[info] Using makefile-style concurrent boot in runlevel 2. [ 50.420225][ T27] audit: type=1800 audit(1578722513.480:21): pid=7783 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2452 res=0 [ 50.466737][ T27] audit: type=1800 audit(1578722513.490:22): pid=7783 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="motd" dev="sda1" ino=2480 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.160' (ECDSA) to the list of known hosts. 2020/01/11 06:02:05 fuzzer started 2020/01/11 06:02:07 dialing manager at 10.128.0.105:37275 2020/01/11 06:02:08 syscalls: 2812 2020/01/11 06:02:08 code coverage: enabled 2020/01/11 06:02:08 comparison tracing: enabled 2020/01/11 06:02:08 extra coverage: enabled 2020/01/11 06:02:08 setuid sandbox: enabled 2020/01/11 06:02:08 namespace sandbox: enabled 2020/01/11 06:02:08 Android sandbox: /sys/fs/selinux/policy does not exist 2020/01/11 06:02:08 fault injection: enabled 2020/01/11 06:02:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2020/01/11 06:02:08 net packet injection: enabled 2020/01/11 06:02:08 net device setup: enabled 2020/01/11 06:02:08 concurrency sanitizer: enabled 2020/01/11 06:02:08 devlink PCI setup: PCI device 0000:00:10.0 is not available syzkaller login: [ 69.468038][ T7951] KCSAN: could not find function: 'poll_schedule_timeout' 2020/01/11 06:02:17 adding functions to KCSAN blacklist: 'wbt_issue' 'vm_area_dup' 'kauditd_thread' 'ext4_mb_good_group' 'tick_do_update_jiffies64' 'tomoyo_supervisor' '__ext4_new_inode' '__hrtimer_run_queues' 'blk_mq_get_request' 'blk_mq_run_hw_queue' 'snd_seq_check_queue' 'ext4_mark_iloc_dirty' 'taskstats_exit' 'ktime_get_real_seconds' 'do_signal_stop' 'blk_stat_add' '__delete_from_page_cache' '__rb_insert_augmented' 'xas_clear_mark' 'find_next_bit' 'ext4_free_inodes_count' 'ext4_setattr' '__lru_cache_add' 'iput' 'tick_nohz_idle_stop_tick' 'ext4_nonda_switch' 'poll_schedule_timeout' 'copy_process' 'common_perm_cond' 'dd_has_work' 'pid_update_inode' 'do_syslog' 'fasync_remove_entry' '__snd_rawmidi_transmit_ack' 'run_timer_softirq' 'generic_write_end' '__rb_rotate_set_parents' 'mod_timer' 'rcu_gp_fqs_loop' 'tick_sched_do_timer' 'add_timer' '__writeback_single_inode' 'blk_mq_sched_dispatch_requests' 'queue_access_lock' 'echo_char' 'ep_poll' 'ext4_free_inode' 'ext4_has_free_clusters' 'wbt_done' 'audit_log_start' 'generic_fillattr' 'pcpu_alloc' 'process_srcu' 'n_tty_receive_buf_common' 'iomap_dio_bio_actor' 'do_nanosleep' '__mark_inode_dirty' '__dev_queue_xmit' 'blk_mq_dispatch_rq_list' 'rcu_gp_fqs_check_wake' '__dentry_kill' 06:05:01 executing program 0: clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) open(&(0x7f00000003c0)='./file1\x00', 0x40140, 0x40) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000500)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) dup2(r0, r1) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:05:01 executing program 1: clone(0x23102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) creat(&(0x7f0000000040)='./file0\x00', 0x0) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) write(r0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) shutdown(r1, 0x0) futex(&(0x7f0000000540)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 238.449144][ T7954] IPVS: ftp: loaded support on port[0] = 21 [ 238.539343][ T7954] chnl_net:caif_netlink_parms(): no params data found [ 238.614489][ T7954] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.621642][ T7954] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.633535][ T7954] device bridge_slave_0 entered promiscuous mode [ 238.653521][ T7954] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.660624][ T7954] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.684052][ T7954] device bridge_slave_1 entered promiscuous mode [ 238.703301][ T7954] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 238.714422][ T7954] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 238.716550][ T7957] IPVS: ftp: loaded support on port[0] = 21 [ 238.734646][ T7954] team0: Port device team_slave_0 added [ 238.741233][ T7954] team0: Port device team_slave_1 added 06:05:01 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) write$P9_RSETATTR(r1, 0x0, 0x0) [ 238.815560][ T7954] device hsr_slave_0 entered promiscuous mode [ 238.853505][ T7954] device hsr_slave_1 entered promiscuous mode [ 238.931775][ T7959] IPVS: ftp: loaded support on port[0] = 21 [ 239.032441][ T7954] netdevsim netdevsim0 netdevsim0: renamed from eth0 06:05:02 executing program 3: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x42440, 0x154) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0xbc, 0x0, 0x0, 0x0) [ 239.090263][ T7957] chnl_net:caif_netlink_parms(): no params data found [ 239.102493][ T7954] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 239.177660][ T7954] netdevsim netdevsim0 netdevsim2: renamed from eth2 06:05:02 executing program 4: clone(0x4002102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) symlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000300)='./file1\x00') mknod(&(0x7f0000000100)='./file0\x00', 0x1041, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) execve(&(0x7f0000000180)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x38) r2 = dup2(r0, r1) open$dir(&(0x7f00000001c0)='./file0\x00', 0x841, 0x0) clone(0x3302001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1/file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, 0x0) [ 239.257247][ T7954] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 239.327990][ T7962] IPVS: ftp: loaded support on port[0] = 21 [ 239.385455][ T7954] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.392570][ T7954] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.399923][ T7954] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.406976][ T7954] bridge0: port 1(bridge_slave_0) entered forwarding state [ 239.448758][ T7957] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.457604][ T7957] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.465763][ T7957] device bridge_slave_0 entered promiscuous mode [ 239.476264][ T7957] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.483342][ T7957] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.491125][ T7957] device bridge_slave_1 entered promiscuous mode [ 239.503005][ T7959] chnl_net:caif_netlink_parms(): no params data found [ 239.565422][ T7957] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 239.583216][ T3090] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.593743][ T3090] bridge0: port 2(bridge_slave_1) entered disabled state 06:05:02 executing program 5: clone(0x100100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x58654dc2db255447, 0xc031, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0xa, 0x0, 0x0) munlockall() [ 239.615777][ T7957] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 239.650502][ T7959] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.657786][ T7959] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.668234][ T7959] device bridge_slave_0 entered promiscuous mode [ 239.689731][ T7957] team0: Port device team_slave_0 added [ 239.704786][ T7959] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.711858][ T7959] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.733532][ T7959] device bridge_slave_1 entered promiscuous mode [ 239.749590][ T7966] IPVS: ftp: loaded support on port[0] = 21 [ 239.765493][ T7957] team0: Port device team_slave_1 added [ 239.773742][ T7962] chnl_net:caif_netlink_parms(): no params data found [ 239.803278][ T7954] 8021q: adding VLAN 0 to HW filter on device bond0 [ 239.814533][ T7959] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 239.829148][ T7959] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 239.868412][ T7962] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.872106][ T7970] IPVS: ftp: loaded support on port[0] = 21 [ 239.878904][ T7962] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.890820][ T7962] device bridge_slave_0 entered promiscuous mode [ 239.954889][ T7957] device hsr_slave_0 entered promiscuous mode [ 240.002987][ T7957] device hsr_slave_1 entered promiscuous mode [ 240.042842][ T7957] debugfs: Directory 'hsr0' with parent '/' already present! [ 240.055940][ T7962] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.063108][ T7962] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.070669][ T7962] device bridge_slave_1 entered promiscuous mode [ 240.094120][ T7959] team0: Port device team_slave_0 added [ 240.105457][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 240.113357][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 240.129550][ T7954] 8021q: adding VLAN 0 to HW filter on device team0 [ 240.144724][ T7959] team0: Port device team_slave_1 added [ 240.159957][ T7962] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 240.192841][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.201656][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.210420][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.217469][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 240.226564][ T7962] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 240.294952][ T7959] device hsr_slave_0 entered promiscuous mode [ 240.332995][ T7959] device hsr_slave_1 entered promiscuous mode [ 240.382764][ T7959] debugfs: Directory 'hsr0' with parent '/' already present! [ 240.398428][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 240.407300][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.415968][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.423064][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 240.454396][ T7962] team0: Port device team_slave_0 added [ 240.469830][ T3090] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.490211][ T7962] team0: Port device team_slave_1 added [ 240.514288][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.544178][ T7957] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 240.617909][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.626794][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.635652][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 240.644654][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.653590][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 240.661943][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 240.670426][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 240.683521][ T7959] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 240.749551][ T7959] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 240.794414][ T7957] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 240.846906][ T7966] chnl_net:caif_netlink_parms(): no params data found [ 240.870820][ T7970] chnl_net:caif_netlink_parms(): no params data found [ 240.924511][ T7962] device hsr_slave_0 entered promiscuous mode [ 240.962962][ T7962] device hsr_slave_1 entered promiscuous mode [ 241.042826][ T7962] debugfs: Directory 'hsr0' with parent '/' already present! [ 241.050564][ T7959] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 241.095152][ T7957] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 241.163586][ T7959] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 241.204676][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 241.213773][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 241.224415][ T7957] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 241.293288][ T7954] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 241.319484][ T7970] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.326823][ T7970] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.334820][ T7970] device bridge_slave_0 entered promiscuous mode [ 241.352969][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 241.360438][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 241.380330][ T7970] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.387646][ T7970] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.395622][ T7970] device bridge_slave_1 entered promiscuous mode [ 241.418805][ T7954] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 241.432149][ T7966] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.439687][ T7966] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.447774][ T7966] device bridge_slave_0 entered promiscuous mode [ 241.459621][ T7966] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.468456][ T7966] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.476227][ T7966] device bridge_slave_1 entered promiscuous mode [ 241.484459][ T7962] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 241.547036][ T7962] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 241.632888][ T7970] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 241.644050][ T7970] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 241.656342][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 241.665146][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 241.677155][ T7962] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 241.744868][ T7962] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 241.840687][ T7970] team0: Port device team_slave_0 added [ 241.848192][ T7966] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 241.859520][ T7966] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 241.876349][ T7970] team0: Port device team_slave_1 added [ 241.894566][ T7954] device veth0_vlan entered promiscuous mode [ 241.909686][ T7966] team0: Port device team_slave_0 added [ 241.918550][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 241.926785][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 241.935923][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 241.943678][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 241.957046][ T7954] device veth1_vlan entered promiscuous mode [ 241.971438][ T7966] team0: Port device team_slave_1 added [ 241.987732][ T7959] 8021q: adding VLAN 0 to HW filter on device bond0 [ 242.024541][ T7957] 8021q: adding VLAN 0 to HW filter on device bond0 [ 242.065091][ T7970] device hsr_slave_0 entered promiscuous mode [ 242.123052][ T7970] device hsr_slave_1 entered promiscuous mode [ 242.162784][ T7970] debugfs: Directory 'hsr0' with parent '/' already present! [ 242.215508][ T7966] device hsr_slave_0 entered promiscuous mode [ 242.263087][ T7966] device hsr_slave_1 entered promiscuous mode [ 242.302806][ T7966] debugfs: Directory 'hsr0' with parent '/' already present! [ 242.320181][ T7957] 8021q: adding VLAN 0 to HW filter on device team0 [ 242.346471][ T7959] 8021q: adding VLAN 0 to HW filter on device team0 [ 242.367772][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 242.383423][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 242.411439][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 242.419524][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.427323][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 242.435982][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 242.447471][ T3598] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.454731][ T3598] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.463263][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 242.471168][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 242.480572][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 242.497749][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 06:05:05 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x7, 0x0, 0x0) [ 242.506659][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.518768][ T3598] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.525857][ T3598] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.535939][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 242.545082][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 242.553524][ T3598] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.560561][ T3598] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.598030][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready 06:05:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) [ 242.613275][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 242.622414][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 242.635019][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.645188][ T3598] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.652236][ T3598] bridge0: port 2(bridge_slave_1) entered forwarding state 06:05:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) [ 242.661903][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 242.675099][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 242.685623][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 242.696065][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 242.706996][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 242.717778][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 242.727760][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 242.747841][ T7957] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 242.766675][ T7957] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 242.785185][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 242.799978][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 06:05:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) [ 242.810394][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 242.820732][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 242.831087][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 242.841067][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 242.851357][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 242.861961][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 242.872146][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 242.884508][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 242.892319][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 06:05:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) [ 242.927066][ T7959] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 242.937862][ T7959] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 242.954672][ T7962] 8021q: adding VLAN 0 to HW filter on device bond0 [ 242.973005][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 242.981441][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 243.012983][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 06:05:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) [ 243.029976][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 243.039441][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 243.047034][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 243.075386][ T7959] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 243.087021][ T7962] 8021q: adding VLAN 0 to HW filter on device team0 [ 243.110961][ T7957] 8021q: adding VLAN 0 to HW filter on device batadv0 06:05:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) [ 243.131569][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 243.139823][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 243.165773][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 243.173339][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 243.181051][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.202704][ T7970] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 243.235025][ T7970] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 243.300962][ T7959] device veth0_vlan entered promiscuous mode [ 243.308469][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 243.317238][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.325804][ T7965] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.332870][ T7965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.340961][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 243.349923][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 243.358661][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 243.367347][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.375735][ T7965] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.382803][ T7965] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.390458][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 243.399395][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 243.407386][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.415959][ T7970] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 243.464950][ T7970] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 243.505977][ T7966] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 243.576251][ T7959] device veth1_vlan entered promiscuous mode [ 243.586176][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 243.594990][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.602610][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.610503][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 243.618763][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 243.639177][ T7966] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 243.682870][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 243.690953][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 243.700256][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 243.709308][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 243.717907][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 243.726864][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 243.735516][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 243.744609][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 243.752840][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 243.761315][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 243.769710][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 243.778218][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 243.786846][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 243.797836][ T7957] device veth0_vlan entered promiscuous mode [ 243.805982][ T7966] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 243.868614][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 243.876721][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 243.884545][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 243.904484][ T7966] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 243.962126][ T7957] device veth1_vlan entered promiscuous mode [ 244.004421][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 244.011934][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 244.055742][ T7962] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 244.074468][ T7970] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.104344][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 244.116622][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 244.131000][ T7970] 8021q: adding VLAN 0 to HW filter on device team0 [ 244.161799][ T7962] device veth0_vlan entered promiscuous mode [ 244.171954][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 244.180037][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.187956][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 244.196519][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 244.206019][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 244.217474][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.244168][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 244.269964][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.278682][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.285930][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.294151][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 244.302987][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.311299][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.318349][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.326386][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 244.347346][ T7962] device veth1_vlan entered promiscuous mode [ 244.359564][ T7966] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.367082][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 244.376778][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 244.385411][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 244.394352][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 244.403050][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 244.411825][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 244.420795][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 244.429794][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 244.438125][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 244.446679][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 244.455160][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 244.464137][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 244.483732][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 244.491801][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 244.499844][ T7965] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.509923][ T7970] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 244.520042][ T7966] 8021q: adding VLAN 0 to HW filter on device team0 [ 244.536070][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 244.550240][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.566216][ T7971] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.573367][ T7971] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.601035][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 244.609347][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 244.619118][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.629220][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.636332][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.644875][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 244.654487][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 244.663546][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 244.672421][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 244.685311][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 244.694574][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 244.704387][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 244.715521][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 244.724094][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 244.731645][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 244.744002][ T7970] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 244.753826][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 244.769132][ T7966] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 244.780612][ T7966] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 244.790903][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 244.799504][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 244.817711][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 244.825351][ T3598] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 244.836211][ T7966] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 244.874759][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 244.884050][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 244.896298][ T7970] device veth0_vlan entered promiscuous mode [ 244.904237][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 244.912942][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 244.926108][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 244.934406][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 244.946005][ T7970] device veth1_vlan entered promiscuous mode [ 244.968447][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 244.977167][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 244.986170][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 244.995128][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 245.014888][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 245.023959][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 245.037208][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 245.045150][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 245.083782][ T7966] device veth0_vlan entered promiscuous mode [ 245.106814][ T7966] device veth1_vlan entered promiscuous mode 06:05:08 executing program 1: r0 = socket(0x200000000000011, 0xa, 0x0) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000440)={&(0x7f00000002c0), 0xc, &(0x7f0000000400)={0x0}}, 0x0) 06:05:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:08 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x4200, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x1000) write$binfmt_aout(r5, &(0x7f0000000100)=ANY=[], 0x49f) sendfile(r5, r5, &(0x7f00000001c0), 0x8080fffffffe) 06:05:08 executing program 4: clone(0x4002102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) symlink(&(0x7f0000000400)='./file0\x00', &(0x7f0000000300)='./file1\x00') mknod(&(0x7f0000000100)='./file0\x00', 0x1041, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000540)=""/11, 0x485) execve(&(0x7f0000000180)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x38) r2 = dup2(r0, r1) open$dir(&(0x7f00000001c0)='./file0\x00', 0x841, 0x0) clone(0x3302001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1/file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, 0x0) 06:05:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:08 executing program 3: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x42440, 0x154) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0xbc, 0x0, 0x0, 0x0) 06:05:08 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x6) setresuid(0x0, r1, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, &(0x7f0000000500)={'veth0_to_bond\x00', {0x2, 0x0, @multicast1}}) 06:05:08 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000580)='ns/pid\x00') 06:05:08 executing program 4: unshare(0x2000400) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0xc0189436, 0x0) 06:05:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:09 executing program 3: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x42440, 0x154) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0xbc, 0x0, 0x0, 0x0) [ 245.905599][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 245.970040][ T7971] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready 06:05:09 executing program 1: 06:05:09 executing program 4: 06:05:09 executing program 5: 06:05:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:09 executing program 2: 06:05:09 executing program 1: 06:05:09 executing program 5: 06:05:09 executing program 3: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x42440, 0x154) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0xbc, 0x0, 0x0, 0x0) 06:05:09 executing program 4: 06:05:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={0xffffffffffffffff, 0x0, &(0x7f0000000240)}, 0x20) 06:05:09 executing program 2: 06:05:09 executing program 1: 06:05:09 executing program 5: 06:05:09 executing program 4: 06:05:09 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={0xffffffffffffffff, 0x0, &(0x7f0000000240)}, 0x20) 06:05:09 executing program 2: 06:05:09 executing program 1: 06:05:09 executing program 5: 06:05:09 executing program 3: 06:05:10 executing program 2: 06:05:10 executing program 4: 06:05:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={0xffffffffffffffff, 0x0, &(0x7f0000000240)}, 0x20) 06:05:10 executing program 1: 06:05:10 executing program 5: 06:05:10 executing program 3: 06:05:10 executing program 2: 06:05:10 executing program 4: 06:05:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:10 executing program 1: 06:05:10 executing program 3: 06:05:10 executing program 5: 06:05:10 executing program 4: 06:05:10 executing program 2: 06:05:10 executing program 1: 06:05:10 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:10 executing program 3: 06:05:10 executing program 5: 06:05:10 executing program 4: 06:05:10 executing program 2: 06:05:10 executing program 1: 06:05:11 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:11 executing program 3: 06:05:11 executing program 4: 06:05:11 executing program 1: 06:05:11 executing program 2: 06:05:11 executing program 5: 06:05:11 executing program 3: 06:05:11 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:11 executing program 4: 06:05:11 executing program 1: 06:05:11 executing program 2: 06:05:11 executing program 5: 06:05:11 executing program 3: 06:05:11 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:11 executing program 1: 06:05:11 executing program 4: 06:05:11 executing program 2: 06:05:11 executing program 5: 06:05:11 executing program 3: 06:05:11 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:11 executing program 5: 06:05:11 executing program 1: 06:05:12 executing program 2: 06:05:12 executing program 4: 06:05:12 executing program 3: 06:05:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:12 executing program 4: 06:05:12 executing program 5: 06:05:12 executing program 1: 06:05:12 executing program 2: 06:05:12 executing program 3: 06:05:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:12 executing program 5: 06:05:12 executing program 4: 06:05:12 executing program 2: 06:05:12 executing program 1: 06:05:12 executing program 3: 06:05:12 executing program 4: 06:05:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:12 executing program 5: 06:05:12 executing program 2: 06:05:12 executing program 3: 06:05:12 executing program 1: 06:05:12 executing program 4: 06:05:13 executing program 3: 06:05:13 executing program 1: 06:05:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:13 executing program 2: 06:05:13 executing program 5: 06:05:13 executing program 4: 06:05:13 executing program 3: 06:05:13 executing program 2: 06:05:13 executing program 1: 06:05:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) writev(0xffffffffffffffff, &(0x7f00000001c0)=[{&(0x7f0000000000)="580000001500add427323b472545a45602117fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac710d2d82817a90d626c65280003ffffffffffffffffffffffe7ee000000", 0x58}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x8}, 0x0) 06:05:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:13 executing program 4: 06:05:13 executing program 3: 06:05:13 executing program 2: [ 250.495847][ T8329] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 06:05:13 executing program 1: 06:05:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:13 executing program 5: 06:05:13 executing program 4: 06:05:13 executing program 2: 06:05:13 executing program 1: 06:05:13 executing program 3: 06:05:13 executing program 5: 06:05:14 executing program 4: 06:05:14 executing program 2: 06:05:14 executing program 1: 06:05:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:14 executing program 5: 06:05:14 executing program 3: 06:05:14 executing program 4: 06:05:14 executing program 2: 06:05:14 executing program 1: 06:05:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:14 executing program 5: 06:05:14 executing program 3: 06:05:14 executing program 2: 06:05:14 executing program 4: 06:05:14 executing program 1: 06:05:14 executing program 5: 06:05:14 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:14 executing program 3: 06:05:14 executing program 2: 06:05:14 executing program 1: 06:05:14 executing program 4: 06:05:14 executing program 5: 06:05:15 executing program 3: 06:05:15 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sync() 06:05:15 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, 0x0) 06:05:15 executing program 5: syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000800)='./file0\x00', 0x0) 06:05:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2269005, 0x0) 06:05:15 executing program 4: 06:05:15 executing program 4: 06:05:15 executing program 3: 06:05:15 executing program 1: 06:05:15 executing program 2: 06:05:15 executing program 5: 06:05:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:15 executing program 2: 06:05:15 executing program 4: 06:05:15 executing program 5: 06:05:15 executing program 3: 06:05:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:15 executing program 1: 06:05:16 executing program 2: 06:05:16 executing program 4: 06:05:16 executing program 3: 06:05:16 executing program 1: 06:05:16 executing program 5: 06:05:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:16 executing program 4: 06:05:16 executing program 2: 06:05:16 executing program 3: 06:05:16 executing program 5: 06:05:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:16 executing program 1: 06:05:16 executing program 2: 06:05:16 executing program 4: 06:05:16 executing program 3: 06:05:16 executing program 5: 06:05:16 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:16 executing program 1: 06:05:16 executing program 2: 06:05:16 executing program 3: 06:05:16 executing program 4: 06:05:16 executing program 5: 06:05:17 executing program 1: 06:05:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:17 executing program 2: 06:05:17 executing program 3: 06:05:17 executing program 4: 06:05:17 executing program 5: 06:05:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x0, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:17 executing program 1: 06:05:17 executing program 3: 06:05:17 executing program 5: 06:05:17 executing program 2: 06:05:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x0, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:17 executing program 4: 06:05:17 executing program 1: 06:05:17 executing program 3: 06:05:17 executing program 5: 06:05:17 executing program 2: 06:05:17 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x0, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:17 executing program 2: 06:05:17 executing program 3: 06:05:17 executing program 5: 06:05:18 executing program 1: 06:05:18 executing program 4: 06:05:18 executing program 2: 06:05:18 executing program 5: 06:05:18 executing program 3: 06:05:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:18 executing program 1: 06:05:18 executing program 4: 06:05:18 executing program 5: 06:05:18 executing program 2: 06:05:18 executing program 3: 06:05:18 executing program 1: 06:05:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:18 executing program 4: 06:05:18 executing program 5: 06:05:18 executing program 2: 06:05:18 executing program 1: 06:05:18 executing program 4: 06:05:18 executing program 3: 06:05:18 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:18 executing program 5: 06:05:19 executing program 2: 06:05:19 executing program 4: 06:05:19 executing program 3: 06:05:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:19 executing program 5: 06:05:19 executing program 1: 06:05:19 executing program 2: 06:05:19 executing program 4: 06:05:19 executing program 3: 06:05:19 executing program 5: 06:05:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:19 executing program 1: 06:05:19 executing program 2: 06:05:19 executing program 4: 06:05:19 executing program 3: 06:05:19 executing program 5: 06:05:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:19 executing program 1: 06:05:19 executing program 4: 06:05:19 executing program 2: 06:05:20 executing program 5: 06:05:20 executing program 3: 06:05:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:20 executing program 1: 06:05:20 executing program 2: r0 = socket$inet6(0x10, 0x100000000000003, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="5500000018007fafb72d1cb2a4a2809302062c0000a84309c025244d25000b0008000a00492c2095d13936af28f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0xb8}], 0x1}, 0x0) 06:05:20 executing program 4: mknod(&(0x7f0000000500)='./bus\x00', 0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000040)={[{@workdir={'workdir', 0x3d, './bus'}}, {@xino_on='xino=on'}]}) 06:05:20 executing program 5: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x444, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) syz_open_dev$loop(0x0, 0x0, 0x182) io_submit(0x0, 0x0, &(0x7f0000000540)) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000001c0), 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x113}, 0x1033b) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0x100000001, 0x0, 0x1}, 0x1c) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000240)={'veth0_to_hsr\x00'}) bind$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) dup(0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), 0x4) shutdown(0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x20200, 0xa80ebe9c1646131b) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 06:05:20 executing program 3: ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) socket$inet(0x2, 0x0, 0x0) mknod(&(0x7f0000000500)='./bus\x00', 0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)={[{@workdir={'workdir', 0x3d, './file0'}}]}) 06:05:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) [ 257.298861][ T8644] overlayfs: option "workdir=./bus" is useless in a non-upper mount, ignore [ 257.341006][ T8650] overlayfs: option "workdir=./bus" is useless in a non-upper mount, ignore 06:05:20 executing program 1: mknod(&(0x7f0000000500)='./bus\x00', 0x0, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$overlay(0x0, &(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)={[{@workdir={'workdir', 0x3d, './file0'}}]}) 06:05:20 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000180)={0x5}, 0x8) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000001200)={0x0, 0x8, 0x3, 0x0}) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/157, 0x9d) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) fchdir(0xffffffffffffffff) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000a40)='cgroup.type\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x2880, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) [ 257.395696][ T8644] overlayfs: missing 'lowerdir' [ 257.400715][ T8650] overlayfs: missing 'lowerdir' [ 257.420277][ T8656] netlink: 'syz-executor.2': attribute type 11 has an invalid length. [ 257.466229][ T8656] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.2'. 06:05:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) [ 257.540369][ T8666] overlayfs: option "workdir=./file0" is useless in a non-upper mount, ignore [ 257.581446][ T8669] overlayfs: option "workdir=./file0" is useless in a non-upper mount, ignore [ 257.583589][ T8672] overlayfs: option "workdir=./file0" is useless in a non-upper mount, ignore 06:05:20 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000140)={0x81, 0x0, [0x3]}) 06:05:20 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @broadcast}}}, 0x104) [ 257.635586][ T8669] overlayfs: missing 'lowerdir' [ 257.649723][ T8666] overlayfs: missing 'lowerdir' [ 257.661387][ T8672] overlayfs: missing 'lowerdir' [ 257.717516][ T8676] md: could not open unknown-block(8,3). [ 257.733548][ T8676] md: md_import_device returned -6 [ 257.742715][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 257.748537][ C0] protocol 88fb is buggy, dev hsr_slave_1 06:05:20 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) [ 257.791554][ T8686] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 06:05:21 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) flistxattr(r0, 0x0, 0x10) 06:05:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x9) ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:21 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x444, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f0000000540)) r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000280)={0x113}, 0x1033b) dup(0xffffffffffffffff) bind$packet(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x118) sendmsg$DEVLINK_CMD_PORT_SET(0xffffffffffffffff, 0x0, 0x0) 06:05:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:21 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000180)={0x5}, 0x8) ioctl$BLKPG(r0, 0x40140921, &(0x7f0000001200)={0x0, 0x8, 0x3, 0x0}) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/157, 0x9d) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) fchdir(0xffffffffffffffff) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000a40)='cgroup.type\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x2880, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 06:05:21 executing program 3: 06:05:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={0xffffffffffffffff, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x9) ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:21 executing program 4: 06:05:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:21 executing program 3: 06:05:21 executing program 1: 06:05:21 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:21 executing program 4: 06:05:21 executing program 3: 06:05:21 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:21 executing program 1: 06:05:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x9) ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:22 executing program 4: 06:05:22 executing program 3: 06:05:22 executing program 1: 06:05:22 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:22 executing program 4: 06:05:22 executing program 3: 06:05:22 executing program 1: 06:05:22 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() tkill(0x0, 0x9) ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:22 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:22 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:22 executing program 3: 06:05:22 executing program 4: 06:05:22 executing program 1: 06:05:22 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:23 executing program 3: 06:05:23 executing program 4: 06:05:23 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) getrandom(0x0, 0x1c0, 0x2) 06:05:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) getgid() getpid() r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) open(0x0, 0x0, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:23 executing program 4: r0 = syz_open_dev$video(&(0x7f0000000240)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000200)) 06:05:23 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x802) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0x8108551b, 0x0) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1aa1, 0x802) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0x8108551b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SETINTERFACE(r1, 0x80085504, &(0x7f0000000280)) r2 = syz_open_dev$usbfs(0x0, 0x1aa1, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0x8108551b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SETINTERFACE(0xffffffffffffffff, 0x80085504, &(0x7f0000000280)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x4200, 0x0) fstat(r3, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f00000000c0)) 06:05:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:23 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) [ 260.544373][ C0] hrtimer: interrupt took 23444 ns 06:05:23 executing program 4: socket$inet_dccp(0x2, 0x6, 0x0) gettid() bind(0xffffffffffffffff, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x4007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000500)=ANY=[@ANYBLOB="3a00000002210000000000"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) 06:05:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) getgid() getpid() r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) open(0x0, 0x0, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:23 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:23 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) [ 260.773414][ T8856] usb usb7: usbfs: process 8856 (syz-executor.1) did not claim interface 0 before use 06:05:24 executing program 4: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) lchown(&(0x7f0000000400)='./file0\x00', 0x0, 0xee01) [ 260.897025][ T8864] libceph: Failed to parse monitor IPs: -22 06:05:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) pipe(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x0, 0x802) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0x8108551b, 0x0) ioctl$USBDEVFS_SETINTERFACE(r0, 0x80085504, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x1aa1, 0x802) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0x8108551b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SETINTERFACE(r1, 0x80085504, &(0x7f0000000280)) r2 = syz_open_dev$usbfs(0x0, 0x1aa1, 0x0) ioctl$USBDEVFS_CONTROL(r2, 0x8108551b, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_SETINTERFACE(0xffffffffffffffff, 0x80085504, &(0x7f0000000280)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x4200, 0x0) fstat(r3, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, &(0x7f00000000c0)) 06:05:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) getgid() getpid() r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) open(0x0, 0x0, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:24 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x9221, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000000)=0x4) write$dsp(r0, &(0x7f0000001240)="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", 0xfcf2) [ 261.234825][ T8886] usb usb7: usbfs: process 8886 (syz-executor.1) did not claim interface 0 before use 06:05:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:24 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x88) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000100)="1169ddce", 0x4}], 0x1) 06:05:24 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) getgid() getpid() r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) open(0x0, 0x0, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:24 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:24 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsu\x00', 0x0, 0x0) lseek(r0, 0xfffffffffffffe14, 0x0) 06:05:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:25 executing program 1: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsu\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6587b967483041ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x7ff8, 0x2, 0x0, 0x27) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000200)='trusted.overlay.origin\x00', 0x0, 0x20b, 0x0) 06:05:25 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:26 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x9221, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000000)=0x4) write$dsp(r0, &(0x7f0000001240)="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", 0xfcf2) 06:05:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) getgid() getpid() r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) open(0x0, 0x0, 0x0) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:26 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:26 executing program 1: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsu\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='dctcp\x00', 0x6) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x210007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="03268a927f1f6587b967483041ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x7ff8, 0x2, 0x0, 0x27) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000200)='trusted.overlay.origin\x00', 0x0, 0x20b, 0x0) 06:05:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) getgid() getpid() r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) open(0x0, 0x0, 0x0) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:26 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:26 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) 06:05:26 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:26 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) getgid() getpid() r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) open(0x0, 0x0, 0x0) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:28 executing program 4: 06:05:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:28 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) close(r0) socket$inet6(0xa, 0x40000080806, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r5, &(0x7f0000fe5000/0x18000)=nil, 0x0, 0xfffffffffffffc36, 0x0, 0x0, 0x0) 06:05:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:28 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) getgid() getpid() r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) getgid() getpid() r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:29 executing program 4: 06:05:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getpid() ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:29 executing program 1: 06:05:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:29 executing program 4: 06:05:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) getgid() getpid() r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f0000000140)={0x8f}) 06:05:29 executing program 1: 06:05:29 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, &(0x7f0000000240)}, 0x20) 06:05:29 executing program 4: 06:05:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) getgid() getpid() r0 = socket(0xa, 0x1, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x2, 0x9}, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000100)={0x8}) creat(&(0x7f0000000080)='./bus\x00', 0x0) 06:05:29 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, 0x0) 06:05:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, 0x0, 0x0) 06:05:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r3 = creat(&(0x7f0000001c00)='./bus\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="232138dbd7bfc3"], 0x7) ftruncate(r3, 0x800fe) r4 = socket(0x2, 0x803, 0xff) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r5 = dup(r4) r6 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8000fffffffe) 06:05:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, 0x0) 06:05:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) getgid() getpid() setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) [ 267.264657][ T9080] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 06:05:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, 0x0, 0x0) [ 267.449839][ T27] kauditd_printk_skb: 8 callbacks suppressed [ 267.449861][ T27] audit: type=1804 audit(1578722730.510:31): pid=9084 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir661077534/syzkaller.DieUbu/60/bus" dev="sda1" ino=16698 res=1 06:05:30 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) getgid() getpid() setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) 06:05:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, 0x0) 06:05:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, 0x0, 0x0) [ 267.964930][ T27] audit: type=1804 audit(1578722730.990:32): pid=9074 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir939114227/syzkaller.wuZS1D/62/bus" dev="sda1" ino=16712 res=1 06:05:31 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x2, 0x3, 0x288, 0xf8, 0xf8, 0xf8, 0x0, 0x0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x1f0, 0x3, 0x0, {[{{@uncond, 0x0, 0xd8, 0xf8, 0x0, {}, [@common=@unspec=@connmark={{0x30, 'connmark\x00'}}, @common=@unspec=@quota={{0x38, 'quota\x00'}}]}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@SET={0x60, 'SET\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2e8) 06:05:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) getgid() getpid() setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) 06:05:31 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) [ 268.056337][ T27] audit: type=1800 audit(1578722730.990:33): pid=9074 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="bus" dev="sda1" ino=16712 res=0 [ 268.196039][ T27] audit: type=1804 audit(1578722730.990:34): pid=9077 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir939114227/syzkaller.wuZS1D/62/bus" dev="sda1" ino=16712 res=1 [ 268.260142][ T27] audit: type=1804 audit(1578722731.020:35): pid=9111 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir939114227/syzkaller.wuZS1D/62/bus" dev="sda1" ino=16712 res=1 [ 268.284617][ T27] audit: type=1804 audit(1578722731.020:36): pid=9112 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.1" name="/root/syzkaller-testdir939114227/syzkaller.wuZS1D/62/bus" dev="sda1" ino=16712 res=1 [ 268.318719][ T9130] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 268.352766][ T27] audit: type=1804 audit(1578722731.020:37): pid=9113 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir939114227/syzkaller.wuZS1D/62/bus" dev="sda1" ino=16712 res=1 [ 268.387257][ T9130] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING [ 268.431182][ T27] audit: type=1804 audit(1578722731.380:38): pid=9117 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir661077534/syzkaller.DieUbu/60/bus" dev="sda1" ino=16698 res=1 06:05:31 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r3 = creat(&(0x7f0000001c00)='./bus\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="232138dbd7bfc3"], 0x7) ftruncate(r3, 0x800fe) r4 = socket(0x2, 0x803, 0xff) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r5 = dup(r4) r6 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8000fffffffe) 06:05:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={0xffffffffffffffff, 0x0, &(0x7f0000000240)}, 0x20) 06:05:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000140)) 06:05:31 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) getpid() ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) getgid() r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000c40)=@delqdisc={0x80, 0x12, 0x902a92df71b40141, 0x0, 0x0, {}, [@qdisc_kind_options=@q_taprio={{0xb, 0x1, 'taprio\x00'}, {0x50, 0x2, [@TCA_TAPRIO_ATTR_SCHED_BASE_TIME={0xc}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x40, 0x2, [@TCA_TAPRIO_SCHED_ENTRY={0xc, 0x1, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5, 0x2, 0x20}}, @TCA_TAPRIO_SCHED_ENTRY={0xc, 0x1, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8}}, @TCA_TAPRIO_SCHED_ENTRY={0xc, 0x1, @TCA_TAPRIO_SCHED_ENTRY_GATE_MASK={0x8}}, @TCA_TAPRIO_SCHED_ENTRY={0xc, 0x1, @TCA_TAPRIO_SCHED_ENTRY_CMD={0x5}}, @TCA_TAPRIO_SCHED_ENTRY={0xc, 0x1, @TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x6}}]}]}}]}, 0x80}}, 0x0) 06:05:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={0xffffffffffffffff, 0x0, &(0x7f0000000240)}, 0x20) 06:05:31 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) getpid() ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r3 = creat(&(0x7f0000001c00)='./bus\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="232138dbd7bfc3"], 0x7) ftruncate(r3, 0x800fe) r4 = socket(0x2, 0x803, 0xff) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r5 = dup(r4) r6 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8000fffffffe) 06:05:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000140)) [ 269.036286][ T27] audit: type=1804 audit(1578722732.100:39): pid=9152 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir661077534/syzkaller.DieUbu/61/bus" dev="sda1" ino=16720 res=1 06:05:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={0xffffffffffffffff, 0x0, &(0x7f0000000240)}, 0x20) [ 269.346091][ T27] audit: type=1804 audit(1578722732.410:40): pid=9169 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir939114227/syzkaller.wuZS1D/65/bus" dev="sda1" ino=16700 res=1 06:05:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r3 = creat(&(0x7f0000001c00)='./bus\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="232138dbd7bfc3"], 0x7) ftruncate(r3, 0x800fe) r4 = socket(0x2, 0x803, 0xff) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r5 = dup(r4) r6 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8000fffffffe) 06:05:32 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) getpid() ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:32 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000140)) 06:05:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, 0x0}, 0x20) 06:05:32 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r0, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, 0x0}, 0x20) 06:05:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r3 = creat(&(0x7f0000001c00)='./bus\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="232138dbd7bfc3"], 0x7) ftruncate(r3, 0x800fe) r4 = socket(0x2, 0x803, 0xff) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r5 = dup(r4) r6 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8000fffffffe) 06:05:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000500)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f73653000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000000000000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) r3 = creat(&(0x7f0000001c00)='./bus\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="232138dbd7bfc3"], 0x7) ftruncate(r3, 0x800fe) r4 = socket(0x2, 0x803, 0xff) connect$inet(r4, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) r5 = dup(r4) r6 = open(&(0x7f0000000440)='./bus\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x8000fffffffe) 06:05:33 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r0, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x1, &(0x7f0000000180)=@raw=[@exit], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x91, 0x7, 0x5, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000400)={r0, 0x0, 0x0}, 0x20) [ 270.260929][ T9209] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 06:05:33 executing program 4: r0 = gettid() rt_sigprocmask(0x0, &(0x7f0000024000)={0xfffffffffffffffe}, 0x0, 0x8) timer_create(0x3, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) r1 = gettid() tkill(r1, 0x12) timer_settime(0x0, 0xffffffffeffffffd, &(0x7f0000040fe0)={{}, {0x0, 0x9}}, 0x0) 06:05:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:33 executing program 5: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r0, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:33 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="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", 0x10c7}], 0x1) 06:05:34 executing program 0: syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)='S', 0x1}], 0x2) 06:05:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}]}}, &(0x7f00000003c0)=""/4096, 0x46, 0x1000, 0x1}, 0x20) 06:05:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:34 executing program 1: clone(0x8000000000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0x14, 0x4, 0x4, 0x234, 0x0, 0xffffffffffffffff, 0x0, [0x305f, 0xa, 0x300, 0x1800, 0x6000000]}, 0x3c) 06:05:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80801012}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x40, r1, 0x10, 0x70bd25, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x40}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfda7}]}, 0x40}, 0x1, 0x0, 0x0, 0x2}, 0x20000011) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e21, @empty}, {0x1, @broadcast}, 0x4, {0x2, 0x4e20, @local}, 'team_slave_0\x00'}) r2 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff770000000000200000009600000000000000a4000000000000000000", 0xffffffe5}], 0x2) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f00000003c0), &(0x7f0000000400)=0x4) 06:05:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:34 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={@mcast2}, 0x14) close(r2) socket$inet(0x10, 0x2, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080025944eeba71a4976e252922c000000002aba000000012e0b3836005404b0e0301a4ce875f2e0ff5f163ee340b7679500800000000000000101013c5891039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="d00800002400ffffff7f00000000ffefa6f909f7", @ANYRES32=r4, @ANYBLOB="0000000bf1ffffff000000000800010063627100a40802"], 0x3}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r5 = socket$netlink(0x10, 0x3, 0x0) ioctl(r5, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 06:05:34 executing program 2: perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) syz_open_dev$vcsa(0x0, 0xf7, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RVERSION(r1, &(0x7f00000000c0)={0x15, 0x65, 0xffff, 0x20, 0x8, '9P2000.L'}, 0x15) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcsu\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000003c0), &(0x7f0000000400)=0x4) 06:05:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) [ 271.418803][ T9254] netlink: 2208 bytes leftover after parsing attributes in process `syz-executor.0'. 06:05:34 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80801012}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x74, r1, 0x10, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x40}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfda7}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x40}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x29}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0xff}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x2}, 0x20000011) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e21, @empty}, {0x1, @broadcast}, 0x4, {0x2, 0x4e20, @local}, 'team_slave_0\x00'}) r2 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff770000000000200000009600000000000000a4000000000000000000", 0xffffffe5}], 0x2) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f00000003c0), &(0x7f0000000400)=0x4) 06:05:34 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:34 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000500)=[{&(0x7f00000002c0)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377bd7b3eb23d9008f0c69b08db538753bcf550f05d219f8c6ca03228dd8d293261ba079190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a0", 0x66}, {&(0x7f0000000840)="b5252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d88107b89a1516610f2003d59c73b5c7e008a287d2a1d473414b1adeb4ca87742298b064ae974e919c80525175804799682d67fca4f9defe5754c03f", 0x55}, {&(0x7f0000001840)="dfaea417b69dcadd4ef02628764693a4a377b2d6b627909090b7c13362cf90b96dae2bd98203c57b57325186e4a8afb1ab8a50dd3e2b878eeab6f9aca299660527620e7479805034cc76733675948f0fae2f03abde30fb4574e4d98cb7d80ac403f4cc83e28fa7f71e809e34e30f45e33656b2d8d179e457cd07480e0151956c76fca3da673d428454a1fece3d8354b653e3048c3f204d902b13954c8a354eba9c5d83945524183b5785a66556e4aac4ab638b1cee4fad587c435663b7d6e722a1c615d98f6552d65eea8891d6b6025c090556905ec1933da15742be69288abd8f4900a4451475ff647a402c5a98d99bf30ebd93d62322120460e5a3a2596eee981835d7cabd154e1534faf1a044bdbf863f33983d1815103faf57090c74489d6bc8fd3de679287a71251fb7b422c0ca2416b834e67f10e5c67e5608896ceea7e276d7a57889ae0f5202e7b860c1", 0x14e}], 0x3) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 06:05:34 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80801012}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x40, r1, 0x10, 0x70bd25, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x40}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfda7}]}, 0x40}, 0x1, 0x0, 0x0, 0x2}, 0x20000011) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e21, @empty}, {0x1, @broadcast}, 0x4, {0x2, 0x4e20, @local}, 'team_slave_0\x00'}) r2 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff770000000000200000009600000000000000a4000000000000000000", 0xffffffe5}], 0x2) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f00000003c0), &(0x7f0000000400)=0x4) 06:05:34 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:34 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r0, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:35 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) r0 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80801012}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x74, r1, 0x10, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x40}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfda7}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x7, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x40}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x29}, @IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0xff}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FWMARK={0x8}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x2}, 0x20000011) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000080)={{0x2, 0x4e21, @empty}, {0x1, @broadcast}, 0x4, {0x2, 0x4e20, @local}, 'team_slave_0\x00'}) r2 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)="53000000fcffffff770000000000200000009600000000000000a4000000000000000000", 0xffffffe5}], 0x2) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f00000003c0), &(0x7f0000000400)=0x4) 06:05:35 executing program 3: r0 = socket(0x0, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:35 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, [{}]}, 0x78) 06:05:35 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000040)={@link_local, @dev, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x88, 0x0, @empty, @multicast1}, @timestamp_reply}}}}, 0x0) 06:05:35 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r0, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:35 executing program 3: r0 = socket(0x0, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:35 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)}], 0x2) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f00000003c0), &(0x7f0000000400)=0x4) 06:05:35 executing program 5: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r0, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:35 executing program 1: bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x10001c) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640)=0x3, 0x4) socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 06:05:35 executing program 3: r0 = socket(0x0, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getpid() ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:35 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000500)=[{&(0x7f00000002c0)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377bd7b3eb23d9008f0c69b08db538753bcf550f05d219f8c6ca03228dd8d293261ba079190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a0", 0x66}, {&(0x7f0000000840)="b5252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d88107b89a1516610f2003d59c73b5c7e008a287d2a1d473414b1adeb4ca87742298b064ae974e919c80525175804799682d67fca4f9defe5754c03f", 0x55}, {&(0x7f0000001840)="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", 0x14e}], 0x3) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 06:05:35 executing program 0: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/74, 0x4a}) clone(0x49b9eb00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @identifier="f85869e09e2fe731ff58219edfcbf657"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) [ 272.800810][ T9328] IPVS: ftp: loaded support on port[0] = 21 06:05:35 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000340)='/dev/sg#\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = syz_open_dev$sg(0x0, 0x0, 0x5) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff824f400005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000040)}], 0x2) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x23, &(0x7f00000003c0), &(0x7f0000000400)=0x4) 06:05:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getpid() ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:36 executing program 3: r0 = socket(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:36 executing program 0: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=""/106, 0xfffffffffffffcc0}) clone(0x48b94b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_procfs(0x0, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="4963b7803949cdef7e04a080c4cc39044b0903bd92b3"], 0x16) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 06:05:36 executing program 1: bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x10001c) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ftruncate(0xffffffffffffffff, 0x208200) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000001640)=0x3, 0x4) socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) [ 273.237656][ T9358] IPVS: ftp: loaded support on port[0] = 21 [ 273.272707][ T21] tipc: TX() has been purged, node left! 06:05:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getpid() ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4020aeb2, &(0x7f0000000140)={0x0, 0x0, [0x0, 0x0, 0x800]}) 06:05:36 executing program 4: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/74, 0x4a}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @identifier="c25e98fd082194e1d628cfb63caad3c2"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 06:05:36 executing program 3: r0 = socket(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) [ 273.568291][ T9375] IPVS: ftp: loaded support on port[0] = 21 06:05:36 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, 0x0) 06:05:36 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000500)=[{&(0x7f00000002c0)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377bd7b3eb23d9008f0c69b08db538753bcf550f05d219f8c6ca03228dd8d293261ba079190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a0", 0x66}, {&(0x7f0000000840)="b5252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d88107b89a1516610f2003d59c73b5c7e008a287d2a1d473414b1adeb4ca87742298b064ae974e919c80525175804799682d67fca4f9defe5754c03f", 0x55}, {&(0x7f0000001840)="dfaea417b69dcadd4ef02628764693a4a377b2d6b627909090b7c13362cf90b96dae2bd98203c57b57325186e4a8afb1ab8a50dd3e2b878eeab6f9aca299660527620e7479805034cc76733675948f0fae2f03abde30fb4574e4d98cb7d80ac403f4cc83e28fa7f71e809e34e30f45e33656b2d8d179e457cd07480e0151956c76fca3da673d428454a1fece3d8354b653e3048c3f204d902b13954c8a354eba9c5d83945524183b5785a66556e4aac4ab638b1cee4fad587c435663b7d6e722a1c615d98f6552d65eea8891d6b6025c090556905ec1933da15742be69288abd8f4900a4451475ff647a402c5a98d99bf30ebd93d62322120460e5a3a2596eee981835d7cabd154e1534faf1a044bdbf863f33983d1815103faf57090c74489d6bc8fd3de679287a71251fb7b422c0ca2416b834e67f10e5c67e5608896ceea7e276d7a57889ae0f5202e7b860c1", 0x14e}], 0x3) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 06:05:36 executing program 0: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/106, 0xfffffffffffffea1}) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) syz_open_dev$tty20(0xc, 0x4, 0x0) rt_sigaction(0x0, &(0x7f0000000180)={&(0x7f0000000080)="40d12b6547de4b8a0f01d73642c685a500000000c4a1917c9a00000000c4227d1a4ec366460f6d99fb00000066440ff24258c4811dd974238b", {}, 0x0, 0x0}, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0xfffffffffffffde8, 0x0, 0xfffffffffffffe88, 0x0, 0x55}, 0x0) 06:05:36 executing program 3: r0 = socket(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) [ 273.888118][ T9391] IPVS: ftp: loaded support on port[0] = 21 06:05:37 executing program 4: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/74, 0x4a}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @identifier="ea49984ce43bbaa88a63343047b054eb"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0xfffffffffffffe52, 0x0, 0xffffffffffffff8a}, 0x0) 06:05:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, 0x0) 06:05:37 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000080), &(0x7f0000000040)=0xe5) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000040), 0x4) 06:05:37 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) [ 274.215015][ T9405] IPVS: ftp: loaded support on port[0] = 21 06:05:37 executing program 0: 06:05:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, 0x0) 06:05:37 executing program 1: 06:05:37 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:37 executing program 0: 06:05:37 executing program 2: 06:05:37 executing program 1: 06:05:37 executing program 4: 06:05:37 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, 0x0, 0x0) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:37 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getpid() ioctl$KVM_ENABLE_CAP(r1, 0x4020aeb2, &(0x7f0000000140)) 06:05:37 executing program 0: 06:05:38 executing program 1: 06:05:38 executing program 2: 06:05:38 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00'}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:38 executing program 4: 06:05:38 executing program 0: 06:05:38 executing program 2: 06:05:38 executing program 5: 06:05:38 executing program 1: 06:05:38 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00'}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:38 executing program 4: 06:05:38 executing program 2: 06:05:38 executing program 0: 06:05:38 executing program 5: 06:05:38 executing program 1: 06:05:38 executing program 4: 06:05:38 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00'}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:38 executing program 2: 06:05:38 executing program 0: 06:05:38 executing program 5: 06:05:39 executing program 4: 06:05:39 executing program 1: 06:05:39 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:39 executing program 2: 06:05:39 executing program 0: 06:05:39 executing program 5: 06:05:39 executing program 1: 06:05:39 executing program 4: 06:05:39 executing program 2: 06:05:39 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:39 executing program 0: 06:05:39 executing program 1: 06:05:39 executing program 5: 06:05:39 executing program 4: 06:05:39 executing program 0: 06:05:39 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(0xffffffffffffffff, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:39 executing program 2: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)=""/105, 0x69}) clone(0x48b94b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$ptys(0xc, 0x3, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYBLOB="217106fbaf417186ba0ebb016f35bdedbb01088ff825c9b8ec67d8db949c4b05005592e110aece4be6c4d37579f1826b35d3b9559cf4020f000000000361b055f84cd7fb3112a47120a05f5c662e48a8ac1089eed3ba"], 0x56) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0xfffffffffffffd23, 0x0, 0xfffffffffffffcf8}, 0x0) 06:05:39 executing program 5: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/106, 0xfffffffffffffea1}) clone(0x48b94b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$char_usb(0xc, 0xb4, 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="7ce7036a26210000c8726c06acd73d400fee7ae7599a"], 0x16) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 06:05:40 executing program 1: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/96, 0x60e}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @reserved="744f092073c5bbe4d4dca14cbe469f675a0996483862d410deb11cf8bf40d0ef"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 06:05:40 executing program 4: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)=""/125, 0x7d}) clone(0x48b94b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_pts(r0, 0x90400) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "a4ba02155b4fdd00"}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0xfffffffffffffd0b, 0x0}, 0x0) [ 276.939933][ T9524] IPVS: ftp: loaded support on port[0] = 21 06:05:40 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x0, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:40 executing program 0: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/81, 0x51}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000001c0)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @identifier="141fa0f34a9946a36a1d28f128bf9272"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) [ 277.080815][ T9531] IPVS: ftp: loaded support on port[0] = 21 [ 277.130830][ T9534] IPVS: ftp: loaded support on port[0] = 21 [ 277.138430][ T9535] IPVS: ftp: loaded support on port[0] = 21 06:05:40 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x0, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) [ 277.227374][ T9545] IPVS: ftp: loaded support on port[0] = 21 06:05:40 executing program 2: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/81, 0x51}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000001c0)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @identifier="5bdc487a1ac03f749a18a85ae7a9c1b1"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) [ 277.364024][ T21] tipc: TX() has been purged, node left! [ 277.372596][ T21] tipc: TX() has been purged, node left! [ 277.403048][ T21] tipc: TX() has been purged, node left! 06:05:40 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x0, &(0x7f0000000000)) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:40 executing program 5: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/82, 0x52}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @reserved="1306000000b43a9a0ac40ac91a2b8560e02f06cb00"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 06:05:40 executing program 1: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/67, 0x43}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="0272aae16e010f05dfd5d71cc8bab91d6d936cf44cd317b97f2a55de2da11f6e18b9d00ffc2ffadbfb9717eba42e7fe4a15cb583ea3eda7784d6295485da75d990180231f59ebe181b0c1efb0834ccb53d1cec4a6f2a239e64b7933129033faecb8a1ba890153d6c7b44e714cda28b4f3fcba183aa4829e8639470759738801af931737681657f6decd5d726312531bc25ba09f691da2205000001ad6958f651438f5aec2b0a627181f982be1b312614ee1fb7ead43f88c89ac6fef1ea610820076a16019cc346d8884480145ebb4503000000c73822fd33b7f22ff104ad68db421422335d97ce336d513503de9d4a62d3d7b29b2f969a774173e7b339ff750804c0a0f91011c34854d5e076ed75929c914d44eee8e0080e510b224edcb1aacefd47a6eb51627a52fac53eed4cc9a20246a637eb5e95ce9028da700daf4089a89ca94c84c37738754288f1aa22eaa4ba6cdda04b3b1fb846c65802809bd2a65a6f7919078cec6d9b22625be698c8057c7ee6f33c20e4b96ebdca22a4dc6d1a61df20edd8205cc448ed6b846ff0b6c35a4963e48427c098a542f36a05012161f74ad26a867740f64ed44aed19a4d5582b0a99f8c8a5781c91477302cf5e929bbec534eb4fc6b62b203bcc627913d817f57db502d57be3205727e2c6e47d2d201885eb6455273276e3a35a80d5aedbbac70a1b0a9173c797608479a7631eb8b63195efe23f35ff7615900b191ed2e0053cebd06218df7fccf1717434a11c812057f083431a22cbacd089927d7c1509b0e94624b130b8aadd0af89eb4b6bfcc4cf67db95bd731892be3f1a2bf17917f4525f6e3463f331378f7ee7a872721adfea62c16bf0e4c4a25971c9e64ca3a55ef13eddc6d6557931f149a0929cb87b8371e354ef6f06b1abfb506d5b6c7d35b51dabd94c7d816fbd3491e17c0094a659053724b94da23e5d9b4d260ef723929d79f14361ddab19bde5a05677c161ce38324c9264288db8a67b79598ef0c00000000000000f21026f12c843afb510d2dff09f709aee946d38fe1f5304a11185bdf08e92ea42cfd576508359bd538195a0737c29445cda5504ddab67ebd1310dc8efc0380db010da701d2ffdc26575535f289535d625debc3492f7b3c20ff63c3b984813d7de5f0fd69580ec787de4a5c2ea293530a2f1fce30558b6dcb6776dcb256f817078849e597dd5651f65bcccccff18f09b6269cf340eda8ef555976a33eec417ce523ec5a94c8bfc8d2e61adad9f7759529bb7dc46d3954853aabe78f77e365075c04ee83091967504f7116d10fc2e3f3ef1ffc311397cffadb2ca0fcd4e18b44e08346192dbab940470b92a5a44d15df225f020abc62636c97509063f8d3633d8c0bc1fc783fd8f15d388dfa391c31b176ee3c730b765345d3a19300980567196ba63300"}) syz_open_dev$ttys(0xc, 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @reserved="2c5c26589f891dc038409e03c8080ded9a102ddf80c0f4be34b649ae9832ebd5"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x133}, 0x0) [ 277.442699][ T9556] IPVS: ftp: loaded support on port[0] = 21 [ 277.472797][ T21] tipc: TX() has been purged, node left! [ 277.481141][ T21] tipc: TX() has been purged, node left! 06:05:40 executing program 4: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/81, 0x51}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000001c0)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="0272aae16e010f05dfd5d71cc8bab91d6d936cf44cd317b97f2a55de2da11f6e18b9d00ffc2ffadbfb9717eba42e7fe4a15cb583ea3eda7784d6295485da75d990180231f59ebe181b0c1efb0834ccb53d1cec4a6f2a239e64b7933129033faecb8a1ba890153d6c7b44e714cda28b4f3fcba183aa4829e8639470559738801af931737681657f6decd5d726312531bc25ba09f6b1da2205000001ad6958f651438f5aec2b0a627181f982be1b312614ee1fb7ead43fde9e9ac6fef1ea610820076a16019cc346d8884480141ebb4503000000c73822fd33b7f22ff104ad68db421422335d97ce336d513503de9d4a62d3d7b29b2f969add4af8c0b339ff750804c0a0f91011c34854d5e076ed75929c914d44eee8e0080e510b224edcb1aa4f4ac6566c10610552fac53eed4cc9a20246a637eb5e95ce9028da700daf4089a89ca94c84c37738754288f1aa22eaa4ba6cdda04b3b1fb846c65802809bd2a65a6f7919847b65956fb34a9ee698c8057c7ee6f33c20e4b96ebdca22a4dc6d1a61df20edd8205cc448ed6b846ff0b6c35a4963e48427c098a542f36a05012161f74ad26a867740f64ed44aed19a4d5582b0a99f8c8a5781c91477302cf5e929bbec534eb4fc6b62b203bcc627913d817f57db502d57be3205727e2c6e47d2d201885eb6455273276e3a35a80d5aedbbac70a1b0a9173c797608479a7631eb8b63195efe23f354a7615900b191ed2e0053cebd06218df6dccf1717434a11c812057f083431a22cbacd089927d7c1509b0e94624b130b8aadd0af89eb4b6bfcc4cf67db95bd731892be3f1a2bf17917f4525f6e3463f331378f7ee7a872721adfea62c16bf0e4c4a25971c9e64ca3a55ef13eddc6d6557931f149a0929cb87b8371e354ef6f06b1abfb506d5b6c7d35b51dabd94a4d816fbd3491e17c0094a659053724b94da23e5d9b4d260ef723929d79f14361ddab19bde5a05677c161ce38324c9264288db8a67b79598ef0c00000000000000f21026f12c843afb510d2dff09f709aee946d38fe1f5304a11185bdf08e92ea42cfd576508359bd538195a0737c29445cda5504ddab67ebd1310dc8efc0380db010da701d2ffdc26575535f289535d625debc3492f7b3c20ff63c3b984813d7de5f0fd69580ec787de4a5c2ea293530a2f1fce30558b6dcb6776dcb256f817078849e597dd5651f65bcccccff1749cb46a79f37005a8ef555976a33eec417ce523ec5a94c8bfc8d2e61adad9f7759529bb7dc46d3954853aabe78f77e365075c04ee83091967504f7116d10fc2e3f3ef1ffc311397cffadb2ca0fcd4e18b44e08346192dba9840470b92a5a44d15df225f020abc62636c97509063f8d3633d8c0bc1fc783fd8f15d388dfa391c31b176ee3c730b765345d3a19300980567196ba63300"}) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @reserved="8016ad091e8c5e0c819eb02bde03fb000800000000000700"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 06:05:40 executing program 0: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/67, 0xfe1f}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @reserved="a4ba12c5cadab4553c41bc9668e9834065072201f807e4ffce068c8d2e004e60"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0xfffffffffffffe52, 0x0, 0xffffffffffffff8a, 0x0, 0xfff4}, 0x0) [ 277.619034][ T9568] IPVS: ftp: loaded support on port[0] = 21 [ 277.620374][ T9567] IPVS: ftp: loaded support on port[0] = 21 [ 277.655883][ T9571] IPVS: ftp: loaded support on port[0] = 21 06:05:40 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, 0x0) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:40 executing program 2: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/106, 0xfffffffffffffea1}) clone(0x48b94b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000140)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$tty1(0xc, 0x4, 0x1) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="204ad69dc65bdc010ceb925869d77e7e794157d97bf7"], 0x16) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x1a0, 0x0, 0xfffffffffffffe8d}, 0x0) [ 277.808941][ T9578] IPVS: ftp: loaded support on port[0] = 21 [ 277.871451][ T9583] IPVS: ftp: loaded support on port[0] = 21 06:05:41 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, 0x0) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:41 executing program 1: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/96, 0x60e}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000140)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @reserved="eca1fe952adcaa9e6a9f17e7541112b1dd4900"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 06:05:41 executing program 5: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/81, 0x51}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000001c0)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @identifier="1a5a2d3dd9c7fea2ab00efb387470706"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 06:05:41 executing program 0: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/81, 0x51}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000001c0)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @reserved="1df570c149c5d401aeed32cbfef9b25fb5ea616367ac7ef218fc63b1470c7fbd"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 06:05:41 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, 0x0) ioctl(r0, 0x8936, &(0x7f0000000000)) 06:05:41 executing program 4: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/96, 0x60e}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000140)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="0272aae16e010f05dfd5d71cc8bab91d6d936cf44cd317b97f2a55de2da11f6e18b9d00ffc2ffadbfb9717eba42e7fe4c05cb583ea3eda7784d6295485da75d990180231f59ebe181b0c1efb0834ccb53d1cec4a6f2a239e64b7933129033faecb9e1ba890153d6c7b44e714cda28b4f3fcba183aa4829e8639470759738801af931737681657f6decd5d7263125319c25ba09f691da22dfa2773bad6958f651438f5aec2b0a625e81f982be1b312614ee1fb7eaf43f88c89ac6fef1ea610820076a16019cc346d8884480141ebb4503000000c73822fd33b7f22ff104ad68db421422335d97ce336d513503de034a62d3d7b29b2f969aa194f8bf6aeda4230804c0a0f91011c34854d5e076ed7592bc914d44eee8e0080e510b224edcb1aacefd47a6eb51627a52fac53eed4cc9a20246a637eb5e95ce9028da700daf4089a89ca94c84c37738754288f1aa22eaa4ba6cdda04b3b1fba46c65802809bd2a65a6f7919847b65956fb34a9ee698c8057c7ee6f33c20e4b96ebdca22a4dc6d1a61df20edd8205cc448ed6b846ff0b6c35a4963e48427c098a542f36a05012161f74ad26a867740f64ed44aed19a4d5582b0a99f8c8a5781c91477302cf1e929bbec534eb4fc4b62b203bcc627913d817f57db502d57be3205727e2c6e47d2d201885eb6455273276e3a35a80d5aedbbac70a1b0a9173c797608479a7631eb8b63195efe23f354a7615900b191ed2e0053cebd06218df7fccf1717434a11c812057f083431a22cbacd089927d7c1509b0e94624b130b8aadd0af89eb4b6bfcc4cf67db95bd731892be3f1a2bf17917f4525f6e3463f33fa78f7ee7a872721adfea62c16bf0e4c4a25971c9e64ca3a55ef13eddc6d6557931f149a0929cb87b8371e354ef6f06b1abfb506d5b6c7d35b51dabd94a4d816fbd3491e17c0094a659053724b94da23e5d9b4d260ef723929d79f14361ddab19bde5a05677c161ce38324c9264288dde2d398d52f87cf72a9e2db8a67b79598ef9f8fb5ac4130ae94f21026f12c843afb510d2dff09f709aee946d38fe1f502000000000000002ea42cfd576508359bd538195a0737c29445cda5504ddab67ebd1310dc8efc0380db010da701d2ffdc26575535f289535d625debc3494a7b3c20ff63c3b984813d7de5f0fd694a5c2ea293530a2f1fce30558b6dcb6776dcb256f817078849e597dd5651f65bcccccff1749cb46a79f37005a8ef555976a33eec417ce523ec5a94c8bfc8d2e61adad9f7759529bb7dc46d3954853aabe78f77e365075c04ee83091967504f7116d10fc2e3f3ef1ffc311397cffadb2ca0fcd4e18b44e08346192dba9840470b92a5a44d15df225f020abc62636c97509063f8d3633d8c0bc1fc783fd8f15d388dfa391c31b176ee3c730b765345d3a19300980567196ba63300"}) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @identifier="f33e646dff2f1db0f0a13e457fed1110"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x524}, 0x0) [ 278.175793][ T9600] IPVS: ftp: loaded support on port[0] = 21 [ 278.195415][ T9599] IPVS: ftp: loaded support on port[0] = 21 06:05:41 executing program 2: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)=""/125, 0x7d}) clone(0x48b94b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_procfs$namespace(0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, "a4ba0215594fdd00a245ffffffffffff00"}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0xfffffffffffffd0b, 0x0, 0x352}, 0x0) [ 278.358107][ T9608] IPVS: ftp: loaded support on port[0] = 21 [ 278.365882][ T9609] IPVS: ftp: loaded support on port[0] = 21 06:05:41 executing program 5: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/81, 0x51}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000001c0)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @identifier="1a5a2d3dd9c7fea2ab00efb387470706"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 06:05:41 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) 06:05:41 executing program 1: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/81, 0x51}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000001c0)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="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"}) syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @identifier="141fa0f34a9946a36a1d28f128bf9272"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) [ 278.480683][ T9618] IPVS: ftp: loaded support on port[0] = 21 [ 278.585624][ T9629] IPVS: ftp: loaded support on port[0] = 21 06:05:41 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) [ 278.626439][ T9631] IPVS: ftp: loaded support on port[0] = 21 06:05:41 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(0xffffffffffffffff, 0x8936, &(0x7f0000000000)) 06:05:42 executing program 0: ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=""/64, 0x40}) clone(0x49b96b00, 0x0, 0x0, 0x0, &(0x7f0000000300)) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f0000000280)={0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)="0272aae16e010f05dfd5d71cc8bab91d6d936cf44cd317b97f2a55de2da11f6e18b9d00ffc2ffadbfb9717eba42e7fe4a15cb583eaf8ff7784d6295485da75d990180231f59ebe18130c1efb0834ccb53d1cec4a6f2a239e64b7933129033faecb8a1ba890153d6c7b44e714cda28b4f3fcba183aa4829e8639470759738801af931737681657f6decd5d726312531bc25ba09f691da2205000001ad6958f651438f5aec2b0a627181f982be1b312614ee1fb7ead43f88c89ac6fef1ea610820076a16019cc346d8884480145ebb4503000000c73822fd33b7f22ff104ad68db421422335d97ce336d513503de9d4a62d3d7b29b2f969a774173e7b339ff750804c0a0f91011c34854d5e076ed75929cfa4444eee8e0080e510b224edcb1aacefd47a6eb51627a52fac53eed4cc9a20246a637eb5e95ce9028da700daf4089a89ca94c84c37738754288f1aa22eaa4ba6cdda04b3b1fb846c65802809bd2a65a6f7919078cec6d9b22625be698c8057c7ee6f33c20e4b96ebdca22a4dc6d1a61df20edd8205cc448ed6b846ff0b6c35a4963e48427c098a542f36a05012161f74ad26a867740f64ed44aed19a4d5582b0a99f8c8a5781c91477302cf5e929bbec534eb4fc6b62b203bcc627913d817f57db502d57be3205727e2c6e47d2d201885eb6455273276e3a35a80d5aedbbac70a1b0a9173c797608479a7631eb8b63195efe23f35ff7615900b191ed2e0053cebd06218df7fccf1717434a11c812057f083431a22cbacd089927d7c1509b0e94624b130b8aadd0af89eb4b6bfcc4cf67db95bd731892be3f1a2bf17917f4525f6e3463f331378f7ee7a872721adfea62c16bf0e4c4a25971c9e64ca3a55ef13eddc6d00000000149a0929cb87b8371e354ef6f06b1abfb506d5b6c7d35b51dabd94a4d816fbd3491e17c0094a659053724b94da23e5d9b4d260ef723929d79f14361ddab19bde5a05677c161ce38324c9264288db8a67b79598ef0c00000000000000f21026f12c843afb510d2dff09f709aee946d38fe1f5304a11185bdf08e92ea42cfd576508359bd538195a0737c29445cda5504ddab67ebd1310dc8efc0380db010da701d2ffdc26575535f289535d625debc3492f7b3c20ff63c3b984813d7de5f0fd69580ec787de4a5c2ea293530a2f1fce30558b6dcb6776dcb256f817078849e597dd5651f65bcccccff18f09b6269cf340eda8ef555976a33eec417ce523ec5a94c8bfc8d2e61adad9f7759529bb7dc46d3954683aabe78f77e365075c04ee8309139cb6fadb2ca0fcd4e18b44e08346192dbab940470b92a5a44d15df225f020abc62636c97509063f8d3633d8c0bc1fc783fd8f15d388dfa391c31b176ee3c730b765345d3a19300980567196ba63300"}) syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0406618, &(0x7f0000000080)={{0x0, 0x0, @identifier="a0756a1806ebd8035f1e70216b9214c5"}}) recvmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0xff9b, 0x0, 0x0, 0x0, 0x97}, 0x0) 06:05:42 executing program 2: 06:05:42 executing program 4: 06:05:42 executing program 5: 06:05:42 executing program 1: [ 279.114332][ T9648] IPVS: ftp: loaded support on port[0] = 21 06:05:42 executing program 1: 06:05:42 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x0, &(0x7f0000000000)) 06:05:42 executing program 5: 06:05:42 executing program 2: 06:05:42 executing program 4: 06:05:42 executing program 0: 06:05:42 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x0, &(0x7f0000000000)) 06:05:42 executing program 2: 06:05:42 executing program 1: 06:05:42 executing program 5: 06:05:42 executing program 4: 06:05:42 executing program 0: 06:05:42 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x0, &(0x7f0000000000)) 06:05:42 executing program 2: 06:05:42 executing program 1: 06:05:43 executing program 5: 06:05:43 executing program 0: 06:05:43 executing program 4: 06:05:43 executing program 1: 06:05:43 executing program 2: 06:05:43 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, 0x0) 06:05:43 executing program 0: 06:05:43 executing program 5: 06:05:43 executing program 4: 06:05:43 executing program 1: 06:05:43 executing program 2: 06:05:43 executing program 0: 06:05:43 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, 0x0) 06:05:43 executing program 4: 06:05:43 executing program 1: 06:05:43 executing program 5: 06:05:43 executing program 2: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000140)="5500000018007f5f00fe01b2a4a280930206000100000001020b00000a0007003500280014000000090005407f", 0x2d}], 0x1}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe2, 0x0) 06:05:43 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1d00000066000d01988f00"/20, @ANYRES32=0x0, @ANYBLOB='\x00'/12], 0x24}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492700, 0x0) 06:05:43 executing program 3: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x8936, 0x0) 06:05:43 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) 06:05:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") setsockopt$sock_int(r0, 0x1, 0x15, &(0x7f0000000000)=0x8, 0xac259267093d46b4) [ 280.922949][ T9729] netlink: 'syz-executor.2': attribute type 7 has an invalid length. [ 280.974646][ T9729] netlink: 'syz-executor.2': attribute type 5 has an invalid length. [ 281.033086][ T9729] netlink: 33 bytes leftover after parsing attributes in process `syz-executor.2'. 06:05:44 executing program 5: sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/115, 0x73}, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000000)=0xfdbf, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000440)=')', 0xff81}], 0x1) 06:05:44 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x67) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000013, &(0x7f0000000100), 0x4) sendmsg$sock(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000000c0)="87", 0x1}], 0x1, &(0x7f0000000500)=[@mark={{0x14}}], 0xf}, 0x0) 06:05:44 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916", 0xa8}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b9", 0x81}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3ab89005", 0x36}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb1b6dd9cbb15057d1eb6019982908ad76ae12250e65180e891e80bfab56c07547f640e7cd340f64f3719eb591609122f2defbad261a5a3be5623c92a98c0094ee2ef8afb27360c81dabb140dbfb63ed0e", 0x71}, {&(0x7f0000000700)="695e42ef489599f52be821aaa3b46dbf4110dde425ec0a937e79cd82d775a8b087f5158afc2a2ebdcab88fb140e3e7544a69d69f5e50a28328b2ef90bc40a031eda0f16b41d27865d2fcc08dd2e9234a4421dcecff37839eded078b491a64859dd980649398b1ca6a79800", 0x6b}], 0x9}}], 0x1, 0x0) 06:05:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socket(0x400000000000010, 0x802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000000), 0xac259267093d46b4) 06:05:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x0, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed", 0xe) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") setsockopt$sock_int(r0, 0x1, 0x2b, &(0x7f0000000000)=0x8, 0xac259267093d46b4) 06:05:44 executing program 5: sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=""/115, 0x73}, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000000)=0xfdbf, 0x4) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000440)=')', 0xff81}], 0x1) 06:05:44 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000500)=[{&(0x7f00000002c0)='\n', 0x1}], 0x1) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") 06:05:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r1 = socket$inet(0x2, 0x3, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000140)="080db5055e0bcfe8478071") setsockopt$inet_group_source_req(r0, 0x0, 0x2a, &(0x7f0000000100)={0x8, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) 06:05:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socket(0x400000000000010, 0x802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000000), 0xac259267093d46b4) 06:05:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000440)={0x48, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:net\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x48}}, 0x0) 06:05:44 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000500)=[{&(0x7f00000002c0)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377bd7b3eb23d9008f0c69b08db538753bcf550f05d219f8c6ca03228dd8d293261ba079190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e", 0x74}, {&(0x7f0000000840)="b5252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d88107b89a1516610f2003d59c73b5c7e008a287d2a1d473414b1adeb4ca87742298b064ae974e919c80525175804799682d67fca4f9defe5754c03f", 0x55}, {&(0x7f0000001840)="dfaea417b69dcadd4ef02628764693a4a377b2d6b627909090b7c13362cf90b96dae2bd98203c57b57325186e4a8afb1ab8a50dd3e2b878eeab6f9aca299660527620e7479805034cc76733675948f0fae2f03abde30fb4574e4d98cb7d80ac403f4cc83e28fa7f71e809e34e30f45e33656b2d8d179e457cd07480e0151956c76fca3da673d428454a1fece3d8354b653e3048c3f204d902b13954c8a354eba9c5d83945524183b5785a66556e4aac4ab638b1cee4fad587c435663b7d6e722a1c615d98f6552d65eea8891d6b6025c090556905ec1933da15742be69288abd8f4900a4451475ff647a402c5a98d99bf30ebd93d62322120460e5a3a2596eee981835d7cabd154e1534faf1a044bdbf863f33983d1815103faf57090c74489d6bc8fd3de679287a71251fb7b422c0ca2416b834e67f10e5c67e5608896ceea7e276d7a57889ae0f5202e7b860c18bdeb5c2c57931ae3b03f0ac21374a9b28b2caac583999d41c0d7ecee853379e32780fe0b83b68edcc8544ae118e97b499c675914f8915505879f84b28ec14da277ebd24d428918a102b8a17d02c6adb07ac1a8cfa88aa351b9d08806e2bd117b989b2b12c281ffbd16a5e51e6dd820aff131a8ce8c1b544103865b3336ddf6dd8f62771bc3f79bb654963a50a9b03d90689a9bb3d5995cde428d995c951ca42aca7e801cce8bd58b27ff78b1baa72550dc861333ec637", 0x205}], 0x3) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") r2 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) setsockopt$sock_attach_bpf(r2, 0x1, 0x1600bd61, &(0x7f00000001c0), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000480)) r3 = accept4(0xffffffffffffffff, &(0x7f0000001840)=@xdp, &(0x7f0000000100)=0xfffffffffffffddc, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000004100)={{{@in6=@initdev, @in6=@ipv4={[], [], @dev}}}, {{@in6}, 0x0, @in6=@initdev}}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001fde), 0x1) socket$nl_generic(0x10, 0x3, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) r4 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x1600bd61, &(0x7f00000001c0), 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r5, 0x29, 0x40, &(0x7f0000001fde), 0x1) socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x0, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000003c0), 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r7, 0x6, 0x22, &(0x7f00000017c0), &(0x7f0000001800)=0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x1600bd61, &(0x7f00000001c0), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000480)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004100)={{{@in6=@initdev, @in6=@ipv4={[], [], @dev}}}, {{@in6}, 0x0, @in6=@initdev}}, 0x0) getgid() setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 06:05:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:44 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='veth1_to_team\x00', 0x10) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x10) 06:05:44 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000240)=@raw={'raw\x00', 0x2, 0x3, 0x250, 0x0, 0x0, 0x98, 0x98, 0x98, 0x1b8, 0x1b8, 0x1b8, 0x1b8, 0x1b8, 0x3, 0x0, {[{{@ip={@rand_addr, @loopback, 0x0, 0x0, 'veth1_to_hsr\x00', 'bond0\x00'}, 0x0, 0x70, 0x98}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x0, 0x7}}}}, {{@ip={@multicast2, @remote, 0x0, 0x0, 'vlan0\x00', 'nr0\x00'}, 0x0, 0xc0, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2b0) socket$netlink(0x10, 0x3, 0x0) 06:05:44 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socket(0x400000000000010, 0x802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000000), 0xac259267093d46b4) 06:05:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) [ 282.024496][ T9805] Cannot find add_set index 0 as target [ 282.059993][ T9805] Cannot find add_set index 0 as target 06:05:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socket(0x400000000000010, 0x802, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000000), 0xac259267093d46b4) [ 282.322693][ T21] tipc: TX() has been purged, node left! 06:05:45 executing program 4: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @rand_addr="ff3e6808e92b7abafc47d822996f60e4"}, 0x1c) sendmmsg(r0, &(0x7f0000006d00)=[{{0x0, 0x1002000, 0x0, 0x0, 0x0, 0x0, 0x6000}}], 0x400000000000027, 0x0) 06:05:45 executing program 2: socket(0x0, 0x0, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x7, 0x4031, 0xffffffffffffffff, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept(r1, 0x0, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f00000000c0)=0x7, 0x4) recvmsg(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=""/250, 0xfa}, 0x0) write$binfmt_elf32(r2, &(0x7f00000028c0)=ANY=[@ANYBLOB="7f"], 0x1) 06:05:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f00000005c0)={&(0x7f0000000240)={0x2, 0x4e23, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000480)=[@ip_retopts={{0x10}}], 0x10}, 0x1f4) [ 282.452687][ T21] tipc: TX() has been purged, node left! [ 282.602736][ T21] tipc: TX() has been purged, node left! 06:05:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000500)=[{&(0x7f00000002c0)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377bd7b3eb23d9008f0c69b08db538753bcf550f05d219f8c6ca03228dd8d293261ba079190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e", 0x74}, {&(0x7f0000000840)="b5252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d88107b89a1516610f2003d59c73b5c7e008a287d2a1d473414b1adeb4ca87742298b064ae974e919c80525175804799682d67fca4f9defe5754c03f", 0x55}, {&(0x7f0000001840)="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", 0x205}], 0x3) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") r2 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) setsockopt$sock_attach_bpf(r2, 0x1, 0x1600bd61, &(0x7f00000001c0), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000480)) r3 = accept4(0xffffffffffffffff, &(0x7f0000001840)=@xdp, &(0x7f0000000100)=0xfffffffffffffddc, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000004100)={{{@in6=@initdev, @in6=@ipv4={[], [], @dev}}}, {{@in6}, 0x0, @in6=@initdev}}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001fde), 0x1) socket$nl_generic(0x10, 0x3, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) r4 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x1600bd61, &(0x7f00000001c0), 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r5, 0x29, 0x40, &(0x7f0000001fde), 0x1) socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x0, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000003c0), 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r7, 0x6, 0x22, &(0x7f00000017c0), &(0x7f0000001800)=0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x1600bd61, &(0x7f00000001c0), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000480)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004100)={{{@in6=@initdev, @in6=@ipv4={[], [], @dev}}}, {{@in6}, 0x0, @in6=@initdev}}, 0x0) getgid() setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 06:05:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socket(0x400000000000010, 0x802, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000000), 0xac259267093d46b4) 06:05:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x6, 0x0, 0x0) dup2(r0, r4) dup3(r4, r1, 0x0) 06:05:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x21, &(0x7f0000000000), 0x8) dup2(r0, r4) dup3(r4, r1, 0x0) 06:05:45 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x2, 0x0, 0x0, 0xff}, 0x3c) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) 06:05:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:45 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) socket(0x400000000000010, 0x802, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000000), 0xac259267093d46b4) [ 282.792693][ T21] tipc: TX() has been purged, node left! 06:05:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) [ 282.933535][ T21] tipc: TX() has been purged, node left! 06:05:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x6, 0x0, 0x0) dup2(r0, r4) dup3(r4, r1, 0x0) 06:05:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x21, &(0x7f0000000000), 0x8) dup2(r0, r4) dup3(r4, r1, 0x0) 06:05:46 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f00000003c0)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000500)=[{&(0x7f00000002c0)="0a99b3e3930870dcd4c6d68e6abe088af4ccdbe6dc85ed63bcee4834cd53f8a19cfad53574230c17377bd7b3eb23d9008f0c69b08db538753bcf550f05d219f8c6ca03228dd8d293261ba079190f47d70c95a97fe5d4cb7511e180f73e8ef5e2f7ee4f47c1a036e37e87414e615396eeb918828e", 0x74}, {&(0x7f0000000840)="b5252522629f34a16eef84ce1b0063a44d2793e337dc2c6bb2d88107b89a1516610f2003d59c73b5c7e008a287d2a1d473414b1adeb4ca87742298b064ae974e919c80525175804799682d67fca4f9defe5754c03f", 0x55}, {&(0x7f0000001840)="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", 0x205}], 0x3) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe8478071") r2 = socket(0x80000000000000a, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) setsockopt$sock_attach_bpf(r2, 0x1, 0x1600bd61, &(0x7f00000001c0), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000480)) r3 = accept4(0xffffffffffffffff, &(0x7f0000001840)=@xdp, &(0x7f0000000100)=0xfffffffffffffddc, 0x800) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000004100)={{{@in6=@initdev, @in6=@ipv4={[], [], @dev}}}, {{@in6}, 0x0, @in6=@initdev}}, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001fde), 0x1) socket$nl_generic(0x10, 0x3, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x8}, 0x1c) r4 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$sock_attach_bpf(r4, 0x1, 0x1600bd61, &(0x7f00000001c0), 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r5, 0x29, 0x40, &(0x7f0000001fde), 0x1) socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x0, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000003c0), 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r7, 0x6, 0x22, &(0x7f00000017c0), &(0x7f0000001800)=0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r8 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$sock_attach_bpf(r8, 0x1, 0x1600bd61, &(0x7f00000001c0), 0x4) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000480)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004100)={{{@in6=@initdev, @in6=@ipv4={[], [], @dev}}}, {{@in6}, 0x0, @in6=@initdev}}, 0x0) getgid() setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) [ 283.095587][ T21] tipc: TX() has been purged, node left! [ 283.222742][ T21] tipc: TX() has been purged, node left! [ 283.412741][ T21] tipc: TX() has been purged, node left! [ 283.572789][ T21] tipc: TX() has been purged, node left! 06:05:46 executing program 0: pipe(0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r1, 0x5607, 0x3) 06:05:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000000), 0xac259267093d46b4) 06:05:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x6, 0x0, 0x0) dup2(r0, r4) dup3(r4, r1, 0x0) 06:05:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x21, &(0x7f0000000000), 0x8) dup2(r0, r4) dup3(r4, r1, 0x0) 06:05:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:46 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000000), 0xac259267093d46b4) [ 283.752763][ T21] tipc: TX() has been purged, node left! 06:05:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x21, &(0x7f0000000000), 0x8) dup2(r0, r4) dup3(r4, r1, 0x0) 06:05:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x6, 0x0, 0x0) dup2(r0, r4) dup3(r4, r1, 0x0) [ 283.915613][ T21] tipc: TX() has been purged, node left! 06:05:47 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000000), 0xac259267093d46b4) 06:05:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) [ 284.052779][ T21] tipc: TX() has been purged, node left! [ 284.213509][ T21] tipc: TX() has been purged, node left! [ 284.402736][ T21] tipc: TX() has been purged, node left! 06:05:47 executing program 0: pipe(0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r1, 0x5607, 0x3) 06:05:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x21, &(0x7f0000000000), 0x8) dup2(r0, r4) 06:05:47 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000000), 0xac259267093d46b4) 06:05:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x6, 0x0, 0x0) dup2(r0, r4) 06:05:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) [ 284.582696][ T21] tipc: TX() has been purged, node left! 06:05:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:47 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000000), 0xac259267093d46b4) 06:05:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) [ 284.752751][ T21] tipc: TX() has been purged, node left! 06:05:47 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) [ 284.912727][ T21] tipc: TX() has been purged, node left! [ 285.052735][ T21] tipc: TX() has been purged, node left! 06:05:48 executing program 0: pipe(0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCXONC(r1, 0x5607, 0x3) 06:05:48 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000000), 0xac259267093d46b4) 06:05:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x6, 0x0, 0x0) dup2(r0, r4) 06:05:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x21, &(0x7f0000000000), 0x8) dup2(r0, r4) 06:05:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:48 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000000), 0xac259267093d46b4) 06:05:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:48 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:49 executing program 0: 06:05:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x6, 0x0, 0x0) dup2(r0, r4) 06:05:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x21, &(0x7f0000000000), 0x8) dup2(r0, r4) 06:05:49 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000000), 0xac259267093d46b4) 06:05:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000), 0xac259267093d46b4) 06:05:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:49 executing program 0: 06:05:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:49 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000), 0xac259267093d46b4) 06:05:49 executing program 0: 06:05:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:50 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x6, 0x0, 0x0) dup3(r3, r0, 0x0) 06:05:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000000), 0xac259267093d46b4) 06:05:50 executing program 0: 06:05:50 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(0xffffffffffffffff, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:50 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:50 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x21, &(0x7f0000000000), 0x8) dup3(r3, r0, 0x0) 06:05:50 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(0xffffffffffffffff, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:50 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r0, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, 0x0, 0x0) 06:05:50 executing program 0: 06:05:50 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x21, &(0x7f0000000000), 0x8) dup3(r3, r0, 0x0) 06:05:50 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x6, 0x0, 0x0) dup3(r3, r0, 0x0) 06:05:50 executing program 5: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(0xffffffffffffffff, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:50 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r0, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:50 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, 0x0, 0x0) 06:05:51 executing program 0: 06:05:51 executing program 4: bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r0 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r0, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x10, 0x0, 0x0) 06:05:51 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x21, &(0x7f0000000000), 0x8) dup3(r3, r0, 0x0) 06:05:51 executing program 0: getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) 06:05:51 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x6, 0x0, 0x0) dup3(r3, r0, 0x0) 06:05:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:51 executing program 1: syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x0) 06:05:51 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000040)=0x14c) setuid(r1) 06:05:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x21, &(0x7f0000000000), 0x8) dup2(r0, r4) dup3(r4, r1, 0x0) 06:05:51 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x6, 0x0, 0x0) dup2(r0, r4) dup3(r4, r1, 0x0) 06:05:51 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000006}, 0x20) 06:05:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:51 executing program 0: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9}, 0x20) 06:05:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x6, 0x0, 0x0) dup2(r0, r4) dup3(r4, r1, 0x0) 06:05:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000), 0x8) dup2(r0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) 06:05:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$nl80211(0x0) socket$nl_route(0x10, 0x3, 0x0) uname(&(0x7f0000000280)=""/1) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$FUSE_DIRENTPLUS(r2, 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) 06:05:52 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, [0x2e]}, 0x3c) 06:05:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x6, 0x0, 0x0) dup2(r0, r4) dup3(r4, r1, 0x0) 06:05:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000), 0x8) dup2(r0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) [ 289.414605][ T27] kauditd_printk_skb: 3 callbacks suppressed [ 289.414628][ T27] audit: type=1804 audit(1578722752.480:44): pid=10191 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir676380514/syzkaller.ekdzIn/120/bus" dev="sda1" ino=16818 res=1 06:05:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:52 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) sync_file_range(r0, 0x0, 0x0, 0x0) 06:05:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000), 0x8) dup2(r0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) [ 289.602288][ T27] audit: type=1804 audit(1578722752.660:45): pid=10204 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir676380514/syzkaller.ekdzIn/120/bus" dev="sda1" ino=16818 res=1 06:05:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) 06:05:52 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:53 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) lseek(r0, 0x4200, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffb) 06:05:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) 06:05:53 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001280)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000180)='w', 0x0}, 0x40) 06:05:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x21, &(0x7f0000000000), 0x8) dup2(r0, r3) dup3(r3, r1, 0x0) 06:05:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) [ 290.168737][ T27] audit: type=1804 audit(1578722753.230:46): pid=10238 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir676380514/syzkaller.ekdzIn/121/bus" dev="sda1" ino=16822 res=1 06:05:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) dup3(0xffffffffffffffff, r1, 0x0) [ 290.301106][ T27] audit: type=1804 audit(1578722753.230:47): pid=10238 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir676380514/syzkaller.ekdzIn/121/bus" dev="sda1" ino=16822 res=1 06:05:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x21, &(0x7f0000000000), 0x8) dup2(r0, r3) dup3(r3, r1, 0x0) 06:05:53 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) [ 290.432434][ T27] audit: type=1804 audit(1578722753.230:48): pid=10238 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir676380514/syzkaller.ekdzIn/121/bus" dev="sda1" ino=16822 res=1 06:05:53 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x200, 0x0) r1 = dup(r0) ioctl$KDSKBENT(r1, 0x4b47, 0x0) 06:05:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) [ 290.922511][ T27] audit: type=1804 audit(1578722753.980:49): pid=10271 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.0" name="/root/syzkaller-testdir676380514/syzkaller.ekdzIn/121/bus" dev="sda1" ino=16822 res=1 [ 290.949784][ T27] audit: type=1804 audit(1578722753.980:50): pid=10271 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir676380514/syzkaller.ekdzIn/121/bus" dev="sda1" ino=16822 res=1 [ 290.976800][ T27] audit: type=1804 audit(1578722753.980:51): pid=10238 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir676380514/syzkaller.ekdzIn/121/bus" dev="sda1" ino=16822 res=1 [ 291.004762][ T27] audit: type=1804 audit(1578722753.980:52): pid=10271 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir676380514/syzkaller.ekdzIn/121/bus" dev="sda1" ino=16822 res=1 06:05:54 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) lseek(r0, 0x4200, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffb) 06:05:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x6, 0x0, 0x0) dup2(r0, r3) dup3(r3, r1, 0x0) 06:05:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x21, &(0x7f0000000000), 0x8) dup2(r0, r3) dup3(r3, r1, 0x0) 06:05:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:54 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1000000000001, 0xa, 0x0, 0xffffffdf00000001}, 0x2c) 06:05:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, 0x0, 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:54 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46000) lseek(r0, 0x4200, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffb) 06:05:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x21, &(0x7f0000000000), 0x8) dup2(r0, r2) dup3(r2, r1, 0x0) 06:05:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x6, 0x0, 0x0) dup2(r0, r3) dup3(r3, r1, 0x0) [ 291.297938][ T27] audit: type=1804 audit(1578722754.360:53): pid=10285 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir676380514/syzkaller.ekdzIn/122/bus" dev="sda1" ino=16844 res=1 06:05:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:55 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001280)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000180)='w', &(0x7f00000001c0)}, 0x40) 06:05:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x21, &(0x7f0000000000), 0x8) dup2(r0, r2) dup3(r2, r1, 0x0) 06:05:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup(r2) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x6, 0x0, 0x0) dup2(r0, r3) dup3(r3, r1, 0x0) 06:05:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080)="ad56b6cc0400fbab65d8b4ac2ca35c81", 0x10) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:55 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r0, 0x4200, 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x0, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) r2 = open(&(0x7f0000000040)='./bus\x00', 0x14107e, 0x0) write$binfmt_aout(r2, &(0x7f0000000100)=ANY=[], 0x49f) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x8080fffffffe) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r0, r3, 0x0, 0x8400fffffffb) 06:05:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x21, &(0x7f0000000000), 0x8) dup2(r0, r2) dup3(r2, r1, 0x0) 06:05:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000), 0x32a) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x6, 0x0, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) 06:05:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:05:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) 06:05:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x21, &(0x7f0000000000), 0x8) dup2(r0, r3) dup3(r3, r1, 0x0) 06:05:55 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'vmac64(aes-generic)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f0000005c80)=[{{0x0, 0x0, &(0x7f0000000800)=[{&(0x7f00000000c0)="5831255624c13e4c563f221188b6be66ea9a385f63589f00876b2143a7c28f6b7aef54961f263facdad7e4d891c47d3c7c9e", 0x32}, {&(0x7f0000000200)="ad9345d7cfb49a29a802bfc102816af171c1057bd354f4baac5e507cee4553bebd21d483a73e0acf595ce5b7aaca6f2cc62e37e909d1f99d53ccdea3099cb729674fea678878e7fb6fb318e90c62c84c62b2e2a7167d320798235e8f87f3578c4328c535fb522bc68913416e141c3650465aa75777f9a6e2b51f3bd82e5bfe0c5e04c67672f0a9ef9c451f21c3c905f3106d411c5ee7f3df140baa9a4d9fb5ead92ecd84bd7ccf045c9b8649d3aac532cd75e3a0b3dd8e00a9085c3ee86bdccfeb46d5424377320ce7d89ee88d0654bbbe4dee5419daccb55b77b667f34ed951a295c5f29729901799a073a3e21e8ed830f029084f", 0xf5}, {&(0x7f0000000300)="0b4f1f504a9dd25e18bf4c446fdff4c86ee059d39aa44f808fa53df8efed9bf1dd67c08db8426030e4564372d7bc3c16b6eab50a012cf6b930677f8255b76b920c5635646a8a266fe677b6922f223a52871209ad9c8fe9194cde24765fcd9187911fdffc8be7b96fa1769fdce78f3e4ea3fd51d888ee6932a763bca03c59a47cab4444e9d347b74bb1228c84ba9218ac6037b3a1492236a1455e39216b2b3bc8ac07866552cc3916aea5a473453b0845139ea73f3f5a2d11a4850cf8e65c78aa6a10c8a430fead2d21f03440768e14540ac86d63edf74a825541e3d99a957f2ab09b851fe6848ce399080bc2a804f4be41de12", 0xf3}, {&(0x7f0000000400)="d64dabc16339b686042a57f2571858e0bb3774b66f8febd0c8d8811fa03ef88f94341685e945100cc6a393d191751e68141140dda110238138944f10bff1b30f67226e31ad8395e844f2d51dd54f43608f4e5930eeeba4995e2e2177d124b900a94dae92518e7708b3fecfc38ea831608597ac91b5f42af9f73a8a50e1e27df5d92a31a7f17231dc4aebacf37a3f1ddbad26547be664df4629fdd990fbeeb342747d7ae80b9656b32f6c783fdbbc3d014b9ef130c5c19a5227", 0xb9}, {&(0x7f00000004c0)="f093c71b199bc8914dbbf17842a169722e2f3397e7713a6aba074a122202bdab7fdcc0664ef487c847ab391c71c97446a09cbeeb03a9871bb755ca43851c70d0bc48e8eb789d50db2569aa9be309c9eb7960e5dca3af7c794620b6868a61c5dd3c2bc31e1289ad5756226c7ad172e1de5e89aad45f7f7aecc72dbd4218ae7b31b91f7b7323d25e2f32baebf037930c0678b3408c610ab7342344ac25ffde9348c0b76dd139c03f82393e9c3f", 0xac}, {&(0x7f0000000100)="ea8aa5e1c5ebd4a24ade9a25de26bd81741ac92e6df300d661fd7b6c1494dd8ed3fe3c1b4ad835540ef46678dab15bf5307b3a", 0x33}, {&(0x7f00000005c0)="15a6258f2cdab8ca5bc07c7b818aba11676e344b2fc6e59eba4ab61d9cca8ed4f60bf761ee8fce460194522477b1ff16144d013e52c9d10128e7eabef58d", 0x3e}, {&(0x7f0000000640)="c05ec662c33d6cc84901509fa40856bddb69f2dabfdfae78721f4b9e6c17da0ccb", 0x21}], 0x8}}], 0x1, 0x0) 06:05:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="200000001000050700"/20, @ANYRES32=0x0, @ANYBLOB='\t'], 0x20}}, 0x0) 06:05:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000480)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000300)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0xe, &(0x7f0000013ff4)=@assoc_value, &(0x7f0000002000)=0xff0a) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x6, 0x0, 0x0) dup2(r0, r2) dup3(r2, r1, 0x0) 06:05:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x32a) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) write$binfmt_script(r0, &(0x7f0000000a40)=ANY=[@ANYBLOB='<'], 0x1) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) recvfrom(r0, &(0x7f00000003c0)=""/183, 0xb7, 0x160, 0x0, 0xffc1) [ 293.596370][T10346] ================================================================== [ 293.604502][T10346] BUG: KCSAN: data-race in ext4_da_write_end / ext4_writepages [ 293.612020][T10346] [ 293.614340][T10346] write to 0xffff8880b594ba10 of 8 bytes by task 10343 on cpu 0: [ 293.622061][T10346] ext4_writepages+0x158c/0x2500 [ 293.626982][T10346] do_writepages+0x6b/0x170 [ 293.631470][T10346] __filemap_fdatawrite_range+0x1c5/0x230 [ 293.637169][T10346] filemap_flush+0x2d/0x40 [ 293.641598][T10346] ext4_alloc_da_blocks+0x78/0x180 [ 293.646703][T10346] ext4_release_file+0x10d/0x210 [ 293.651638][T10346] __fput+0x1e1/0x520 [ 293.655608][T10346] ____fput+0x1f/0x30 [ 293.659603][T10346] task_work_run+0xf6/0x130 [ 293.664098][T10346] exit_to_usermode_loop+0x2b4/0x2c0 [ 293.669366][T10346] do_syscall_64+0x384/0x3a0 [ 293.673943][T10346] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 293.679828][T10346] [ 293.682165][T10346] read to 0xffff8880b594ba10 of 8 bytes by task 10346 on cpu 1: [ 293.689777][T10346] ext4_da_write_end+0xd0/0x620 [ 293.694611][T10346] generic_perform_write+0x1d3/0x320 [ 293.699877][T10346] ext4_buffered_write_iter+0x143/0x290 [ 293.705426][T10346] ext4_file_write_iter+0xf4/0xd40 [ 293.710622][T10346] do_iter_readv_writev+0x487/0x5b0 [ 293.715811][T10346] do_iter_write+0x13b/0x3c0 [ 293.720388][T10346] vfs_iter_write+0x5c/0x80 [ 293.725581][T10346] iter_file_splice_write+0x530/0x840 [ 293.730934][T10346] direct_splice_actor+0xa0/0xc0 [ 293.735853][T10346] splice_direct_to_actor+0x22b/0x540 [ 293.741210][T10346] do_splice_direct+0x161/0x1e0 [ 293.746044][T10346] do_sendfile+0x384/0x7f0 [ 293.750445][T10346] __x64_sys_sendfile64+0x12a/0x140 [ 293.755644][T10346] do_syscall_64+0xcc/0x3a0 [ 293.760504][T10346] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 293.766419][T10346] [ 293.768797][T10346] Reported by Kernel Concurrency Sanitizer on: [ 293.774947][T10346] CPU: 1 PID: 10346 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 293.783606][T10346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.793646][T10346] ================================================================== [ 293.801696][T10346] Kernel panic - not syncing: panic_on_warn set ... [ 293.808272][T10346] CPU: 1 PID: 10346 Comm: syz-executor.1 Not tainted 5.5.0-rc1-syzkaller #0 [ 293.816935][T10346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.826982][T10346] Call Trace: [ 293.830306][T10346] dump_stack+0x11d/0x181 [ 293.834639][T10346] panic+0x210/0x640 [ 293.838578][T10346] ? vprintk_func+0x8d/0x140 [ 293.843157][T10346] kcsan_report.cold+0xc/0xd [ 293.847732][T10346] kcsan_setup_watchpoint+0x3fe/0x460 [ 293.853093][T10346] __tsan_read8+0xc6/0x100 [ 293.857495][T10346] ext4_da_write_end+0xd0/0x620 [ 293.862439][T10346] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 293.868667][T10346] ? iov_iter_copy_from_user_atomic+0x330/0x910 [ 293.874898][T10346] ? ext4_write_end+0x800/0x800 [ 293.879734][T10346] generic_perform_write+0x1d3/0x320 [ 293.885021][T10346] ext4_buffered_write_iter+0x143/0x290 [ 293.890575][T10346] ext4_file_write_iter+0xf4/0xd40 [ 293.895673][T10346] ? common_file_perm+0x1d5/0x490 [ 293.900687][T10346] do_iter_readv_writev+0x487/0x5b0 [ 293.906689][T10346] do_iter_write+0x13b/0x3c0 [ 293.911269][T10346] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 293.917165][T10346] vfs_iter_write+0x5c/0x80 [ 293.921655][T10346] iter_file_splice_write+0x530/0x840 [ 293.927020][T10346] ? page_cache_pipe_buf_release+0x100/0x100 [ 293.932987][T10346] direct_splice_actor+0xa0/0xc0 [ 293.937911][T10346] splice_direct_to_actor+0x22b/0x540 [ 293.943265][T10346] ? generic_pipe_buf_nosteal+0x20/0x20 [ 293.948804][T10346] do_splice_direct+0x161/0x1e0 [ 293.953654][T10346] do_sendfile+0x384/0x7f0 [ 293.958063][T10346] __x64_sys_sendfile64+0x12a/0x140 [ 293.963248][T10346] do_syscall_64+0xcc/0x3a0 [ 293.967788][T10346] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 293.973665][T10346] RIP: 0033:0x45af49 [ 293.977547][T10346] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.998096][T10346] RSP: 002b:00007f6eb789dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 294.006490][T10346] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 000000000045af49 [ 294.014445][T10346] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000003 [ 294.022403][T10346] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 294.030356][T10346] R10: 00008400fffffffb R11: 0000000000000246 R12: 00007f6eb789e6d4 [ 294.038310][T10346] R13: 00000000004c9b06 R14: 00000000004e2ae0 R15: 00000000ffffffff [ 294.047643][T10346] Kernel Offset: disabled [ 294.051971][T10346] Rebooting in 86400 seconds..