject: 'rx-0' (00000000016f439c): kobject_add_internal: parent: 'queues', set: 'queues' [ 3420.474573][ T7037] kobject: 'rx-0' (00000000016f439c): kobject_uevent_env [ 3420.485155][ T7037] kobject: 'rx-0' (00000000016f439c): fill_kobj_path: path = '/devices/virtual/net/sit3464/queues/rx-0' [ 3420.496877][ T7037] kobject: 'tx-0' (0000000065f79bf9): kobject_add_internal: parent: 'queues', set: 'queues' [ 3420.510773][ T7037] kobject: 'tx-0' (0000000065f79bf9): kobject_uevent_env [ 3420.532252][ T7037] kobject: 'tx-0' (0000000065f79bf9): fill_kobj_path: path = '/devices/virtual/net/sit3464/queues/tx-0' [ 3420.573360][ T7051] kobject: 'sit4032' (00000000a5935ed8): kobject_add_internal: parent: 'net', set: 'devices' [ 3420.585555][ T7051] kobject: 'sit4032' (00000000a5935ed8): kobject_uevent_env [ 3420.595559][ T7051] kobject: 'sit4032' (00000000a5935ed8): fill_kobj_path: path = '/devices/virtual/net/sit4032' [ 3420.607528][ T7051] kobject: 'queues' (000000004608d3b6): kobject_add_internal: parent: 'sit4032', set: '' [ 3420.622788][ T7051] kobject: 'queues' (000000004608d3b6): kobject_uevent_env [ 3420.630132][ T7051] kobject: 'queues' (000000004608d3b6): kobject_uevent_env: filter function caused the event to drop! [ 3420.644985][ T7051] kobject: 'rx-0' (000000003a5c293d): kobject_add_internal: parent: 'queues', set: 'queues' [ 3420.655561][ T7051] kobject: 'rx-0' (000000003a5c293d): kobject_uevent_env 21:51:03 executing program 3: getrandom(&(0x7f0000000040)=""/44, 0x52a1, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0xfffffffffffffdf7, &(0x7f0000000180)={&(0x7f0000000140)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {0x0, 0x5c620100, 0x8202000000000000}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x3}]]}}}]}, 0x4f}}, 0x0) 21:51:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4000000000000004) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000280)="580000001400192340834b80040d8c5602067f0906ff81000000000000dca87086a5c000004f6400940005891550f4a8000000006700008000f0fffeffff09000080fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) 21:51:03 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffdae, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000000000000000006000000000040000000000000001d4c000000000000000000000000380000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1ef) 21:51:03 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae07, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000240)) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f0000000000)={0x3, 0x0, @pic={0x2, 0x8f3, 0x3, 0x7fff, 0x3ff, 0x4, 0x4, 0x81, 0x0, 0x10000, 0x401, 0x7f, 0x494d, 0x1000, 0x400, 0x7}}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x802, 0x0) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f0000000300)) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f0000000280)={'ipvs\x00'}, &(0x7f00000002c0)=0x1e) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000180)="0f01da4a0fc718b9800000c00f3235010000000f30470f0966b845000f00d8c4611414e1c4a1235820f3430f01763ec441a5d9f445eb9b", 0x37}], 0x1, 0x8, &(0x7f0000000200)=[@dstype0={0x6, 0x1}], 0x1) 21:51:03 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x189003, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000001c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r2}, 0x14) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$TIOCNXCL(r0, 0x540d) [ 3420.666350][ T7051] kobject: 'rx-0' (000000003a5c293d): fill_kobj_path: path = '/devices/virtual/net/sit4032/queues/rx-0' [ 3420.678054][ T7051] kobject: 'tx-0' (000000003d3f1ae6): kobject_add_internal: parent: 'queues', set: 'queues' [ 3420.692390][ T7051] kobject: 'tx-0' (000000003d3f1ae6): kobject_uevent_env [ 3420.699586][ T7051] kobject: 'tx-0' (000000003d3f1ae6): fill_kobj_path: path = '/devices/virtual/net/sit4032/queues/tx-0' [ 3420.756806][ T7060] kobject: 'kvm' (00000000b411681b): kobject_uevent_env [ 3420.757089][ T3876] kobject: 'loop3' (00000000849925e2): kobject_uevent_env [ 3420.765703][ T7056] kobject: 'sit3465' (0000000065d3beca): kobject_add_internal: parent: 'net', set: 'devices' [ 3420.792687][ T7060] kobject: 'kvm' (00000000b411681b): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 3420.811784][ T7056] kobject: 'sit3465' (0000000065d3beca): kobject_uevent_env [ 3420.819155][ T7056] kobject: 'sit3465' (0000000065d3beca): fill_kobj_path: path = '/devices/virtual/net/sit3465' [ 3420.845931][ T3876] kobject: 'loop3' (00000000849925e2): fill_kobj_path: path = '/devices/virtual/block/loop3' 21:51:03 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0xd25c) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000009800)=[{{&(0x7f0000000180)=@sco, 0x80, &(0x7f0000000100)=[{&(0x7f0000000200)=""/186, 0xba}], 0x1}, 0x823}, {{0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000002c0)=""/86, 0x56}, {&(0x7f0000000340)=""/191, 0xbf}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/171, 0xab}], 0x4, &(0x7f0000001500)=""/83, 0x53}, 0x6}, {{&(0x7f0000001580)=@caif=@rfm, 0x80, &(0x7f0000002a40)=[{&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f0000002600)=""/109, 0x6d}, {&(0x7f0000002680)=""/56, 0x38}, {&(0x7f00000026c0)=""/139, 0x8b}, {&(0x7f0000002780)=""/32, 0x20}, {&(0x7f00000027c0)=""/215, 0xd7}, {&(0x7f00000028c0)=""/218, 0xda}, {&(0x7f00000029c0)=""/95, 0x5f}], 0x8, &(0x7f0000002ac0)=""/41, 0x29}, 0xfffffffffffffffa}, {{0x0, 0x0, &(0x7f0000002e40)=[{&(0x7f0000002b00)=""/220, 0xdc}, {&(0x7f0000002c00)=""/181, 0xb5}, {&(0x7f0000002cc0)=""/118, 0x76}, {&(0x7f0000002d