Warning: Permanently added '10.128.0.108' (ECDSA) to the list of known hosts. 2019/07/14 10:27:05 fuzzer started 2019/07/14 10:27:08 dialing manager at 10.128.0.26:39641 2019/07/14 10:27:08 syscalls: 2465 2019/07/14 10:27:08 code coverage: enabled 2019/07/14 10:27:08 comparison tracing: enabled 2019/07/14 10:27:08 extra coverage: extra coverage is not supported by the kernel 2019/07/14 10:27:08 setuid sandbox: enabled 2019/07/14 10:27:08 namespace sandbox: enabled 2019/07/14 10:27:08 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/14 10:27:08 fault injection: enabled 2019/07/14 10:27:08 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/14 10:27:08 net packet injection: enabled 2019/07/14 10:27:08 net device setup: enabled 10:27:09 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syzkaller login: [ 61.452879][ T8376] IPVS: ftp: loaded support on port[0] = 21 10:27:09 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000340)={0x9}, &(0x7f0000000380)={0x7}, 0x0, 0x0, 0x0) [ 61.559365][ T8376] chnl_net:caif_netlink_parms(): no params data found [ 61.628891][ T8376] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.638165][ T8376] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.647484][ T8376] device bridge_slave_0 entered promiscuous mode [ 61.656312][ T8376] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.665049][ T8376] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.674197][ T8376] device bridge_slave_1 entered promiscuous mode [ 61.712697][ T8376] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 61.737587][ T8376] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link 10:27:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='security.SMACK64EXEC\x00', &(0x7f00000004c0)='+selinux+}em0}!\x00', 0x10, 0x0) [ 61.775072][ T8376] team0: Port device team_slave_0 added [ 61.782668][ T8376] team0: Port device team_slave_1 added [ 61.805697][ T8379] IPVS: ftp: loaded support on port[0] = 21 [ 61.868673][ T8376] device hsr_slave_0 entered promiscuous mode [ 61.934476][ T8376] device hsr_slave_1 entered promiscuous mode [ 62.017581][ T8376] bridge0: port 2(bridge_slave_1) entered blocking state 10:27:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) [ 62.024876][ T8376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.075657][ T8376] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.094907][ T8381] IPVS: ftp: loaded support on port[0] = 21 [ 62.100138][ T8376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.342053][ T8376] 8021q: adding VLAN 0 to HW filter on device bond0 [ 62.360519][ T8385] IPVS: ftp: loaded support on port[0] = 21 [ 62.388955][ T8379] chnl_net:caif_netlink_parms(): no params data found 10:27:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x13}]}}}]}, 0x3c}}, 0x0) [ 62.453377][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 62.464044][ T3700] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.483016][ T3700] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.498952][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 62.521073][ T8376] 8021q: adding VLAN 0 to HW filter on device team0 [ 62.556544][ T8381] chnl_net:caif_netlink_parms(): no params data found [ 62.584600][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.593301][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.604693][ T3700] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.611766][ T3700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 62.621679][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.633187][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.653811][ T3700] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.660948][ T3700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 62.670906][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.729529][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.740435][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.753063][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.766131][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready 10:27:10 executing program 5: creat(&(0x7f00000000c0)='./bus\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./bus\x00', &(0x7f0000000300)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x1d, 0x0, 0x0, "00cf1854d8a17ea57f466042b4fa28c7", "0d59aaf26789d33a"}, 0x1d, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='trusted.overlay/upper\x00', 0x0, 0x0, 0x0) [ 62.779028][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.787923][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 62.799603][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 62.808746][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 62.819923][ T8379] bridge0: port 1(bridge_slave_0) entered blocking state [ 62.828892][ T8379] bridge0: port 1(bridge_slave_0) entered disabled state [ 62.840259][ T8379] device bridge_slave_0 entered promiscuous mode [ 62.850066][ T8379] bridge0: port 2(bridge_slave_1) entered blocking state [ 62.860682][ T8379] bridge0: port 2(bridge_slave_1) entered disabled state [ 62.869270][ T8379] device bridge_slave_1 entered promiscuous mode [ 62.892830][ T8389] IPVS: ftp: loaded support on port[0] = 21 [ 62.938890][ T8376] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 62.940199][ T8391] IPVS: ftp: loaded support on port[0] = 21 [ 62.954008][ T8376] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 62.981492][ T8379] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 62.991647][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 63.000275][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 63.009177][ T8381] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.016373][ T8381] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.025906][ T8381] device bridge_slave_0 entered promiscuous mode [ 63.047581][ T8379] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.061877][ T8381] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.069563][ T8381] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.077379][ T8381] device bridge_slave_1 entered promiscuous mode [ 63.128015][ T8381] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.151868][ T8379] team0: Port device team_slave_0 added [ 63.159238][ T8379] team0: Port device team_slave_1 added [ 63.179265][ T8381] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.245781][ T8379] device hsr_slave_0 entered promiscuous mode [ 63.284504][ T8379] device hsr_slave_1 entered promiscuous mode [ 63.324635][ T8379] debugfs: Directory 'hsr0' with parent '/' already present! [ 63.342098][ T8381] team0: Port device team_slave_0 added [ 63.357638][ T8385] chnl_net:caif_netlink_parms(): no params data found [ 63.378399][ T8381] team0: Port device team_slave_1 added [ 63.447065][ T8381] device hsr_slave_0 entered promiscuous mode [ 63.514230][ T8381] device hsr_slave_1 entered promiscuous mode [ 63.574041][ T8381] debugfs: Directory 'hsr0' with parent '/' already present! [ 63.608626][ T8376] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 63.637360][ T8385] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.647872][ T8385] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.656224][ T8385] device bridge_slave_0 entered promiscuous mode [ 63.673685][ T8385] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.681726][ T8385] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.691892][ T8385] device bridge_slave_1 entered promiscuous mode [ 63.855464][ T8385] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.869187][ T8385] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.882886][ T8389] chnl_net:caif_netlink_parms(): no params data found 10:27:11 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 63.914782][ T8391] chnl_net:caif_netlink_parms(): no params data found [ 63.972047][ T8389] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.980913][ T8389] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.993225][ T8389] device bridge_slave_0 entered promiscuous mode 10:27:11 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 64.019006][ T8389] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.026648][ T8389] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.035248][ T8389] device bridge_slave_1 entered promiscuous mode [ 64.051528][ T8385] team0: Port device team_slave_0 added [ 64.062505][ T8385] team0: Port device team_slave_1 added [ 64.113389][ T8379] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.150601][ T8389] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.164302][ T8381] 8021q: adding VLAN 0 to HW filter on device bond0 [ 64.171230][ T8391] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.182048][ T8391] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.189973][ T8391] device bridge_slave_0 entered promiscuous mode [ 64.205236][ T8379] 8021q: adding VLAN 0 to HW filter on device team0 10:27:12 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 64.219696][ T8389] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.236866][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.250129][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 64.258972][ T8391] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.259003][ T8391] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.280532][ T8391] device bridge_slave_1 entered promiscuous mode [ 64.328142][ T8385] device hsr_slave_0 entered promiscuous mode 10:27:12 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 64.374294][ T8385] device hsr_slave_1 entered promiscuous mode [ 64.424362][ T8385] debugfs: Directory 'hsr0' with parent '/' already present! [ 64.440158][ T8381] 8021q: adding VLAN 0 to HW filter on device team0 [ 64.467766][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 64.475815][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 10:27:12 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 64.512229][ T8389] team0: Port device team_slave_0 added [ 64.525048][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.533599][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.560009][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.567174][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.575414][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.584270][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.592701][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.599845][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state 10:27:12 executing program 0: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='/group.stat\x00', 0x2761, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 64.608253][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.626424][ T8391] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.637597][ T8391] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.656173][ T8389] team0: Port device team_slave_1 added [ 64.664219][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.673018][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.682201][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.696821][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.703954][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.713175][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.732651][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.742518][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.751092][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.758195][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.766483][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.775537][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.784289][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 64.792355][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 10:27:12 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) [ 64.814907][ T8391] team0: Port device team_slave_0 added [ 64.822086][ T8391] team0: Port device team_slave_1 added [ 64.876583][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 64.886530][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.901462][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.912126][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 64.921124][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.929916][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.938316][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.947558][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.956139][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 65.030814][ T8389] device hsr_slave_0 entered promiscuous mode [ 65.074198][ T8389] device hsr_slave_1 entered promiscuous mode [ 65.114017][ T8389] debugfs: Directory 'hsr0' with parent '/' already present! [ 65.325440][ C1] hrtimer: interrupt took 62437 ns [ 65.414324][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 65.422801][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 65.433011][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 65.441591][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 65.451144][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 65.459782][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.478449][ T8381] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 65.536077][ T8391] device hsr_slave_0 entered promiscuous mode [ 65.574514][ T8391] device hsr_slave_1 entered promiscuous mode [ 65.614112][ T8391] debugfs: Directory 'hsr0' with parent '/' already present! [ 65.629308][ T8379] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 65.640786][ T8379] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 65.678362][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 65.688203][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 65.730752][ T8385] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.858095][ T8379] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 65.894609][ T8381] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 65.901789][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 65.914139][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 65.932882][ T8385] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.010118][ T8389] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.041165][ T8391] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.049825][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.064949][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.074143][ T3700] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.081219][ T3700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.089447][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.099102][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.107768][ T3700] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.114915][ T3700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.122909][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.151480][ T8389] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.170212][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 66.187332][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 66.205073][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready 10:27:14 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) [ 66.224991][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 66.234829][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 66.247186][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 66.256251][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 66.265839][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 66.285282][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.293556][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.318918][ T8391] 8021q: adding VLAN 0 to HW filter on device team0 10:27:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='security.SMACK64EXEC\x00', &(0x7f00000004c0)='+selinux+}em0}!\x00', 0x10, 0x0) [ 66.812838][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 66.824273][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 66.832668][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 66.841249][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.850461][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.858940][ T3700] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.866052][ T3700] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.874268][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.882859][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.891338][ T3700] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.898403][ T3700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.906283][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 66.918890][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 66.927149][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 66.959703][ T8385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 66.979964][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.994682][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.005855][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 67.014864][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 67.023352][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.034530][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.043111][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.051606][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.060095][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 67.069012][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 67.077501][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.084606][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.092130][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.100854][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 67.109546][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.116652][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.124224][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 67.132810][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 67.140782][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.169921][ T8385] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.177176][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 67.186553][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.200833][ T8389] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 67.221573][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 67.241956][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 67.251222][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 67.260336][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 67.269763][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 67.278770][ T3002] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 67.292765][ T8391] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 67.307920][ T8391] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 67.323544][ T8389] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.331583][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 67.346830][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 67.356901][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 67.365484][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 67.387705][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 67.402447][ T8391] 8021q: adding VLAN 0 to HW filter on device batadv0 10:27:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) [ 67.571884][ T8470] (unnamed net_device) (uninitialized): option lp_interval: invalid value (0) [ 67.601524][ T8470] (unnamed net_device) (uninitialized): option lp_interval: allowed values 1 - 2147483647 10:27:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x13}]}}}]}, 0x3c}}, 0x0) 10:27:15 executing program 5: creat(&(0x7f00000000c0)='./bus\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./bus\x00', &(0x7f0000000300)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x1d, 0x0, 0x0, "00cf1854d8a17ea57f466042b4fa28c7", "0d59aaf26789d33a"}, 0x1d, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='trusted.overlay/upper\x00', 0x0, 0x0, 0x0) 10:27:15 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000340)={0x9}, &(0x7f0000000380)={0x7}, 0x0, 0x0, 0x0) 10:27:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='security.SMACK64EXEC\x00', &(0x7f00000004c0)='+selinux+}em0}!\x00', 0x10, 0x0) 10:27:15 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 10:27:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) [ 67.706435][ T8477] (unnamed net_device) (uninitialized): option lp_interval: invalid value (0) [ 67.731298][ T8477] (unnamed net_device) (uninitialized): option lp_interval: allowed values 1 - 2147483647 10:27:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x13}]}}}]}, 0x3c}}, 0x0) 10:27:15 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) 10:27:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='security.SMACK64EXEC\x00', &(0x7f00000004c0)='+selinux+}em0}!\x00', 0x10, 0x0) 10:27:15 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000340)={0x9}, &(0x7f0000000380)={0x7}, 0x0, 0x0, 0x0) 10:27:15 executing program 5: creat(&(0x7f00000000c0)='./bus\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./bus\x00', &(0x7f0000000300)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x1d, 0x0, 0x0, "00cf1854d8a17ea57f466042b4fa28c7", "0d59aaf26789d33a"}, 0x1d, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='trusted.overlay/upper\x00', 0x0, 0x0, 0x0) 10:27:15 executing program 2: creat(&(0x7f00000000c0)='./bus\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./bus\x00', &(0x7f0000000300)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x1d, 0x0, 0x0, "00cf1854d8a17ea57f466042b4fa28c7", "0d59aaf26789d33a"}, 0x1d, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='trusted.overlay/upper\x00', 0x0, 0x0, 0x0) 10:27:16 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000340)={0x9}, &(0x7f0000000380)={0x7}, 0x0, 0x0, 0x0) 10:27:16 executing program 3: creat(&(0x7f00000000c0)='./bus\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./bus\x00', &(0x7f0000000300)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x1d, 0x0, 0x0, "00cf1854d8a17ea57f466042b4fa28c7", "0d59aaf26789d33a"}, 0x1d, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='trusted.overlay/upper\x00', 0x0, 0x0, 0x0) 10:27:16 executing program 5: creat(&(0x7f00000000c0)='./bus\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./bus\x00', &(0x7f0000000300)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x1d, 0x0, 0x0, "00cf1854d8a17ea57f466042b4fa28c7", "0d59aaf26789d33a"}, 0x1d, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='trusted.overlay/upper\x00', 0x0, 0x0, 0x0) 10:27:16 executing program 2: creat(&(0x7f00000000c0)='./bus\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./bus\x00', &(0x7f0000000300)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x1d, 0x0, 0x0, "00cf1854d8a17ea57f466042b4fa28c7", "0d59aaf26789d33a"}, 0x1d, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='trusted.overlay/upper\x00', 0x0, 0x0, 0x0) [ 68.745345][ T8496] (unnamed net_device) (uninitialized): option lp_interval: invalid value (0) [ 68.757439][ T8496] (unnamed net_device) (uninitialized): option lp_interval: allowed values 1 - 2147483647 10:27:16 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 10:27:16 executing program 3: creat(&(0x7f00000000c0)='./bus\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./bus\x00', &(0x7f0000000300)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x1d, 0x0, 0x0, "00cf1854d8a17ea57f466042b4fa28c7", "0d59aaf26789d33a"}, 0x1d, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='trusted.overlay/upper\x00', 0x0, 0x0, 0x0) 10:27:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) 10:27:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) 10:27:16 executing program 2: creat(&(0x7f00000000c0)='./bus\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./bus\x00', &(0x7f0000000300)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x1d, 0x0, 0x0, "00cf1854d8a17ea57f466042b4fa28c7", "0d59aaf26789d33a"}, 0x1d, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='trusted.overlay/upper\x00', 0x0, 0x0, 0x0) 10:27:16 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0x9, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x13}]}}}]}, 0x3c}}, 0x0) [ 68.859712][ T8528] (unnamed net_device) (uninitialized): option lp_interval: invalid value (0) 10:27:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) [ 68.910630][ T8528] (unnamed net_device) (uninitialized): option lp_interval: allowed values 1 - 2147483647 10:27:16 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) 10:27:16 executing program 3: creat(&(0x7f00000000c0)='./bus\x00', 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./bus\x00', &(0x7f0000000300)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x1d, 0x0, 0x0, "00cf1854d8a17ea57f466042b4fa28c7", "0d59aaf26789d33a"}, 0x1d, 0x0) setxattr$trusted_overlay_upper(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000200)='trusted.overlay/upper\x00', 0x0, 0x0, 0x0) 10:27:16 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) 10:27:16 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) 10:27:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) 10:27:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) 10:27:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) 10:27:17 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) 10:27:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) 10:27:17 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) [ 69.793977][ T8538] syz-executor.0 (8538) used greatest stack depth: 16904 bytes left 10:27:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='security.SMACK64EXEC\x00', &(0x7f00000004c0)='+selinux+}em0}!\x00', 0x10, 0x0) 10:27:17 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000340)={0x9}, &(0x7f0000000380)={0x7}, 0x0, 0x0, 0x0) 10:27:17 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 10:27:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) 10:27:17 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) 10:27:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 10:27:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='security.SMACK64EXEC\x00', &(0x7f00000004c0)='+selinux+}em0}!\x00', 0x10, 0x0) 10:27:18 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 10:27:18 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000340)={0x9}, &(0x7f0000000380)={0x7}, 0x0, 0x0, 0x0) 10:27:18 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(aes-aesni)\x00'}, 0x58) mprotect(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000140), 0x14ded905162a6a4b, 0x0, 0x0, 0x429) 10:27:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_smack_entry(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='security.SMACK64EXEC\x00', &(0x7f00000004c0)='+selinux+}em0}!\x00', 0x10, 0x0) 10:27:18 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000340)={0x9}, &(0x7f0000000380)={0x7}, 0x0, 0x0, 0x0) 10:27:18 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) 10:27:18 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) [ 70.543911][ C0] sched: DL replenish lagged too much [ 71.252290][ T8611] IPVS: ftp: loaded support on port[0] = 21 10:27:19 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 10:27:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x4) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) 10:27:19 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) 10:27:19 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) [ 71.320182][ T8610] IPVS: ftp: loaded support on port[0] = 21 10:27:19 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) 10:27:19 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) [ 71.441381][ T8624] input: syz0 as /devices/virtual/input/input5 10:27:19 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) 10:27:19 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) 10:27:19 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) 10:27:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x4) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) [ 72.566973][ T8654] input: syz0 as /devices/virtual/input/input7 10:27:20 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 10:27:20 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 10:27:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x4) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) [ 72.893226][ T8665] input: syz0 as /devices/virtual/input/input8 10:27:21 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x18, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0xc, 0x2, [@IFLA_VTI_LOCAL={0x8, 0x4, @multicast2}]}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) 10:27:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x4) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) 10:27:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x4) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) 10:27:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x4) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) [ 73.846191][ T8676] input: syz0 as /devices/virtual/input/input9 10:27:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x4) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) [ 73.933663][ T8681] input: syz0 as /devices/virtual/input/input10 [ 73.966643][ T8682] input: syz0 as /devices/virtual/input/input11 [ 74.166595][ T8688] input: syz0 as /devices/virtual/input/input12 10:27:23 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) 10:27:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x4) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) 10:27:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x4) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) 10:27:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x4) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) 10:27:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x4) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) 10:27:23 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) [ 75.989044][ T8701] input: syz0 as /devices/virtual/input/input13 [ 76.006033][ T8704] input: syz0 as /devices/virtual/input/input14 [ 76.029753][ T8698] input: syz0 as /devices/virtual/input/input16 [ 76.054407][ T8702] input: syz0 as /devices/virtual/input/input15 [ 76.117999][ T8711] IPVS: ftp: loaded support on port[0] = 21 [ 76.185218][ T8708] IPVS: ftp: loaded support on port[0] = 21 10:27:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x4) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) 10:27:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x4) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) 10:27:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x4) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) 10:27:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x4) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) 10:27:24 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) [ 76.564954][ T8717] input: syz0 as /devices/virtual/input/input17 [ 76.612493][ T8723] input: syz0 as /devices/virtual/input/input18 [ 76.641047][ T8725] input: syz0 as /devices/virtual/input/input20 [ 76.649648][ T8721] input: syz0 as /devices/virtual/input/input19 10:27:24 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) 10:27:26 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) 10:27:26 executing program 5: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) 10:27:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="275a61635e0bcfec7be070") r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x4) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) 10:27:26 executing program 4: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) [ 78.199161][ T8745] IPVS: ftp: loaded support on port[0] = 21 10:27:26 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) [ 78.284695][ T8749] input: syz0 as /devices/virtual/input/input21 [ 78.320905][ T8746] IPVS: ftp: loaded support on port[0] = 21 10:27:26 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) 10:27:27 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) 10:27:27 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) 10:27:27 executing program 5: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) 10:27:27 executing program 4: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) 10:27:29 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) 10:27:29 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) [ 81.970380][ T8768] IPVS: ftp: loaded support on port[0] = 21 10:27:29 executing program 1: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) 10:27:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) 10:27:30 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) 10:27:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000100)=0xffff, 0x4) 10:27:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000100)=0xffff, 0x4) 10:27:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000100)=0xffff, 0x4) 10:27:30 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f0000000100)=0xffff, 0x4) 10:27:31 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) 10:27:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001300)={'sit0\x00', &(0x7f00000002c0)=@ethtool_dump={0x40}}) 10:27:31 executing program 5: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) 10:27:31 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) 10:27:31 executing program 4: socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) unshare(0x40000000) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) sched_setparam(0x0, &(0x7f0000000340)=0x90000) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x4e23, 0x0, 0x0, 0x0, 0x80}, {0x4, 0xffffffff80000000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3}, {0x7d61, 0x0, 0x3}, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1}, {{@in6=@remote}, 0x2, @in=@loopback, 0x0, 0x0, 0x0, 0x6}}, 0xe8) 10:27:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-intel\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 10:27:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001300)={'sit0\x00', &(0x7f00000002c0)=@ethtool_dump={0x40}}) [ 83.774185][ T8831] IPVS: ftp: loaded support on port[0] = 21 [ 83.820270][ T8832] IPVS: ftp: loaded support on port[0] = 21 10:27:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001300)={'sit0\x00', &(0x7f00000002c0)=@ethtool_dump={0x40}}) 10:27:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-intel\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 83.909467][ T8830] IPVS: ftp: loaded support on port[0] = 21 10:27:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001300)={'sit0\x00', &(0x7f00000002c0)=@ethtool_dump={0x40}}) 10:27:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-intel\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 10:27:31 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-intel\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) [ 84.655386][ T8841] IPVS: ftp: loaded support on port[0] = 21 10:27:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-intel\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 10:27:32 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-intel\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 10:27:32 executing program 2: r0 = epoll_create1(0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) 10:27:34 executing program 1: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) socket$pptp(0x18, 0x1, 0x2) 10:27:34 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) 10:27:34 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-intel\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 10:27:34 executing program 2: r0 = epoll_create1(0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) 10:27:34 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:27:34 executing program 4: r0 = epoll_create1(0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) 10:27:34 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) 10:27:34 executing program 2: r0 = epoll_create1(0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) 10:27:34 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:27:34 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:27:34 executing program 4: r0 = epoll_create1(0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) 10:27:34 executing program 1: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) socket$pptp(0x18, 0x1, 0x2) 10:27:34 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) 10:27:34 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:27:34 executing program 2: r0 = epoll_create1(0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) 10:27:34 executing program 4: r0 = epoll_create1(0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000140)) 10:27:34 executing program 1: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) socket$pptp(0x18, 0x1, 0x2) 10:27:34 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:27:35 executing program 0: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) socket$pptp(0x18, 0x1, 0x2) 10:27:35 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:27:35 executing program 1: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) socket$pptp(0x18, 0x1, 0x2) 10:27:35 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:27:35 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:27:35 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:27:35 executing program 0: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) socket$pptp(0x18, 0x1, 0x2) 10:27:35 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:27:35 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:27:35 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:27:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xc, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 10:27:35 executing program 0: prlimit64(0x0, 0x7, &(0x7f0000000180), 0x0) socket$pptp(0x18, 0x1, 0x2) 10:27:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffff9c}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0x1de, &(0x7f0000000340)=""/207}, 0x48) 10:27:35 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:27:35 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:27:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xc, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 10:27:35 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:27:35 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x8ffd0000}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 10:27:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xc, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 10:27:35 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffff9c}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0x1de, &(0x7f0000000340)=""/207}, 0x48) 10:27:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r0, 0x0, [0x302e, 0xa, 0x300, 0x0, 0x6000000]}, 0x2c) 10:27:35 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000240)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) 10:27:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r0, 0x0, [0x302e, 0xa, 0x300, 0x0, 0x6000000]}, 0x2c) 10:27:36 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x7, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0xc, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0x1ab, &(0x7f000000cf3d)=""/195}, 0x48) 10:27:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x8ffd0000}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 10:27:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r0, 0x0, [0x302e, 0xa, 0x300, 0x0, 0x6000000]}, 0x2c) 10:27:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffff9c}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0x1de, &(0x7f0000000340)=""/207}, 0x48) 10:27:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r0, 0x0, [0x302e, 0xa, 0x300, 0x0, 0x6000000]}, 0x2c) 10:27:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x8ffd0000}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 10:27:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r0, 0x0, [0x302e, 0xa, 0x300, 0x0, 0x6000000]}, 0x2c) 10:27:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:36 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffff9c}}, &(0x7f00000002c0)='syzkaller\x00', 0x1, 0x1de, &(0x7f0000000340)=""/207}, 0x48) 10:27:36 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x8}, [@ldst={0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x8ffd0000}]}, &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 10:27:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r0, 0x0, [0x302e, 0xa, 0x300, 0x0, 0x6000000]}, 0x2c) 10:27:36 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x7e, 0x1, 0x3}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000214fd4)={0xc, 0x4, 0x4, 0x234, 0x0, r0, 0x0, [0x302e, 0xa, 0x300, 0x0, 0x6000000]}, 0x2c) 10:27:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") clone(0x200500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000001c0)={@in6={{0xa, 0x0, 0x0, @remote}}, 0x0, 0x1, 0x0, "0d77bded7125338de47145b71f2226c0b6950feba57b7d52d9e6d13509bb602e4818224696dafe09c25ed1d5e1e8dd9525d4425e2c4707a00f8dd47a4c19b884282e4f743e00c7a3eff599b13d518d10"}, 0xd8) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x2, 0x4) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x80}, 0x1c) sendto$inet6(r1, &(0x7f00000005c0), 0xfffffffffffffee0, 0x0, 0x0, 0xb6) 10:27:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:39 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 10:27:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:39 executing program 1: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:39 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 10:27:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:39 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 10:27:39 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 10:27:39 executing program 1: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:39 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 10:27:39 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 10:27:39 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000300)={0xa, 0x0, 0x0, @dev, 0x7}, 0xffffffffffffff31) close(r0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x141042, 0x0) ftruncate(r1, 0x88001) sendfile(r0, r1, 0x0, 0x800000000024) 10:27:40 executing program 1: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:40 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 10:27:40 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:40 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:40 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:40 executing program 1: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:40 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:40 executing program 2: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:40 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:40 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000240)=0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) setpgid(0x0, r1) 10:27:40 executing program 0: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:40 executing program 2: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000240)=0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) setpgid(0x0, r1) 10:27:40 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:40 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:40 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000240)=0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) setpgid(0x0, r1) 10:27:40 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000240)=0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) setpgid(0x0, r1) 10:27:40 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000240)=0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) setpgid(0x0, r1) 10:27:40 executing program 2: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:41 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') umount2(&(0x7f00000001c0)='../file0\x00', 0x2) umount2(&(0x7f0000000700)='./file0\x00', 0x0) 10:27:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000240)=0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) setpgid(0x0, r1) 10:27:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x7, 0x2, &(0x7f00000000c0)=@raw=[@map], &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdc4, 0x10, 0x0}, 0x70) 10:27:41 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000240)=0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) setpgid(0x0, r1) 10:27:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000240)=0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) setpgid(0x0, r1) 10:27:41 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$tipc(r0, 0x0, &(0x7f0000000080)=0x10) 10:27:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x7, 0x2, &(0x7f00000000c0)=@raw=[@map], &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdc4, 0x10, 0x0}, 0x70) 10:27:41 executing program 4: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 10:27:41 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x100000, 0x0) getdents64(r0, 0x0, 0xb03351a9384be92) 10:27:41 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000240)=0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) setpgid(0x0, r1) 10:27:41 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000240)=0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) setpgid(0x0, r1) 10:27:41 executing program 4: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 10:27:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x7, 0x2, &(0x7f00000000c0)=@raw=[@map], &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdc4, 0x10, 0x0}, 0x70) 10:27:41 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x100000, 0x0) getdents64(r0, 0x0, 0xb03351a9384be92) 10:27:41 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$tipc(r0, 0x0, &(0x7f0000000080)=0x10) 10:27:41 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$tipc(r0, 0x0, &(0x7f0000000080)=0x10) 10:27:41 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x100000, 0x0) getdents64(r0, 0x0, 0xb03351a9384be92) 10:27:41 executing program 4: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 10:27:41 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$tipc(r0, 0x0, &(0x7f0000000080)=0x10) 10:27:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x7, 0x2, &(0x7f00000000c0)=@raw=[@map], &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffdc4, 0x10, 0x0}, 0x70) 10:27:41 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x100000, 0x0) getdents64(r0, 0x0, 0xb03351a9384be92) 10:27:41 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$tipc(r0, 0x0, &(0x7f0000000080)=0x10) 10:27:41 executing program 4: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 10:27:41 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x100000, 0x0) getdents64(r0, 0x0, 0xb03351a9384be92) 10:27:41 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$tipc(r0, 0x0, &(0x7f0000000080)=0x10) 10:27:41 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$tipc(r0, 0x0, &(0x7f0000000080)=0x10) 10:27:41 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x100000, 0x0) getdents64(r0, 0x0, 0xb03351a9384be92) 10:27:42 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x100000, 0x0) getdents64(r0, 0x0, 0xb03351a9384be92) 10:27:42 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x100000, 0x0) getdents64(r0, 0x0, 0xb03351a9384be92) 10:27:42 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x100000, 0x0) getdents64(r0, 0x0, 0xb03351a9384be92) 10:27:42 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x100000, 0x0) getdents64(r0, 0x0, 0xb03351a9384be92) 10:27:42 executing program 5: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 10:27:42 executing program 1: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chroot(0x0) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=rdma,', {'port'}, 0x2c, {[{@timeout={'timeout'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'osx.'}}]}}) 10:27:42 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x100000, 0x0) getdents64(r0, 0x0, 0xb03351a9384be92) 10:27:42 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) fsetxattr$security_ima(r0, &(0x7f0000002f40)='security.ima\x00', &(0x7f0000002f80)=@v1={0x21}, 0x1, 0x0) 10:27:42 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x100000, 0x0) getdents64(r0, 0x0, 0xb03351a9384be92) 10:27:42 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x100000, 0x0) getdents64(r0, 0x0, 0xb03351a9384be92) 10:27:42 executing program 5: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 10:27:42 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x100000, 0x0) getdents64(r0, 0x0, 0xb03351a9384be92) 10:27:42 executing program 1: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chroot(0x0) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=rdma,', {'port'}, 0x2c, {[{@timeout={'timeout'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'osx.'}}]}}) 10:27:42 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x100000, 0x0) getdents64(r0, 0x0, 0xb03351a9384be92) 10:27:42 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0x100000, 0x0) getdents64(r0, 0x0, 0xb03351a9384be92) 10:27:42 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) fsetxattr$security_ima(r0, &(0x7f0000002f40)='security.ima\x00', &(0x7f0000002f80)=@v1={0x21}, 0x1, 0x0) 10:27:42 executing program 5: r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 10:27:42 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) fsetxattr$security_ima(r0, &(0x7f0000002f40)='security.ima\x00', &(0x7f0000002f80)=@v1={0x21}, 0x1, 0x0) 10:27:42 executing program 3: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) fsetxattr$security_ima(r0, &(0x7f0000002f40)='security.ima\x00', &(0x7f0000002f80)=@v1={0x21}, 0x1, 0x0) 10:27:42 executing program 1: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chroot(0x0) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=rdma,', {'port'}, 0x2c, {[{@timeout={'timeout'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'osx.'}}]}}) 10:27:42 executing program 5: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chroot(0x0) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=rdma,', {'port'}, 0x2c, {[{@timeout={'timeout'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'osx.'}}]}}) 10:27:42 executing program 4: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) setresuid(r0, r0, 0x0) 10:27:42 executing program 2: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:43 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) fsetxattr$security_ima(r0, &(0x7f0000002f40)='security.ima\x00', &(0x7f0000002f80)=@v1={0x21}, 0x1, 0x0) 10:27:43 executing program 3: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) fsetxattr$security_ima(r0, &(0x7f0000002f40)='security.ima\x00', &(0x7f0000002f80)=@v1={0x21}, 0x1, 0x0) 10:27:43 executing program 4: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) setresuid(r0, r0, 0x0) 10:27:43 executing program 5: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chroot(0x0) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=rdma,', {'port'}, 0x2c, {[{@timeout={'timeout'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'osx.'}}]}}) 10:27:43 executing program 1: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chroot(0x0) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=rdma,', {'port'}, 0x2c, {[{@timeout={'timeout'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'osx.'}}]}}) 10:27:43 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) setresuid(r0, r0, 0x0) 10:27:43 executing program 3: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) fsetxattr$security_ima(r0, &(0x7f0000002f40)='security.ima\x00', &(0x7f0000002f80)=@v1={0x21}, 0x1, 0x0) 10:27:43 executing program 4: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) setresuid(r0, r0, 0x0) 10:27:43 executing program 5: creat(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chroot(0x0) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x0, &(0x7f0000000300)={'trans=rdma,', {'port'}, 0x2c, {[{@timeout={'timeout'}}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'osx.'}}]}}) 10:27:43 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) setresuid(r0, r0, 0x0) 10:27:43 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) setresuid(r0, r0, 0x0) 10:27:43 executing program 2: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:43 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) setresuid(r0, r0, 0x0) 10:27:43 executing program 0: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) setresuid(r0, r0, 0x0) 10:27:43 executing program 4: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) setresuid(r0, r0, 0x0) 10:27:43 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) setresuid(r0, r0, 0x0) 10:27:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x3, 0x4) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000440)="d483a198", 0x4}], 0x1) 10:27:43 executing program 3: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) setresuid(r0, r0, 0x0) 10:27:43 executing program 4: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:43 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) setresuid(r0, r0, 0x0) 10:27:43 executing program 0: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x3, 0x4) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000440)="d483a198", 0x4}], 0x1) 10:27:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x3, 0x4) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000440)="d483a198", 0x4}], 0x1) 10:27:44 executing program 2: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x3, 0x4) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000440)="d483a198", 0x4}], 0x1) 10:27:44 executing program 1: setreuid(0x0, 0xee00) r0 = geteuid() setreuid(r0, r0) setresuid(r0, r0, 0x0) 10:27:44 executing program 4: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:44 executing program 0: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x3, 0x4) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000440)="d483a198", 0x4}], 0x1) 10:27:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x3, 0x4) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000440)="d483a198", 0x4}], 0x1) 10:27:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x3, 0x4) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000440)="d483a198", 0x4}], 0x1) 10:27:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x3, 0x4) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000440)="d483a198", 0x4}], 0x1) 10:27:44 executing program 2: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x3, 0x4) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000440)="d483a198", 0x4}], 0x1) 10:27:44 executing program 0: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x3, 0x4) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000440)="d483a198", 0x4}], 0x1) 10:27:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x3, 0x4) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000440)="d483a198", 0x4}], 0x1) 10:27:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x3, 0x4) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000440)="d483a198", 0x4}], 0x1) 10:27:44 executing program 4: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:44 executing program 0: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x3, 0x4) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000440)="d483a198", 0x4}], 0x1) 10:27:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x3, 0x4) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000440)="d483a198", 0x4}], 0x1) 10:27:45 executing program 1: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:45 executing program 2: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x3, 0x4) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000440)="d483a198", 0x4}], 0x1) 10:27:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_udp_int(r1, 0x11, 0x67, &(0x7f0000000100)=0x3, 0x4) writev(r1, &(0x7f0000000480)=[{&(0x7f0000000440)="d483a198", 0x4}], 0x1) 10:27:45 executing program 4: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:45 executing program 0: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:45 executing program 3: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:45 executing program 5: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:45 executing program 1: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:45 executing program 2: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:45 executing program 4: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:45 executing program 5: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:45 executing program 3: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:45 executing program 1: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:45 executing program 2: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:45 executing program 0: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:46 executing program 3: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:46 executing program 1: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:46 executing program 4: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:46 executing program 0: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) 10:27:46 executing program 1: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:27:46 executing program 5: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:46 executing program 0: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) 10:27:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) 10:27:46 executing program 1: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) 10:27:46 executing program 0: openat$nullb(0xffffffffffffff9c, 0x0, 0x6, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000480)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r2, 0x0) io_setup(0x101, &(0x7f0000000040)=0x0) io_submit(r3, 0x2000000000000246, &(0x7f0000001540)=[&(0x7f0000000140)={0x3a000000, 0x2759, 0xd, 0x0, 0x0, r1, &(0x7f0000000000), 0xfffffce4}]) r4 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(r4, 0x0, 0x0) 10:27:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) 10:27:46 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) 10:27:46 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) 10:27:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:27:47 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) 10:27:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:27:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:27:47 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) 10:27:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:27:47 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r1, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) 10:27:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:27:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 10:27:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:27:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:27:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:27:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:27:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 10:27:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 10:27:47 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000001d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) 10:27:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:27:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:27:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:27:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:27:48 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000001, 0x81, 0x101, 0x8000000006, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r0, &(0x7f0000000180), 0x0}, 0x18) 10:27:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:27:48 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000001, 0x81, 0x101, 0x8000000006, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r0, &(0x7f0000000180), 0x0}, 0x18) 10:27:48 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000001, 0x81, 0x101, 0x8000000006, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r0, &(0x7f0000000180), 0x0}, 0x18) 10:27:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000001, 0x81, 0x101, 0x8000000006, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r0, &(0x7f0000000180), 0x0}, 0x18) 10:27:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000001, 0x81, 0x101, 0x8000000006, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r0, &(0x7f0000000180), 0x0}, 0x18) 10:27:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 10:27:48 executing program 1: r0 = socket$inet6(0xa, 0x80000000003, 0x80000000000000c) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00\x00\x00\x00\x80\x00', &(0x7f0000000040)=@ethtool_cmd={0xa}}) 10:27:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) 10:27:48 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000001, 0x81, 0x101, 0x8000000006, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r0, &(0x7f0000000180), 0x0}, 0x18) 10:27:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000001, 0x81, 0x101, 0x8000000006, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r0, &(0x7f0000000180), 0x0}, 0x18) 10:27:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000001, 0x81, 0x101, 0x8000000006, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r0, &(0x7f0000000180), 0x0}, 0x18) 10:27:48 executing program 5: syz_mount_image$gfs2(&(0x7f00000015c0)='gfs2\x00', &(0x7f0000001600)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)={[{@suiddir='suiddir'}, {@hostdata={'hostdata', 0x3d, '/dev/audio#\x00'}}]}) 10:27:48 executing program 1: r0 = socket$inet6(0xa, 0x80000000003, 0x80000000000000c) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00\x00\x00\x00\x80\x00', &(0x7f0000000040)=@ethtool_cmd={0xa}}) 10:27:48 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000001, 0x81, 0x101, 0x8000000006, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r0, &(0x7f0000000180), 0x0}, 0x18) 10:27:48 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x400000000000001, 0x81, 0x101, 0x8000000006, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r0, &(0x7f0000000180), 0x0}, 0x18) [ 101.027456][ T9806] gfs2: not a GFS2 filesystem 10:27:48 executing program 1: r0 = socket$inet6(0xa, 0x80000000003, 0x80000000000000c) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00\x00\x00\x00\x80\x00', &(0x7f0000000040)=@ethtool_cmd={0xa}}) 10:27:49 executing program 2: r0 = socket$inet6(0xa, 0x80000000003, 0x80000000000000c) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00\x00\x00\x00\x80\x00', &(0x7f0000000040)=@ethtool_cmd={0xa}}) [ 101.187723][ T9806] gfs2: not a GFS2 filesystem 10:27:49 executing program 3: clock_getres(0x6, &(0x7f0000000180)) 10:27:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 10:27:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 10:27:49 executing program 5: syz_mount_image$gfs2(&(0x7f00000015c0)='gfs2\x00', &(0x7f0000001600)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)={[{@suiddir='suiddir'}, {@hostdata={'hostdata', 0x3d, '/dev/audio#\x00'}}]}) 10:27:49 executing program 1: r0 = socket$inet6(0xa, 0x80000000003, 0x80000000000000c) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00\x00\x00\x00\x80\x00', &(0x7f0000000040)=@ethtool_cmd={0xa}}) 10:27:49 executing program 2: r0 = socket$inet6(0xa, 0x80000000003, 0x80000000000000c) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00\x00\x00\x00\x80\x00', &(0x7f0000000040)=@ethtool_cmd={0xa}}) 10:27:49 executing program 3: clock_getres(0x6, &(0x7f0000000180)) [ 101.486479][ T9837] gfs2: not a GFS2 filesystem 10:27:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 10:27:49 executing program 2: r0 = socket$inet6(0xa, 0x80000000003, 0x80000000000000c) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00\x00\x00\x00\x80\x00', &(0x7f0000000040)=@ethtool_cmd={0xa}}) 10:27:49 executing program 3: clock_getres(0x6, &(0x7f0000000180)) 10:27:49 executing program 5: syz_mount_image$gfs2(&(0x7f00000015c0)='gfs2\x00', &(0x7f0000001600)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)={[{@suiddir='suiddir'}, {@hostdata={'hostdata', 0x3d, '/dev/audio#\x00'}}]}) [ 101.948874][ T9862] gfs2: not a GFS2 filesystem 10:27:49 executing program 3: clock_getres(0x6, &(0x7f0000000180)) 10:27:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 10:27:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 10:27:50 executing program 5: syz_mount_image$gfs2(&(0x7f00000015c0)='gfs2\x00', &(0x7f0000001600)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)={[{@suiddir='suiddir'}, {@hostdata={'hostdata', 0x3d, '/dev/audio#\x00'}}]}) 10:27:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 10:27:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) [ 102.408534][ T9884] gfs2: not a GFS2 filesystem 10:27:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 10:27:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 10:27:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x44}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:27:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x44}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:27:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 10:27:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 10:27:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 10:27:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 10:27:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x44}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:27:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 10:27:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x44}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 10:27:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ftruncate(r1, 0xa00001) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000140)) 10:27:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x6, &(0x7f00000000c0), 0xfdcc) 10:27:51 executing program 0: mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x20000000, 0x0, 0x2}) 10:27:51 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ftruncate(r1, 0xa00001) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000140)) 10:27:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2000000002}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 10:27:51 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ftruncate(r1, 0xa00001) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000140)) 10:27:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x6, &(0x7f00000000c0), 0xfdcc) 10:27:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ftruncate(r1, 0xa00001) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000140)) 10:27:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ftruncate(r1, 0xa00001) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000140)) 10:27:52 executing program 0: mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x20000000, 0x0, 0x2}) 10:27:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x6, &(0x7f00000000c0), 0xfdcc) 10:27:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ftruncate(r1, 0xa00001) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000140)) 10:27:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ftruncate(r1, 0xa00001) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000140)) 10:27:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ftruncate(r1, 0xa00001) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000140)) 10:27:52 executing program 0: mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x20000000, 0x0, 0x2}) 10:27:52 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x6, &(0x7f00000000c0), 0xfdcc) 10:27:52 executing program 1: mkdir(&(0x7f0000000100)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='autofs\x00', 0x0, 0x0) 10:27:52 executing program 0: mq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x20000000, 0x0, 0x2}) 10:27:52 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ftruncate(r1, 0xa00001) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000140)) 10:27:52 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 10:27:52 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ftruncate(r1, 0xa00001) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000140)) 10:27:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ftruncate(r1, 0xa00001) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000140)) [ 104.782699][ T9979] autofs4:pid:9979:autofs_fill_super: called with bogus options 10:27:52 executing program 2: socketpair(0x22, 0x3, 0x0, &(0x7f0000000000)) 10:27:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000100)=0x314) 10:27:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ftruncate(r1, 0xa00001) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000140)) 10:27:52 executing program 0: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)=@ethtool_gstrings={0x19, 0x5}}) 10:27:52 executing program 1: mkdir(&(0x7f0000000100)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='autofs\x00', 0x0, 0x0) 10:27:52 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 10:27:52 executing program 2: socketpair(0x22, 0x3, 0x0, &(0x7f0000000000)) 10:27:52 executing program 0: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)=@ethtool_gstrings={0x19, 0x5}}) [ 105.053542][T10006] autofs4:pid:10006:autofs_fill_super: called with bogus options 10:27:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000100)=0x314) 10:27:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = memfd_create(&(0x7f0000000100)='\x88])+\x00', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r1, 0x0) ftruncate(r1, 0xa00001) getsockopt$inet6_tcp_buf(r0, 0x6, 0x8, 0x0, &(0x7f0000000140)) 10:27:53 executing program 1: mkdir(&(0x7f0000000100)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='autofs\x00', 0x0, 0x0) 10:27:53 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 10:27:53 executing program 2: socketpair(0x22, 0x3, 0x0, &(0x7f0000000000)) 10:27:53 executing program 0: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)=@ethtool_gstrings={0x19, 0x5}}) 10:27:53 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)=@ethtool_gstrings={0x19, 0x5}}) 10:27:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000100)=0x314) [ 105.330537][T10030] autofs4:pid:10030:autofs_fill_super: called with bogus options 10:27:53 executing program 2: socketpair(0x22, 0x3, 0x0, &(0x7f0000000000)) 10:27:53 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 10:27:53 executing program 1: mkdir(&(0x7f0000000100)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='autofs\x00', 0x0, 0x0) 10:27:53 executing program 0: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)=@ethtool_gstrings={0x19, 0x5}}) 10:27:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000080)={'nat\x00'}, &(0x7f0000000100)=0x314) 10:27:53 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)=@ethtool_gstrings={0x19, 0x5}}) 10:27:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) [ 105.645235][T10048] autofs4:pid:10048:autofs_fill_super: called with bogus options 10:27:53 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 10:27:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 10:27:53 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)=@ethtool_gstrings={0x19, 0x5}}) 10:27:53 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 10:27:53 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 10:27:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 10:27:53 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 10:27:53 executing program 4: mkdir(&(0x7f0000000100)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='autofs\x00', 0x0, 0x0) 10:27:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 10:27:53 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 10:27:53 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 10:27:53 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 10:27:54 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) [ 106.129423][T10089] autofs4:pid:10089:autofs_fill_super: called with bogus options 10:27:54 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 10:27:54 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 10:27:54 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0xf, 0x4, 0x4, 0x400, 0x0, 0x1}, 0xb1) socket$rxrpc(0x21, 0x2, 0x800000000a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000140), 0x1c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 10:27:54 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000cad000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00004e9000/0x1000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) mremap(&(0x7f00004ca000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f00000ec000/0x2000)=nil) 10:27:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket(0x8000000000010, 0x10000000002, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000600)=""/196, 0xc4}], 0x1, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x1d0}, {&(0x7f00000024c0)=""/4096, 0x467}, {&(0x7f0000000400)=""/120, 0x44c}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x6dc}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x8}], 0xc1, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 10:27:54 executing program 1: request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0) 10:27:54 executing program 4: mkdir(&(0x7f0000000100)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='autofs\x00', 0x0, 0x0) 10:27:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0xf728, 0x4) connect$inet6(r0, &(0x7f00000001c0), 0x1c) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000080), 0x4) 10:27:54 executing program 0: unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semctl$SETALL(0x0, 0x0, 0x10, 0x0) 10:27:54 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000cad000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00004e9000/0x1000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) mremap(&(0x7f00004ca000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f00000ec000/0x2000)=nil) 10:27:54 executing program 1: request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0) [ 106.519923][T10120] autofs4:pid:10120:autofs_fill_super: called with bogus options 10:27:54 executing program 4: mkdir(&(0x7f0000000100)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='autofs\x00', 0x0, 0x0) 10:27:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket(0x8000000000010, 0x10000000002, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000600)=""/196, 0xc4}], 0x1, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x1d0}, {&(0x7f00000024c0)=""/4096, 0x467}, {&(0x7f0000000400)=""/120, 0x44c}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x6dc}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x8}], 0xc1, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 10:27:54 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000cad000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00004e9000/0x1000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) mremap(&(0x7f00004ca000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f00000ec000/0x2000)=nil) 10:27:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0xf728, 0x4) connect$inet6(r0, &(0x7f00000001c0), 0x1c) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000080), 0x4) 10:27:54 executing program 1: request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0) 10:27:54 executing program 0: unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semctl$SETALL(0x0, 0x0, 0x10, 0x0) 10:27:54 executing program 4: unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semctl$SETALL(0x0, 0x0, 0x10, 0x0) 10:27:54 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000cad000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00004e9000/0x1000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) mremap(&(0x7f00004ca000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f00000ec000/0x2000)=nil) 10:27:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0xf728, 0x4) connect$inet6(r0, &(0x7f00000001c0), 0x1c) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000080), 0x4) 10:27:54 executing program 1: request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000380)={'syz'}, 0x0, 0x0) 10:27:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket(0x8000000000010, 0x10000000002, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000600)=""/196, 0xc4}], 0x1, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x1d0}, {&(0x7f00000024c0)=""/4096, 0x467}, {&(0x7f0000000400)=""/120, 0x44c}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x6dc}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x8}], 0xc1, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 10:27:54 executing program 4: unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semctl$SETALL(0x0, 0x0, 0x10, 0x0) 10:27:54 executing program 0: unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semctl$SETALL(0x0, 0x0, 0x10, 0x0) 10:27:54 executing program 1: unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semctl$SETALL(0x0, 0x0, 0x10, 0x0) 10:27:54 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0xf728, 0x4) connect$inet6(r0, &(0x7f00000001c0), 0x1c) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000080), 0x4) 10:27:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0xf728, 0x4) connect$inet6(r0, &(0x7f00000001c0), 0x1c) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000080), 0x4) 10:27:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket(0x8000000000010, 0x10000000002, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000600)=""/196, 0xc4}], 0x1, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x1d0}, {&(0x7f00000024c0)=""/4096, 0x467}, {&(0x7f0000000400)=""/120, 0x44c}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x6dc}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x8}], 0xc1, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 10:27:55 executing program 4: unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semctl$SETALL(0x0, 0x0, 0x10, 0x0) 10:27:55 executing program 0: unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semctl$SETALL(0x0, 0x0, 0x10, 0x0) 10:27:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0xf728, 0x4) connect$inet6(r0, &(0x7f00000001c0), 0x1c) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000080), 0x4) 10:27:55 executing program 1: unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semctl$SETALL(0x0, 0x0, 0x10, 0x0) 10:27:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0xf728, 0x4) connect$inet6(r0, &(0x7f00000001c0), 0x1c) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000080), 0x4) 10:27:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0xf728, 0x4) connect$inet6(r0, &(0x7f00000001c0), 0x1c) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000080), 0x4) 10:27:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0xf728, 0x4) connect$inet6(r0, &(0x7f00000001c0), 0x1c) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000080), 0x4) 10:27:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket(0x8000000000010, 0x10000000002, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000600)=""/196, 0xc4}], 0x1, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x1d0}, {&(0x7f00000024c0)=""/4096, 0x467}, {&(0x7f0000000400)=""/120, 0x44c}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x6dc}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x8}], 0xc1, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 10:27:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket(0x8000000000010, 0x10000000002, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000600)=""/196, 0xc4}], 0x1, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x1d0}, {&(0x7f00000024c0)=""/4096, 0x467}, {&(0x7f0000000400)=""/120, 0x44c}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x6dc}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x8}], 0xc1, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 10:27:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket(0x8000000000010, 0x10000000002, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000600)=""/196, 0xc4}], 0x1, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x1d0}, {&(0x7f00000024c0)=""/4096, 0x467}, {&(0x7f0000000400)=""/120, 0x44c}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x6dc}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x8}], 0xc1, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 10:27:55 executing program 1: unshare(0x8020000) semget$private(0x0, 0x403, 0x0) semctl$SETALL(0x0, 0x0, 0x10, 0x0) 10:27:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket(0x8000000000010, 0x10000000002, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000600)=""/196, 0xc4}], 0x1, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x1d0}, {&(0x7f00000024c0)=""/4096, 0x467}, {&(0x7f0000000400)=""/120, 0x44c}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x6dc}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x8}], 0xc1, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 10:27:55 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000000)=0xf728, 0x4) connect$inet6(r0, &(0x7f00000001c0), 0x1c) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000080), 0x4) 10:27:55 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000cad000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00004e9000/0x1000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) mremap(&(0x7f00004ca000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f00000ec000/0x2000)=nil) 10:27:55 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000cad000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00004e9000/0x1000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) mremap(&(0x7f00004ca000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f00000ec000/0x2000)=nil) 10:27:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket(0x8000000000010, 0x10000000002, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000600)=""/196, 0xc4}], 0x1, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x1d0}, {&(0x7f00000024c0)=""/4096, 0x467}, {&(0x7f0000000400)=""/120, 0x44c}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x6dc}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x8}], 0xc1, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 10:27:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket(0x8000000000010, 0x10000000002, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000600)=""/196, 0xc4}], 0x1, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x1d0}, {&(0x7f00000024c0)=""/4096, 0x467}, {&(0x7f0000000400)=""/120, 0x44c}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x6dc}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x8}], 0xc1, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 10:27:55 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000cad000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00004e9000/0x1000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) mremap(&(0x7f00004ca000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f00000ec000/0x2000)=nil) 10:27:55 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000cad000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00004e9000/0x1000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) mremap(&(0x7f00004ca000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f00000ec000/0x2000)=nil) 10:27:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket(0x8000000000010, 0x10000000002, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000600)=""/196, 0xc4}], 0x1, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x1d0}, {&(0x7f00000024c0)=""/4096, 0x467}, {&(0x7f0000000400)=""/120, 0x44c}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x6dc}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x8}], 0xc1, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 10:27:55 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000cad000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00004e9000/0x1000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) mremap(&(0x7f00004ca000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f00000ec000/0x2000)=nil) 10:27:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket(0x8000000000010, 0x10000000002, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000600)=""/196, 0xc4}], 0x1, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x1d0}, {&(0x7f00000024c0)=""/4096, 0x467}, {&(0x7f0000000400)=""/120, 0x44c}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x6dc}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x8}], 0xc1, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 10:27:56 executing program 2: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000cad000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00004e9000/0x1000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) mremap(&(0x7f00004ca000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f00000ec000/0x2000)=nil) 10:27:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070") r1 = socket(0x8000000000010, 0x10000000002, 0x0) process_vm_writev(0x0, &(0x7f0000000b80)=[{&(0x7f0000000600)=""/196, 0xc4}], 0x1, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000000)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x1c, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x3d}, {&(0x7f00000000c0)=""/85, 0x1d0}, {&(0x7f00000024c0)=""/4096, 0x467}, {&(0x7f0000000400)=""/120, 0x44c}, {&(0x7f0000000480)=""/60, 0xc6}, {&(0x7f0000000280)=""/77, 0x6dc}, {&(0x7f0000000540)=""/154, 0x9a}, {&(0x7f0000000340)=""/22, 0x8}], 0xc1, &(0x7f0000002400)=""/191, 0xbf}}], 0x4000000000001de, 0x6, &(0x7f0000003700)={0x77359400}) 10:27:56 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000cad000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00004e9000/0x1000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) mremap(&(0x7f00004ca000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f00000ec000/0x2000)=nil) 10:27:56 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000cad000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00004e9000/0x1000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) mremap(&(0x7f00004ca000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f00000ec000/0x2000)=nil) 10:27:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}]}}, &(0x7f0000000880)=""/4096, 0x46, 0x1000, 0x1}, 0x20) 10:27:56 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000680)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x13b}]) 10:27:56 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x10000e0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}, 0x1, 0x2000000000000000}, 0x0) 10:27:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}]}}, &(0x7f0000000880)=""/4096, 0x46, 0x1000, 0x1}, 0x20) 10:27:56 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000cad000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f00004e9000/0x1000)=nil) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x0) mremap(&(0x7f00004ca000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f00000ec000/0x2000)=nil) 10:27:56 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 10:27:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}]}}, &(0x7f0000000880)=""/4096, 0x46, 0x1000, 0x1}, 0x20) 10:27:56 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xffffff88, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0xffffffffffffffff, [0x0, 0xc7a]}) 10:27:56 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000680)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x13b}]) 10:27:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}]}}, &(0x7f0000000880)=""/4096, 0x46, 0x1000, 0x1}, 0x20) 10:27:56 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x10000e0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}, 0x1, 0x2000000000000000}, 0x0) 10:27:56 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xffffff88, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0xffffffffffffffff, [0x0, 0xc7a]}) 10:27:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 10:27:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 10:27:56 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000680)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x13b}]) 10:27:56 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xffffff88, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0xffffffffffffffff, [0x0, 0xc7a]}) 10:27:57 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:57 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x10000e0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}, 0x1, 0x2000000000000000}, 0x0) 10:27:57 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0xffffff88, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)={0x0, 0xffffffffffffffff, [0x0, 0xc7a]}) 10:27:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 10:27:57 executing program 3: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000680)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x13b}]) 10:27:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 10:27:57 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x10000e0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}, 0x1, 0x2000000000000000}, 0x0) 10:27:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 10:27:57 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 10:27:57 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:57 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:57 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:57 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:57 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:57 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:57 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:57 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:58 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:58 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:58 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:58 executing program 5: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:58 executing program 3: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:58 executing program 2: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:58 executing program 4: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:58 executing program 1: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) ftruncate(r0, 0xc65b) unlink(&(0x7f0000000180)='./bus\x00') fcntl$setstatus(r0, 0x4, 0x463fd) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) 10:27:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 10:27:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 10:27:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 10:27:58 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x10000e0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}, 0x1, 0x2000000000000000}, 0x0) 10:27:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 10:27:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 10:27:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 10:27:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x10000e0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}, 0x1, 0x2000000000000000}, 0x0) 10:27:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 10:27:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 10:27:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000b40)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_ctr_aes256\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(r0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 10:27:59 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x10000e0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}, 0x1, 0x2000000000000000}, 0x0) 10:27:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x10000e0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}, 0x1, 0x2000000000000000}, 0x0) 10:27:59 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000680)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x13b}]) 10:27:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="f7946aec97612365107a599c24994bbf78e6abb34d17249c4690ccc71f78b600beeff9bdc798c1717d4916ed8bdd3e00e3db8ce3520ca71dd4110e91e168a751569614176633ebb5b32f4503eadd5b10ade843f2876a1d360ef2aa759262940d479242042b9c6d9cd4216521dac72b54e4d3dd633613dda947df4e0735be2cece41c0108905c612f92a5b286601fec82c3390d9e20ea4e996f962e9a47e0f9776d4c66d04f5c4fb836752a036dabaf0f4386e197e1682d0e9e89502e514d85f51a3b2d0256b0d3ad6674789ee842fe62523064e1e65118af9c86cc25f24e4840739ca3a37279022862336a51b5b474d14b0968a0b127f830412ae86faf65d15617578de70f6643e1c2d5b80ccf7df943dfe27435c04e4f0cd3415fdeb5c0ee5bf74013db58b9052e5a2ede426bfe61641036c008d006c93c0c6185196d2054a36844b7373c3c924869c9294e21680e4651b533f6322c5bb95562245852d42f90b9373f5c6c0226b2984a9fecdcfb2d9b469ce9afbb620a03d86998744124e70045f1595c797356a3bf9aa5e07c6343a6c13add569ddf392cd2b7db096a7c8da13c97e01a832fa166eb9adbfbd624a00caeb57b836e187e642c9237119400985e03b8a45e6031a418016e9b25c06c63bce2452af8da9adea1645682faec14b24ee3294cc3ab1865976b36ef28c37e7e52d51b56c5b3e6dd", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:27:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:27:59 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x22, 0x0) 10:27:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x10000e0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}, 0x1, 0x2000000000000000}, 0x0) 10:27:59 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001d0003fd6d000036000000000cdd0200"/34, 0x22}], 0x1}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x80002, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="220000001400090000e80000004c03000200", 0x12) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x1402, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492498f, 0x0) 10:27:59 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000680)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x13b}]) 10:27:59 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x22, 0x0) [ 111.937082][T10474] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 10:27:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x9, 0xc, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x10000e0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}, 0x1, 0x2000000000000000}, 0x0) 10:28:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:00 executing program 4: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000680)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x13b}]) 10:28:00 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x22, 0x0) 10:28:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:00 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x22, 0x0) 10:28:00 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001d0003fd6d000036000000000cdd0200"/34, 0x22}], 0x1}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x80002, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="220000001400090000e80000004c03000200", 0x12) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x1402, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492498f, 0x0) 10:28:00 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001d0003fd6d000036000000000cdd0200"/34, 0x22}], 0x1}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x80002, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="220000001400090000e80000004c03000200", 0x12) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x1402, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492498f, 0x0) 10:28:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) [ 113.503018][T10511] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 113.534439][T10512] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.4'. 10:28:01 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:01 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001d0003fd6d000036000000000cdd0200"/34, 0x22}], 0x1}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x80002, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="220000001400090000e80000004c03000200", 0x12) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x1402, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492498f, 0x0) 10:28:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:01 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001d0003fd6d000036000000000cdd0200"/34, 0x22}], 0x1}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x80002, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="220000001400090000e80000004c03000200", 0x12) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x1402, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492498f, 0x0) 10:28:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="f7946aec97612365107a599c24994bbf78e6abb34d17249c4690ccc71f78b600beeff9bdc798c1717d4916ed8bdd3e00e3db8ce3520ca71dd4110e91e168a751569614176633ebb5b32f4503eadd5b10ade843f2876a1d360ef2aa759262940d479242042b9c6d9cd4216521dac72b54e4d3dd633613dda947df4e0735be2cece41c0108905c612f92a5b286601fec82c3390d9e20ea4e996f962e9a47e0f9776d4c66d04f5c4fb836752a036dabaf0f4386e197e1682d0e9e89502e514d85f51a3b2d0256b0d3ad6674789ee842fe62523064e1e65118af9c86cc25f24e4840739ca3a37279022862336a51b5b474d14b0968a0b127f830412ae86faf65d15617578de70f6643e1c2d5b80ccf7df943dfe27435c04e4f0cd3415fdeb5c0ee5bf74013db58b9052e5a2ede426bfe61641036c008d006c93c0c6185196d2054a36844b7373c3c924869c9294e21680e4651b533f6322c5bb95562245852d42f90b9373f5c6c0226b2984a9fecdcfb2d9b469ce9afbb620a03d86998744124e70045f1595c797356a3bf9aa5e07c6343a6c13add569ddf392cd2b7db096a7c8da13c97e01a832fa166eb9adbfbd624a00caeb57b836e187e642c9237119400985e03b8a45e6031a418016e9b25c06c63bce2452af8da9adea1645682faec14b24ee3294cc3ab1865976b36ef28c37e7e52d51b56c5b3e6dd", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) [ 115.261204][T10530] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.4'. [ 115.277891][T10534] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 10:28:03 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001d0003fd6d000036000000000cdd0200"/34, 0x22}], 0x1}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x80002, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="220000001400090000e80000004c03000200", 0x12) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x1402, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492498f, 0x0) 10:28:03 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001d0003fd6d000036000000000cdd0200"/34, 0x22}], 0x1}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x80002, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="220000001400090000e80000004c03000200", 0x12) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x1402, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492498f, 0x0) 10:28:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="f7946aec97612365107a599c24994bbf78e6abb34d17249c4690ccc71f78b600beeff9bdc798c1717d4916ed8bdd3e00e3db8ce3520ca71dd4110e91e168a751569614176633ebb5b32f4503eadd5b10ade843f2876a1d360ef2aa759262940d479242042b9c6d9cd4216521dac72b54e4d3dd633613dda947df4e0735be2cece41c0108905c612f92a5b286601fec82c3390d9e20ea4e996f962e9a47e0f9776d4c66d04f5c4fb836752a036dabaf0f4386e197e1682d0e9e89502e514d85f51a3b2d0256b0d3ad6674789ee842fe62523064e1e65118af9c86cc25f24e4840739ca3a37279022862336a51b5b474d14b0968a0b127f830412ae86faf65d15617578de70f6643e1c2d5b80ccf7df943dfe27435c04e4f0cd3415fdeb5c0ee5bf74013db58b9052e5a2ede426bfe61641036c008d006c93c0c6185196d2054a36844b7373c3c924869c9294e21680e4651b533f6322c5bb95562245852d42f90b9373f5c6c0226b2984a9fecdcfb2d9b469ce9afbb620a03d86998744124e70045f1595c797356a3bf9aa5e07c6343a6c13add569ddf392cd2b7db096a7c8da13c97e01a832fa166eb9adbfbd624a00caeb57b836e187e642c9237119400985e03b8a45e6031a418016e9b25c06c63bce2452af8da9adea1645682faec14b24ee3294cc3ab1865976b36ef28c37e7e52d51b56c5b3e6dd", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) [ 115.888855][T10544] IPVS: ftp: loaded support on port[0] = 21 [ 115.896039][T10555] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 115.958008][T10551] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.4'. 10:28:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) [ 117.515640][T10573] IPVS: ftp: loaded support on port[0] = 21 [ 117.603461][T10544] chnl_net:caif_netlink_parms(): no params data found [ 117.711645][T10544] bridge0: port 1(bridge_slave_0) entered blocking state [ 117.720315][T10544] bridge0: port 1(bridge_slave_0) entered disabled state [ 117.728168][T10544] device bridge_slave_0 entered promiscuous mode [ 117.736515][T10544] bridge0: port 2(bridge_slave_1) entered blocking state [ 117.743589][T10544] bridge0: port 2(bridge_slave_1) entered disabled state [ 117.751663][T10544] device bridge_slave_1 entered promiscuous mode [ 117.842187][T10544] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 117.859145][T10544] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 117.952751][T10544] team0: Port device team_slave_0 added [ 117.959981][T10544] team0: Port device team_slave_1 added [ 118.016475][ T8420] device bridge_slave_1 left promiscuous mode [ 118.023364][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 118.068028][ T8420] device bridge_slave_0 left promiscuous mode [ 118.074791][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.884872][ T8420] device hsr_slave_0 left promiscuous mode [ 119.954272][ T8420] device hsr_slave_1 left promiscuous mode [ 120.008273][ T8420] team0 (unregistering): Port device team_slave_1 removed [ 120.021048][ T8420] team0 (unregistering): Port device team_slave_0 removed [ 120.035527][ T8420] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 120.120510][ T8420] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 120.198466][ T8420] bond0 (unregistering): Released all slaves [ 120.327059][T10544] device hsr_slave_0 entered promiscuous mode [ 120.384230][T10544] device hsr_slave_1 entered promiscuous mode [ 120.440821][T10573] chnl_net:caif_netlink_parms(): no params data found [ 120.490445][T10573] bridge0: port 1(bridge_slave_0) entered blocking state [ 120.498916][T10573] bridge0: port 1(bridge_slave_0) entered disabled state [ 120.517410][T10573] device bridge_slave_0 entered promiscuous mode [ 120.536950][T10573] bridge0: port 2(bridge_slave_1) entered blocking state [ 120.547757][T10573] bridge0: port 2(bridge_slave_1) entered disabled state [ 120.555979][T10573] device bridge_slave_1 entered promiscuous mode [ 120.651923][T10573] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 120.671756][T10573] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 120.691945][T10544] 8021q: adding VLAN 0 to HW filter on device bond0 [ 120.740690][T10573] team0: Port device team_slave_0 added [ 120.749646][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 120.761887][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 120.780300][T10573] team0: Port device team_slave_1 added [ 120.790683][T10544] 8021q: adding VLAN 0 to HW filter on device team0 [ 120.866826][T10573] device hsr_slave_0 entered promiscuous mode [ 120.924878][T10573] device hsr_slave_1 entered promiscuous mode [ 121.004040][T10573] debugfs: Directory 'hsr0' with parent '/' already present! [ 121.027301][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 121.040838][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 121.050877][ T8785] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.059497][ T8785] bridge0: port 1(bridge_slave_0) entered forwarding state [ 121.081409][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 121.096761][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 121.115036][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 121.123731][ T8387] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.131561][ T8387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 121.143694][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 121.155386][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 121.166835][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 121.176143][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 121.196690][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 121.204894][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 121.213760][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 121.223424][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 121.232335][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 121.247592][T10544] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 121.266126][T10544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 121.282441][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 121.293740][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 121.347807][T10544] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 121.404306][T10573] 8021q: adding VLAN 0 to HW filter on device bond0 [ 121.432610][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 121.445633][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 121.465156][T10573] 8021q: adding VLAN 0 to HW filter on device team0 [ 121.479012][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 121.488432][ T8785] bridge0: port 1(bridge_slave_0) entered blocking state [ 121.495566][ T8785] bridge0: port 1(bridge_slave_0) entered forwarding state [ 121.526496][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 121.545042][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 121.557921][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 121.572235][ T8387] bridge0: port 2(bridge_slave_1) entered blocking state [ 121.579393][ T8387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 121.598294][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 121.616749][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 121.654323][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 121.663185][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 121.682616][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 121.705049][T10573] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 121.715511][T10573] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 121.730436][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 121.740287][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready 10:28:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="f7946aec97612365107a599c24994bbf78e6abb34d17249c4690ccc71f78b600beeff9bdc798c1717d4916ed8bdd3e00e3db8ce3520ca71dd4110e91e168a751569614176633ebb5b32f4503eadd5b10ade843f2876a1d360ef2aa759262940d479242042b9c6d9cd4216521dac72b54e4d3dd633613dda947df4e0735be2cece41c0108905c612f92a5b286601fec82c3390d9e20ea4e996f962e9a47e0f9776d4c66d04f5c4fb836752a036dabaf0f4386e197e1682d0e9e89502e514d85f51a3b2d0256b0d3ad6674789ee842fe62523064e1e65118af9c86cc25f24e4840739ca3a37279022862336a51b5b474d14b0968a0b127f830412ae86faf65d15617578de70f6643e1c2d5b80ccf7df943dfe27435c04e4f0cd3415fdeb5c0ee5bf74013db58b9052e5a2ede426bfe61641036c008d006c93c0c6185196d2054a36844b7373c3c924869c9294e21680e4651b533f6322c5bb95562245852d42f90b9373f5c6c0226b2984a9fecdcfb2d9b469ce9afbb620a03d86998744124e70045f1595c797356a3bf9aa5e07c6343a6c13add569ddf392cd2b7db096a7c8da13c97e01a832fa166eb9adbfbd624a00caeb57b836e187e642c9237119400985e03b8a45e6031a418016e9b25c06c63bce2452af8da9adea1645682faec14b24ee3294cc3ab1865976b36ef28c37e7e52d51b56c5b3e6dd", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="f7946aec97612365107a599c24994bbf78e6abb34d17249c4690ccc71f78b600beeff9bdc798c1717d4916ed8bdd3e00e3db8ce3520ca71dd4110e91e168a751569614176633ebb5b32f4503eadd5b10ade843f2876a1d360ef2aa759262940d479242042b9c6d9cd4216521dac72b54e4d3dd633613dda947df4e0735be2cece41c0108905c612f92a5b286601fec82c3390d9e20ea4e996f962e9a47e0f9776d4c66d04f5c4fb836752a036dabaf0f4386e197e1682d0e9e89502e514d85f51a3b2d0256b0d3ad6674789ee842fe62523064e1e65118af9c86cc25f24e4840739ca3a37279022862336a51b5b474d14b0968a0b127f830412ae86faf65d15617578de70f6643e1c2d5b80ccf7df943dfe27435c04e4f0cd3415fdeb5c0ee5bf74013db58b9052e5a2ede426bfe61641036c008d006c93c0c6185196d2054a36844b7373c3c924869c9294e21680e4651b533f6322c5bb95562245852d42f90b9373f5c6c0226b2984a9fecdcfb2d9b469ce9afbb620a03d86998744124e70045f1595c797356a3bf9aa5e07c6343a6c13add569ddf392cd2b7db096a7c8da13c97e01a832fa166eb9adbfbd624a00caeb57b836e187e642c9237119400985e03b8a45e6031a418016e9b25c06c63bce2452af8da9adea1645682faec14b24ee3294cc3ab1865976b36ef28c37e7e52d51b56c5b3e6dd", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) [ 121.750748][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 121.759922][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 121.794844][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 121.848019][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 121.944573][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 10:28:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) [ 123.119909][T10573] 8021q: adding VLAN 0 to HW filter on device batadv0 10:28:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="f7946aec97612365107a599c24994bbf78e6abb34d17249c4690ccc71f78b600beeff9bdc798c1717d4916ed8bdd3e00e3db8ce3520ca71dd4110e91e168a751569614176633ebb5b32f4503eadd5b10ade843f2876a1d360ef2aa759262940d479242042b9c6d9cd4216521dac72b54e4d3dd633613dda947df4e0735be2cece41c0108905c612f92a5b286601fec82c3390d9e20ea4e996f962e9a47e0f9776d4c66d04f5c4fb836752a036dabaf0f4386e197e1682d0e9e89502e514d85f51a3b2d0256b0d3ad6674789ee842fe62523064e1e65118af9c86cc25f24e4840739ca3a37279022862336a51b5b474d14b0968a0b127f830412ae86faf65d15617578de70f6643e1c2d5b80ccf7df943dfe27435c04e4f0cd3415fdeb5c0ee5bf74013db58b9052e5a2ede426bfe61641036c008d006c93c0c6185196d2054a36844b7373c3c924869c9294e21680e4651b533f6322c5bb95562245852d42f90b9373f5c6c0226b2984a9fecdcfb2d9b469ce9afbb620a03d86998744124e70045f1595c797356a3bf9aa5e07c6343a6c13add569ddf392cd2b7db096a7c8da13c97e01a832fa166eb9adbfbd624a00caeb57b836e187e642c9237119400985e03b8a45e6031a418016e9b25c06c63bce2452af8da9adea1645682faec14b24ee3294cc3ab1865976b36ef28c37e7e52d51b56c5b3e6dd", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:12 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001d0003fd6d000036000000000cdd0200"/34, 0x22}], 0x1}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x80002, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="220000001400090000e80000004c03000200", 0x12) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x1402, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492498f, 0x0) 10:28:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) [ 124.634556][T10629] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 10:28:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:12 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:12 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:13 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:13 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001d0003fd6d000036000000000cdd0200"/34, 0x22}], 0x1}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x80002, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="220000001400090000e80000004c03000200", 0x12) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x1402, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492498f, 0x0) 10:28:13 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) [ 126.159882][T10655] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. [ 126.452552][T10661] IPVS: ftp: loaded support on port[0] = 21 [ 126.957311][T10661] chnl_net:caif_netlink_parms(): no params data found [ 127.116160][T10661] bridge0: port 1(bridge_slave_0) entered blocking state [ 127.123290][T10661] bridge0: port 1(bridge_slave_0) entered disabled state [ 127.131261][T10661] device bridge_slave_0 entered promiscuous mode [ 127.268252][T10661] bridge0: port 2(bridge_slave_1) entered blocking state [ 127.279305][T10661] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.287231][T10661] device bridge_slave_1 entered promiscuous mode [ 127.307454][T10661] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 127.318648][T10661] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 127.468745][T10661] team0: Port device team_slave_0 added [ 127.477892][T10661] team0: Port device team_slave_1 added [ 127.536934][T10661] device hsr_slave_0 entered promiscuous mode [ 127.594403][T10661] device hsr_slave_1 entered promiscuous mode [ 127.634045][T10661] debugfs: Directory 'hsr0' with parent '/' already present! [ 127.803564][T10661] 8021q: adding VLAN 0 to HW filter on device bond0 [ 127.956390][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 127.966071][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 127.974055][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 127.985271][T10661] 8021q: adding VLAN 0 to HW filter on device team0 [ 127.996260][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 128.004996][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.013307][ T8395] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.020465][ T8395] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.029742][ T8420] device bridge_slave_1 left promiscuous mode [ 128.037052][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.115133][ T8420] device bridge_slave_0 left promiscuous mode [ 128.121352][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.165854][ T8420] device bridge_slave_1 left promiscuous mode [ 128.172035][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.235612][ T8420] device bridge_slave_0 left promiscuous mode [ 128.242227][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.854657][ T8420] device hsr_slave_0 left promiscuous mode [ 131.914270][ T8420] device hsr_slave_1 left promiscuous mode [ 131.975028][ T8420] team0 (unregistering): Port device team_slave_1 removed [ 131.987898][ T8420] team0 (unregistering): Port device team_slave_0 removed [ 132.001036][ T8420] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 132.058112][ T8420] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 132.128286][ T8420] bond0 (unregistering): Released all slaves [ 132.314574][ T8420] device hsr_slave_0 left promiscuous mode [ 132.364114][ T8420] device hsr_slave_1 left promiscuous mode [ 132.434405][ T8420] team0 (unregistering): Port device team_slave_1 removed [ 132.446115][ T8420] team0 (unregistering): Port device team_slave_0 removed [ 132.457136][ T8420] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 132.540009][ T8420] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 132.635925][ T8420] bond0 (unregistering): Released all slaves [ 132.751250][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 132.760902][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 132.769922][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 132.778722][ T8382] bridge0: port 2(bridge_slave_1) entered blocking state [ 132.785831][ T8382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 132.808719][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 132.809451][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 132.825886][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 132.834560][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 132.843406][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 132.853425][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 132.862303][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 132.878076][T10661] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 132.889684][T10661] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 132.901671][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 132.910375][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 132.919155][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 132.929213][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 132.942325][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 132.972979][T10661] 8021q: adding VLAN 0 to HW filter on device batadv0 10:28:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x2046, 0x73) connect(0xffffffffffffffff, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev}, 0x80) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0xa5c) ioctl$sock_rose_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={@dev, 0x0, @default, @rose={'rose', 0x0}, 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bcast, @netrom, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f0000004300)=[{&(0x7f0000000140)="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", 0x1f7, 0x9}, {&(0x7f00000032c0)="c9", 0xffffffffffffffa6}]) recvmsg(0xffffffffffffffff, 0x0, 0x40000020) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000008c0)={0x0, 0x7fff}, &(0x7f0000000900)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000a00)={0x0, 0xf68}, &(0x7f0000000a40)=0xc) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000a80)={0x0, 0x3, 0x10, 0x1ff, 0x4}, &(0x7f0000000ac0)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000940)={0x0, 0x82, "45e98821f7aac4d078bc18d28d1d21ae4db5e0ba74ce328f7ce940564c40037bec9b8b6d677cb7323c1097e93c8e46653a2921bf1c1c9b24c7f8ef32d0ad6bd311fb538d57875789f8c6a92d43ed178467c4e8a33bcb8d3309fa1be36fc84c4996c8ab5055f67af6f14822d0e93694e8586278497ca039271c27aba817d4a2822e71"}, &(0x7f0000000800)=0x62) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000840)={0x0, 0x300000000}, &(0x7f0000000880)=0x8) 10:28:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:21 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:21 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2f0000001d0003fd6d000036000000000cdd0200"/34, 0x22}], 0x1}, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") r1 = socket(0x10, 0x80002, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="220000001400090000e80000004c03000200", 0x12) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x1402, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492498f, 0x0) 10:28:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) [ 133.982990][T10677] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.5'. 10:28:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:22 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:22 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) [ 135.540061][T10695] IPVS: ftp: loaded support on port[0] = 21 [ 135.540290][T10693] IPVS: ftp: loaded support on port[0] = 21 [ 135.560412][T10694] IPVS: ftp: loaded support on port[0] = 21 [ 135.902868][T10693] chnl_net:caif_netlink_parms(): no params data found [ 135.933922][T10695] chnl_net:caif_netlink_parms(): no params data found [ 135.943377][T10694] chnl_net:caif_netlink_parms(): no params data found [ 136.007224][T10693] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.015046][T10693] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.023141][T10693] device bridge_slave_0 entered promiscuous mode [ 136.046127][T10693] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.053229][T10693] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.062934][T10693] device bridge_slave_1 entered promiscuous mode [ 136.082664][T10694] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.091889][T10694] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.100415][T10694] device bridge_slave_0 entered promiscuous mode [ 136.116606][T10695] bridge0: port 1(bridge_slave_0) entered blocking state [ 136.123733][T10695] bridge0: port 1(bridge_slave_0) entered disabled state [ 136.140559][T10695] device bridge_slave_0 entered promiscuous mode [ 136.153166][T10694] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.160435][T10694] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.169916][T10694] device bridge_slave_1 entered promiscuous mode [ 136.183191][T10695] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.193350][T10695] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.210872][T10695] device bridge_slave_1 entered promiscuous mode [ 136.230173][T10693] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 136.270842][T10693] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 136.283645][T10694] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 136.295904][T10694] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 136.307456][T10695] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 136.356925][T10695] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 136.367809][T10693] team0: Port device team_slave_0 added [ 136.379296][T10694] team0: Port device team_slave_0 added [ 136.387053][T10694] team0: Port device team_slave_1 added [ 136.395166][T10693] team0: Port device team_slave_1 added [ 136.409115][T10695] team0: Port device team_slave_0 added [ 136.417475][T10695] team0: Port device team_slave_1 added [ 136.487625][T10693] device hsr_slave_0 entered promiscuous mode [ 136.544497][T10693] device hsr_slave_1 entered promiscuous mode [ 136.628006][T10700] IPVS: ftp: loaded support on port[0] = 21 [ 136.675963][T10694] device hsr_slave_0 entered promiscuous mode [ 136.724535][T10694] device hsr_slave_1 entered promiscuous mode [ 136.764102][T10694] debugfs: Directory 'hsr0' with parent '/' already present! [ 136.772634][T10693] bridge0: port 2(bridge_slave_1) entered blocking state [ 136.779773][T10693] bridge0: port 2(bridge_slave_1) entered forwarding state [ 136.846879][T10695] device hsr_slave_0 entered promiscuous mode [ 136.904224][T10695] device hsr_slave_1 entered promiscuous mode [ 136.954107][T10695] debugfs: Directory 'hsr0' with parent '/' already present! [ 137.039406][T10694] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.046557][T10694] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.054523][T10694] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.061831][T10694] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.081085][ T8387] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.089642][ T8387] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.098925][ T8387] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.183185][T10693] 8021q: adding VLAN 0 to HW filter on device bond0 [ 137.222237][T10695] 8021q: adding VLAN 0 to HW filter on device bond0 [ 137.256191][T10694] 8021q: adding VLAN 0 to HW filter on device bond0 [ 137.281674][T10695] 8021q: adding VLAN 0 to HW filter on device team0 [ 137.289468][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.299583][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.308972][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.317982][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.330250][T10693] 8021q: adding VLAN 0 to HW filter on device team0 [ 137.367280][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 137.376902][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.385666][ T8418] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.392824][ T8418] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.400767][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 137.409051][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.417058][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 137.425730][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.434543][ T8418] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.441613][ T8418] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.449730][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 137.460707][T10694] 8021q: adding VLAN 0 to HW filter on device team0 [ 137.474242][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 137.482996][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.493139][ T8418] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.500296][ T8418] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.508032][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 137.516925][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.525467][ T8418] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.532523][ T8418] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.561032][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 137.570207][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.579108][ T8387] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.586250][ T8387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.594362][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 137.602978][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 137.612031][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.620571][ T8387] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.627683][ T8387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.635609][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 137.644402][ T8387] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 137.666604][T10700] chnl_net:caif_netlink_parms(): no params data found [ 138.508752][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 138.517570][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 138.529126][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 138.541635][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 138.551627][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 138.560878][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 138.569946][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 138.579133][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 138.587916][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 138.597929][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 138.606072][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 138.614218][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 138.633436][T10695] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 138.644834][T10695] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 139.092976][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 139.102132][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 139.111609][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 139.122103][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 139.131554][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 139.140810][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.149790][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 139.158635][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.167522][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.177363][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.188620][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.198001][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.222433][T10694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 139.672273][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 139.680509][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 139.689595][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 139.699769][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 139.709119][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.738889][T10700] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.748061][T10700] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.756937][T10700] device bridge_slave_0 entered promiscuous mode [ 139.766274][T10700] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.773394][T10700] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.782153][T10700] device bridge_slave_1 entered promiscuous mode [ 139.797843][T10693] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 139.810149][T10693] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 139.818188][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 139.827466][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 140.276200][T10695] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 140.301205][T10700] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 140.762739][T10700] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 140.788966][T10700] team0: Port device team_slave_0 added [ 140.805864][T10694] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 140.816453][T10693] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 140.836468][T10700] team0: Port device team_slave_1 added [ 141.437507][T10700] device hsr_slave_0 entered promiscuous mode [ 141.494427][T10700] device hsr_slave_1 entered promiscuous mode [ 141.533987][T10700] debugfs: Directory 'hsr0' with parent '/' already present! 10:28:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:30 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x22, 0x0) 10:28:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:30 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x22, 0x0) 10:28:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) 10:28:31 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x22, 0x0) 10:28:31 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x22, 0x0) 10:28:31 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x22, 0x0) [ 143.826681][T10734] IPVS: ftp: loaded support on port[0] = 21 [ 143.830361][T10735] IPVS: ftp: loaded support on port[0] = 21 [ 143.855224][T10733] IPVS: ftp: loaded support on port[0] = 21 [ 143.864688][ T8420] device bridge_slave_1 left promiscuous mode 10:28:31 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x22, 0x0) [ 143.871432][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.915029][ T8420] device bridge_slave_0 left promiscuous mode [ 143.921194][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 143.945323][ T8420] device bridge_slave_1 left promiscuous mode [ 143.951478][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.015283][ T8420] device bridge_slave_0 left promiscuous mode [ 144.027480][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.086059][ T8420] device bridge_slave_1 left promiscuous mode [ 144.093614][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.135234][ T8420] device bridge_slave_0 left promiscuous mode [ 144.141426][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.186011][ T8420] device bridge_slave_1 left promiscuous mode [ 144.192191][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.234716][ T8420] device bridge_slave_0 left promiscuous mode [ 144.240877][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.306931][ T8420] device bridge_slave_1 left promiscuous mode [ 144.313088][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.355030][ T8420] device bridge_slave_0 left promiscuous mode [ 144.361269][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.426043][ T8420] device bridge_slave_1 left promiscuous mode [ 144.432291][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.465403][ T8420] device bridge_slave_0 left promiscuous mode [ 144.471850][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 155.924499][ T8420] device hsr_slave_0 left promiscuous mode [ 155.974924][ T8420] device hsr_slave_1 left promiscuous mode [ 156.021796][ T8420] team0 (unregistering): Port device team_slave_1 removed [ 156.037058][ T8420] team0 (unregistering): Port device team_slave_0 removed [ 156.050730][ T8420] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 156.080544][ T8420] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 156.183281][ T8420] bond0 (unregistering): Released all slaves [ 156.334654][ T8420] device hsr_slave_0 left promiscuous mode [ 156.374108][ T8420] device hsr_slave_1 left promiscuous mode [ 156.428085][ T8420] team0 (unregistering): Port device team_slave_1 removed [ 156.445744][ T8420] team0 (unregistering): Port device team_slave_0 removed [ 156.459067][ T8420] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 156.489145][ T8420] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 156.580964][ T8420] bond0 (unregistering): Released all slaves [ 156.744794][ T8420] device hsr_slave_0 left promiscuous mode [ 156.784145][ T8420] device hsr_slave_1 left promiscuous mode [ 156.831849][ T8420] team0 (unregistering): Port device team_slave_1 removed [ 156.849859][ T8420] team0 (unregistering): Port device team_slave_0 removed [ 156.860265][ T8420] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 156.890312][ T8420] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 156.959621][ T8420] bond0 (unregistering): Released all slaves [ 157.134506][ T8420] device hsr_slave_0 left promiscuous mode [ 157.184032][ T8420] device hsr_slave_1 left promiscuous mode [ 157.230722][ T8420] team0 (unregistering): Port device team_slave_1 removed [ 157.245454][ T8420] team0 (unregistering): Port device team_slave_0 removed [ 157.257311][ T8420] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 157.339958][ T8420] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 157.412629][ T8420] bond0 (unregistering): Released all slaves [ 157.554647][ T8420] device hsr_slave_0 left promiscuous mode [ 157.604063][ T8420] device hsr_slave_1 left promiscuous mode [ 157.672876][ T8420] team0 (unregistering): Port device team_slave_1 removed [ 157.688591][ T8420] team0 (unregistering): Port device team_slave_0 removed [ 157.699429][ T8420] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 157.759540][ T8420] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 157.850730][ T8420] bond0 (unregistering): Released all slaves [ 158.004582][ T8420] device hsr_slave_0 left promiscuous mode [ 158.044032][ T8420] device hsr_slave_1 left promiscuous mode [ 158.106853][ T8420] team0 (unregistering): Port device team_slave_1 removed [ 158.117969][ T8420] team0 (unregistering): Port device team_slave_0 removed [ 158.131448][ T8420] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 158.191427][ T8420] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 158.282184][ T8420] bond0 (unregistering): Released all slaves [ 158.423737][T10737] IPVS: ftp: loaded support on port[0] = 21 [ 158.425403][T10700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 158.493122][T10739] IPVS: ftp: loaded support on port[0] = 21 [ 158.530390][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 158.538608][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 158.549716][T10700] 8021q: adding VLAN 0 to HW filter on device team0 [ 158.613229][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 158.622193][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 158.630900][ T8382] bridge0: port 1(bridge_slave_0) entered blocking state [ 158.638056][ T8382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 158.645843][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 158.654694][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 158.663231][ T8382] bridge0: port 2(bridge_slave_1) entered blocking state [ 158.670386][ T8382] bridge0: port 2(bridge_slave_1) entered forwarding state [ 158.681979][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 158.728654][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 158.738143][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 158.840557][T10734] chnl_net:caif_netlink_parms(): no params data found [ 158.854716][T10703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 158.863328][T10703] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 158.916134][T10703] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 158.924409][T10703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 158.933028][T10703] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 159.000116][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 159.012976][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 159.021681][T10733] chnl_net:caif_netlink_parms(): no params data found [ 159.086425][T10737] chnl_net:caif_netlink_parms(): no params data found [ 159.098552][T10734] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.105948][T10734] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.113617][T10734] device bridge_slave_0 entered promiscuous mode [ 159.122079][T10734] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.129215][T10734] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.137534][T10734] device bridge_slave_1 entered promiscuous mode [ 159.216785][T10733] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.227459][T10733] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.236182][T10733] device bridge_slave_0 entered promiscuous mode [ 159.243559][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 159.255317][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 159.265420][T10700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 159.283078][T10735] chnl_net:caif_netlink_parms(): no params data found [ 159.312250][T10733] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.320465][T10733] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.328768][T10733] device bridge_slave_1 entered promiscuous mode [ 159.360541][T10739] chnl_net:caif_netlink_parms(): no params data found [ 159.371564][T10734] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 159.389178][T10734] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 159.441966][T10733] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 159.452264][T10737] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.459760][T10737] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.468266][T10737] device bridge_slave_0 entered promiscuous mode [ 159.476379][T10737] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.483445][T10737] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.491981][T10737] device bridge_slave_1 entered promiscuous mode [ 159.532919][T10733] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 159.556626][T10735] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.563725][T10735] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.571828][T10735] device bridge_slave_0 entered promiscuous mode [ 159.582506][T10737] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 159.598778][T10734] team0: Port device team_slave_0 added [ 159.608184][T10700] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 159.621763][T10735] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.629142][T10735] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.637668][T10735] device bridge_slave_1 entered promiscuous mode [ 159.673051][T10737] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 159.685156][T10734] team0: Port device team_slave_1 added [ 159.692295][T10733] team0: Port device team_slave_0 added [ 159.705000][T10733] team0: Port device team_slave_1 added [ 159.716513][T10735] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 159.726367][T10739] bridge0: port 1(bridge_slave_0) entered blocking state [ 159.736644][T10739] bridge0: port 1(bridge_slave_0) entered disabled state [ 159.745883][T10739] device bridge_slave_0 entered promiscuous mode [ 159.775582][T10735] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 159.809221][T10739] bridge0: port 2(bridge_slave_1) entered blocking state [ 159.818960][T10739] bridge0: port 2(bridge_slave_1) entered disabled state [ 159.827842][T10739] device bridge_slave_1 entered promiscuous mode [ 159.896887][T10734] device hsr_slave_0 entered promiscuous mode [ 159.920922][T10734] device hsr_slave_1 entered promiscuous mode 10:28:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) [ 159.994233][T10734] debugfs: Directory 'hsr0' with parent '/' already present! [ 160.003157][T10735] team0: Port device team_slave_0 added [ 160.010710][T10735] team0: Port device team_slave_1 added [ 160.018401][T10737] team0: Port device team_slave_0 added [ 160.066992][T10733] device hsr_slave_0 entered promiscuous mode [ 160.104935][T10733] device hsr_slave_1 entered promiscuous mode [ 160.154101][T10733] debugfs: Directory 'hsr0' with parent '/' already present! [ 160.170986][T10739] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 160.191761][T10737] team0: Port device team_slave_1 added [ 160.372825][T10739] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 160.436826][T10735] device hsr_slave_0 entered promiscuous mode [ 160.474414][T10735] device hsr_slave_1 entered promiscuous mode 10:28:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) [ 160.513971][T10735] debugfs: Directory 'hsr0' with parent '/' already present! 10:28:48 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x22, 0x0) [ 160.685652][T10739] team0: Port device team_slave_0 added [ 160.747348][T10737] device hsr_slave_0 entered promiscuous mode [ 160.804243][T10737] device hsr_slave_1 entered promiscuous mode [ 160.864002][T10737] debugfs: Directory 'hsr0' with parent '/' already present! [ 161.018523][T10739] team0: Port device team_slave_1 added [ 161.097231][T10734] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.141367][T10734] 8021q: adding VLAN 0 to HW filter on device team0 [ 161.247247][T10739] device hsr_slave_0 entered promiscuous mode [ 161.294475][T10739] device hsr_slave_1 entered promiscuous mode [ 161.344067][T10739] debugfs: Directory 'hsr0' with parent '/' already present! [ 161.355636][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.363458][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.387926][T10733] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.433690][T10735] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.495432][T10737] 8021q: adding VLAN 0 to HW filter on device bond0 [ 161.503510][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.524833][ T8418] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.533343][ T8418] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.540503][ T8418] bridge0: port 1(bridge_slave_0) entered forwarding state [ 161.558961][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 161.579120][T10733] 8021q: adding VLAN 0 to HW filter on device team0 [ 161.603526][T10735] 8021q: adding VLAN 0 to HW filter on device team0 [ 161.625180][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 161.647633][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 161.668105][ T8395] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.675526][ T8395] bridge0: port 2(bridge_slave_1) entered forwarding state [ 161.693037][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.701721][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.719132][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 161.732837][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.761858][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.773070][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 161.819043][T10737] 8021q: adding VLAN 0 to HW filter on device team0 [ 161.845008][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 161.864695][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 161.884416][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 161.904455][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 161.913016][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 161.922744][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 161.932289][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 161.944191][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 161.952859][ T8785] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 161.962026][ T8785] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.964996][T10753] IPVS: ftp: loaded support on port[0] = 21 [ 161.969155][ T8785] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.001638][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.014592][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.023432][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.033377][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.040536][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.050603][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 162.059340][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 162.067684][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.074805][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.082305][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.091372][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.100020][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.107130][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.115088][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.123596][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.132086][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.139175][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.147539][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.156482][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.173329][T10734] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 162.184574][T10734] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 162.216437][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.224982][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 162.232860][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.244821][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.253050][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 162.262315][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 162.270967][T10702] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.278075][T10702] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.286165][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.294629][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.302759][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 162.311466][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.320021][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.329665][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.338086][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.347074][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.356127][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.367114][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.374924][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.382547][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.416010][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 162.428673][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.438010][ T8395] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.471016][T10734] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.493110][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 162.502727][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 162.511648][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.520346][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.529343][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.537861][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.570583][T10733] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 162.582218][T10733] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 162.600506][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 162.608746][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.617284][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.626190][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.634899][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.643292][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 162.652094][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 162.660666][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 162.669573][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 162.678677][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.687651][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.706786][T10737] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.721591][T10735] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 162.738808][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 162.747239][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 162.755864][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 162.859167][T10739] 8021q: adding VLAN 0 to HW filter on device bond0 [ 162.879329][T10733] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.904487][T10735] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.932720][T10737] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 162.966670][T10739] 8021q: adding VLAN 0 to HW filter on device team0 [ 162.974970][ T8629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 162.982970][ T8629] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 10:28:50 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) memfd_create(&(0x7f0000000440)='md5sumem1\'wlan0:selinux/Q/ppp1}\x00', 0x2) r0 = syz_open_dev$vcsa(&(0x7f0000000280)='/dev/vcsa#\x00', 0x6, 0x4c80c3) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000340)=""/124) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000500)={{{@in6=@mcast1, @in6=@dev, 0x4e22, 0x0, 0x4e23, 0x3ff, 0x2, 0x20, 0x20, 0x2c, 0x0, r1}, {0x99, 0x100, 0x10000, 0x1, 0x5, 0x9, 0x7, 0x8}, {0x4, 0x8001, 0x8, 0x4}, 0x80000000, 0x6e6bbb, 0x3, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d3, 0x33}, 0x2, @in=@multicast1, 0x0, 0x4, 0x2, 0x200, 0xfff, 0x7fffffff, 0xb221}}, 0xe8) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000002c0), &(0x7f0000000300)=0x4) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') mount$bpf(0x0, 0x0, &(0x7f0000000600)='bpf\x00', 0x0, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x0, 0x2) ioctl$EVIOCSABS2F(r2, 0x401845ef, &(0x7f0000000240)={0x2, 0x9e7, 0x3, 0x9, 0x7, 0x9}) [ 163.166284][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.200874][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.243166][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.250373][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.280635][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 10:28:51 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x22, 0x0) 10:28:51 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xe, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x9b}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 163.289644][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.300473][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.307659][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.316806][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.344718][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 163.371347][T10753] chnl_net:caif_netlink_parms(): no params data found 10:28:51 executing program 5: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x22, 0x0) [ 163.431922][T10739] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 163.454206][T10739] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 163.504516][T10703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 163.513371][T10703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 163.570690][T10703] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 163.609609][T10703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 163.635834][T10703] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 163.650146][T10703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 163.658885][T10703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 163.668864][T10703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 163.677641][T10703] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 10:28:51 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x22, 0x0) 10:28:51 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) open_by_handle_at(r0, &(0x7f0000000000)={0x37, 0x145, "9fa4bbff79dd7a46cfaf2e31b09a632cee8b159178de5686cee51b3e35958a0d839b3fbd397fd6ace6926dae6fb2a1"}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) accept4(r0, 0x0, 0x0, 0x0) 10:28:51 executing program 0: capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000000)={0xffffffff, 0xffffffffffffffff}) capset(&(0x7f0000000080)={0x20080522}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x2}) 10:28:51 executing program 2: open(&(0x7f0000000200)='./file0\x00', 0x502f2bb08dc976b9, 0x0) [ 164.096984][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.107576][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 164.400785][T10739] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 164.485778][T10753] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.503974][T10753] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.544724][T10753] device bridge_slave_0 entered promiscuous mode [ 164.576369][T10753] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.594048][T10753] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.611079][T10753] device bridge_slave_1 entered promiscuous mode [ 164.657791][T10753] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 164.680848][T10753] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 164.712113][T10753] team0: Port device team_slave_0 added [ 164.736921][T10753] team0: Port device team_slave_1 added 10:28:52 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) open_by_handle_at(r0, &(0x7f0000000000)={0x37, 0x145, "9fa4bbff79dd7a46cfaf2e31b09a632cee8b159178de5686cee51b3e35958a0d839b3fbd397fd6ace6926dae6fb2a1"}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) accept4(r0, 0x0, 0x0, 0x0) 10:28:52 executing program 2: open(&(0x7f0000000200)='./file0\x00', 0x502f2bb08dc976b9, 0x0) 10:28:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000001540)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000040)=@bridge_getneigh={0x20, 0x1e, 0x403, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x882}}, 0x20}}, 0x0) [ 164.847492][T10753] device hsr_slave_0 entered promiscuous mode [ 164.907277][T10753] device hsr_slave_1 entered promiscuous mode [ 164.964187][T10753] debugfs: Directory 'hsr0' with parent '/' already present! [ 165.002275][T10753] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.009458][T10753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.016932][T10753] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.024068][T10753] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.114653][ T22] bridge0: port 1(bridge_slave_0) entered disabled state [ 165.134083][ T22] bridge0: port 2(bridge_slave_1) entered disabled state [ 165.192426][T10753] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.231049][T10703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.239905][T10703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.261633][T10753] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.288716][T10703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.305901][T10703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.323748][T10703] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.331066][T10703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.378491][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.398542][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.419293][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.426477][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.445174][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.453766][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.462993][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.471729][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.480705][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.492488][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.501675][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.524645][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.533163][T10702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.550455][ T8629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.559295][ T8629] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.570800][T10753] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.595178][T10753] 8021q: adding VLAN 0 to HW filter on device batadv0 10:28:53 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x22, 0x0) 10:28:53 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 10:28:53 executing program 2: open(&(0x7f0000000200)='./file0\x00', 0x502f2bb08dc976b9, 0x0) 10:28:53 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) open_by_handle_at(r0, &(0x7f0000000000)={0x37, 0x145, "9fa4bbff79dd7a46cfaf2e31b09a632cee8b159178de5686cee51b3e35958a0d839b3fbd397fd6ace6926dae6fb2a1"}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) accept4(r0, 0x0, 0x0, 0x0) 10:28:53 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) open_by_handle_at(r0, &(0x7f0000000000)={0x37, 0x145, "9fa4bbff79dd7a46cfaf2e31b09a632cee8b159178de5686cee51b3e35958a0d839b3fbd397fd6ace6926dae6fb2a1"}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) accept4(r0, 0x0, 0x0, 0x0) 10:28:53 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r0, &(0x7f0000009400)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000340)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "1bfc97", 0x4d, 0x88, 0x0, @dev, @mcast2, {[], @udp={0x0, 0x4e20, 0x4d, 0x0, [], "e29607149378d33e1db1c73936c77aa3f7fac33b042bd368236862531934ecb1c373d6ea51369e92fb96cc7c6fe4e24d1fcafff87429e50b32881721afab69cc3712c37ed0"}}}}}}, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x22, 0x0) 10:28:53 executing program 2: open(&(0x7f0000000200)='./file0\x00', 0x502f2bb08dc976b9, 0x0) 10:28:53 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) open_by_handle_at(r0, &(0x7f0000000000)={0x37, 0x145, "9fa4bbff79dd7a46cfaf2e31b09a632cee8b159178de5686cee51b3e35958a0d839b3fbd397fd6ace6926dae6fb2a1"}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) accept4(r0, 0x0, 0x0, 0x0) 10:28:53 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) open_by_handle_at(r0, &(0x7f0000000000)={0x37, 0x145, "9fa4bbff79dd7a46cfaf2e31b09a632cee8b159178de5686cee51b3e35958a0d839b3fbd397fd6ace6926dae6fb2a1"}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) accept4(r0, 0x0, 0x0, 0x0) 10:28:53 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) open_by_handle_at(r0, &(0x7f0000000000)={0x37, 0x145, "9fa4bbff79dd7a46cfaf2e31b09a632cee8b159178de5686cee51b3e35958a0d839b3fbd397fd6ace6926dae6fb2a1"}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) accept4(r0, 0x0, 0x0, 0x0) 10:28:53 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) open_by_handle_at(r0, &(0x7f0000000000)={0x37, 0x145, "9fa4bbff79dd7a46cfaf2e31b09a632cee8b159178de5686cee51b3e35958a0d839b3fbd397fd6ace6926dae6fb2a1"}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) accept4(r0, 0x0, 0x0, 0x0) [ 166.226437][T10865] IPVS: ftp: loaded support on port[0] = 21 [ 166.311178][T10865] chnl_net:caif_netlink_parms(): no params data found [ 166.348457][T10865] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.355703][T10865] bridge0: port 1(bridge_slave_0) entered disabled state [ 166.363664][T10865] device bridge_slave_0 entered promiscuous mode [ 166.372712][T10865] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.381088][T10865] bridge0: port 2(bridge_slave_1) entered disabled state [ 166.391212][T10865] device bridge_slave_1 entered promiscuous mode [ 166.410541][T10865] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 166.422348][T10865] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 166.444641][T10865] team0: Port device team_slave_0 added [ 166.451271][T10865] team0: Port device team_slave_1 added [ 166.526807][T10865] device hsr_slave_0 entered promiscuous mode [ 166.565044][T10865] device hsr_slave_1 entered promiscuous mode [ 166.604102][T10865] debugfs: Directory 'hsr0' with parent '/' already present! [ 167.588232][T10865] bridge0: port 2(bridge_slave_1) entered blocking state [ 167.595379][T10865] bridge0: port 2(bridge_slave_1) entered forwarding state [ 167.602673][T10865] bridge0: port 1(bridge_slave_0) entered blocking state [ 167.609822][T10865] bridge0: port 1(bridge_slave_0) entered forwarding state [ 167.620123][ T3700] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.629687][ T3700] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.650173][T10870] IPVS: ftp: loaded support on port[0] = 21 [ 169.075932][T10865] 8021q: adding VLAN 0 to HW filter on device bond0 [ 169.577585][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 169.587416][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 169.600615][T10865] 8021q: adding VLAN 0 to HW filter on device team0 [ 169.608219][T10870] chnl_net:caif_netlink_parms(): no params data found [ 170.067145][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 170.076385][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 170.085541][ T22] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.092613][ T22] bridge0: port 1(bridge_slave_0) entered forwarding state [ 170.586713][ T8629] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 170.595665][ T8629] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 170.607415][ T8629] bridge0: port 2(bridge_slave_1) entered blocking state [ 170.614536][ T8629] bridge0: port 2(bridge_slave_1) entered forwarding state [ 170.636457][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 170.646880][ T8382] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 170.656295][T10870] bridge0: port 1(bridge_slave_0) entered blocking state [ 170.663395][T10870] bridge0: port 1(bridge_slave_0) entered disabled state [ 170.673167][T10870] device bridge_slave_0 entered promiscuous mode [ 171.137171][T10870] bridge0: port 2(bridge_slave_1) entered blocking state [ 171.150032][T10870] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.157927][T10870] device bridge_slave_1 entered promiscuous mode [ 171.167128][T10701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 171.177293][T10701] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 171.186532][T10701] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 171.663085][T10870] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 171.684618][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 171.693252][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 171.707499][ T8420] device bridge_slave_1 left promiscuous mode [ 171.713755][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.766219][ T8420] device bridge_slave_0 left promiscuous mode [ 171.772985][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.816463][ T8420] device bridge_slave_1 left promiscuous mode [ 171.822722][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.864870][ T8420] device bridge_slave_0 left promiscuous mode [ 171.871074][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 171.925471][ T8420] device bridge_slave_1 left promiscuous mode [ 171.931700][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 171.965898][ T8420] device bridge_slave_0 left promiscuous mode [ 171.973016][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.028211][ T8420] device bridge_slave_1 left promiscuous mode [ 172.035432][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.085260][ T8420] device bridge_slave_0 left promiscuous mode [ 172.092453][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.155273][ T8420] device bridge_slave_1 left promiscuous mode [ 172.161424][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.195085][ T8420] device bridge_slave_0 left promiscuous mode [ 172.201314][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 172.255869][ T8420] device bridge_slave_1 left promiscuous mode [ 172.262063][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 172.314947][ T8420] device bridge_slave_0 left promiscuous mode [ 172.321132][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.724435][ T8420] device hsr_slave_0 left promiscuous mode [ 184.784102][ T8420] device hsr_slave_1 left promiscuous mode [ 184.851555][ T8420] team0 (unregistering): Port device team_slave_1 removed [ 184.864513][ T8420] team0 (unregistering): Port device team_slave_0 removed [ 184.877929][ T8420] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 184.920390][ T8420] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 184.993667][ T8420] bond0 (unregistering): Released all slaves [ 185.144529][ T8420] device hsr_slave_0 left promiscuous mode [ 185.194166][ T8420] device hsr_slave_1 left promiscuous mode [ 185.267637][ T8420] team0 (unregistering): Port device team_slave_1 removed [ 185.281348][ T8420] team0 (unregistering): Port device team_slave_0 removed [ 185.293695][ T8420] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 185.330590][ T8420] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 185.423067][ T8420] bond0 (unregistering): Released all slaves [ 185.574371][ T8420] device hsr_slave_0 left promiscuous mode [ 185.624192][ T8420] device hsr_slave_1 left promiscuous mode [ 185.681232][ T8420] team0 (unregistering): Port device team_slave_1 removed [ 185.693842][ T8420] team0 (unregistering): Port device team_slave_0 removed [ 185.706682][ T8420] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 185.754287][ T8420] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 185.850930][ T8420] bond0 (unregistering): Released all slaves [ 186.024368][ T8420] device hsr_slave_0 left promiscuous mode [ 186.064212][ T8420] device hsr_slave_1 left promiscuous mode [ 186.127853][ T8420] team0 (unregistering): Port device team_slave_1 removed [ 186.138666][ T8420] team0 (unregistering): Port device team_slave_0 removed [ 186.151638][ T8420] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 186.192079][ T8420] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 186.282440][ T8420] bond0 (unregistering): Released all slaves [ 186.405914][ T8420] device hsr_slave_0 left promiscuous mode [ 186.444543][ T8420] device hsr_slave_1 left promiscuous mode [ 186.498059][ T8420] team0 (unregistering): Port device team_slave_1 removed [ 186.513678][ T8420] team0 (unregistering): Port device team_slave_0 removed [ 186.526681][ T8420] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 186.557834][ T8420] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 186.630618][ T8420] bond0 (unregistering): Released all slaves [ 186.804446][ T8420] device hsr_slave_0 left promiscuous mode [ 186.854078][ T8420] device hsr_slave_1 left promiscuous mode [ 186.927798][ T8420] team0 (unregistering): Port device team_slave_1 removed [ 186.941297][ T8420] team0 (unregistering): Port device team_slave_0 removed [ 186.960026][ T8420] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 186.988631][ T8420] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 187.062263][ T8420] bond0 (unregistering): Released all slaves [ 187.198197][T10870] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.212863][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 187.221689][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.230667][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 187.239098][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.250127][T10865] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.278021][T10870] team0: Port device team_slave_0 added [ 187.288516][T10870] team0: Port device team_slave_1 added [ 187.360652][T10870] device hsr_slave_0 entered promiscuous mode [ 187.404166][T10870] device hsr_slave_1 entered promiscuous mode [ 187.458318][T10865] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 187.538088][T10870] 8021q: adding VLAN 0 to HW filter on device bond0 [ 187.553683][T10701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 187.562312][T10701] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 187.573096][T10870] 8021q: adding VLAN 0 to HW filter on device team0 [ 187.585903][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 187.609627][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 187.619251][ T3700] bridge0: port 1(bridge_slave_0) entered blocking state [ 187.626364][ T3700] bridge0: port 1(bridge_slave_0) entered forwarding state 10:29:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000001540)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000040)=@bridge_getneigh={0x20, 0x1e, 0x403, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x882}}, 0x20}}, 0x0) 10:29:15 executing program 5: r0 = memfd_create(&(0x7f0000000000)='-vboxnet0\x00', 0x6) ftruncate(r0, 0x0) [ 187.656454][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 187.665841][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 187.675177][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 187.683729][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 187.690854][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 187.700970][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 187.737882][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 187.755656][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 187.777843][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 187.793692][T10870] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 187.811617][T10870] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 187.838177][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 187.858583][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 187.868721][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 187.882195][ T3700] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 187.918634][T10870] 8021q: adding VLAN 0 to HW filter on device batadv0 10:29:15 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 10:29:15 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) open_by_handle_at(r0, &(0x7f0000000000)={0x37, 0x145, "9fa4bbff79dd7a46cfaf2e31b09a632cee8b159178de5686cee51b3e35958a0d839b3fbd397fd6ace6926dae6fb2a1"}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) accept4(r0, 0x0, 0x0, 0x0) 10:29:15 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) open_by_handle_at(r0, &(0x7f0000000000)={0x37, 0x145, "9fa4bbff79dd7a46cfaf2e31b09a632cee8b159178de5686cee51b3e35958a0d839b3fbd397fd6ace6926dae6fb2a1"}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) accept4(r0, 0x0, 0x0, 0x0) 10:29:15 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) open_by_handle_at(r0, &(0x7f0000000000)={0x37, 0x145, "9fa4bbff79dd7a46cfaf2e31b09a632cee8b159178de5686cee51b3e35958a0d839b3fbd397fd6ace6926dae6fb2a1"}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) accept4(r0, 0x0, 0x0, 0x0) 10:29:15 executing program 5: r0 = memfd_create(&(0x7f0000000000)='-vboxnet0\x00', 0x6) ftruncate(r0, 0x0) 10:29:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000001540)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000040)=@bridge_getneigh={0x20, 0x1e, 0x403, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x882}}, 0x20}}, 0x0) 10:29:16 executing program 5: r0 = memfd_create(&(0x7f0000000000)='-vboxnet0\x00', 0x6) ftruncate(r0, 0x0) 10:29:16 executing program 5: r0 = memfd_create(&(0x7f0000000000)='-vboxnet0\x00', 0x6) ftruncate(r0, 0x0) 10:29:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000001540)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000040)=@bridge_getneigh={0x20, 0x1e, 0x403, 0x0, 0x0, {0x7, 0x0, 0x0, 0x0, 0x882}}, 0x20}}, 0x0) 10:29:16 executing program 5: r0 = memfd_create(&(0x7f0000000000)='-vboxnet0\x00', 0x6) ftruncate(r0, 0x0) 10:29:16 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) open_by_handle_at(r0, &(0x7f0000000000)={0x37, 0x145, "9fa4bbff79dd7a46cfaf2e31b09a632cee8b159178de5686cee51b3e35958a0d839b3fbd397fd6ace6926dae6fb2a1"}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) accept4(r0, 0x0, 0x0, 0x0) 10:29:16 executing program 3: syz_emit_ethernet(0x2d2, &(0x7f0000000100)={@local, @link_local={0x25}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x29c, 0x2b, 0x0, @local={0xfe, 0x8a00, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x294, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 10:29:16 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 10:29:16 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key(0x0, &(0x7f0000000180)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000440)='X', 0x1, 0xfffffffffffffffe) open_by_handle_at(r0, &(0x7f0000000000)={0x37, 0x145, "9fa4bbff79dd7a46cfaf2e31b09a632cee8b159178de5686cee51b3e35958a0d839b3fbd397fd6ace6926dae6fb2a1"}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) accept4(r0, 0x0, 0x0, 0x0) 10:29:16 executing program 3: syz_emit_ethernet(0x2d2, &(0x7f0000000100)={@local, @link_local={0x25}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x29c, 0x2b, 0x0, @local={0xfe, 0x8a00, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x294, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 10:29:16 executing program 5: r0 = memfd_create(&(0x7f0000000000)='-vboxnet0\x00', 0x6) ftruncate(r0, 0x0) 10:29:16 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:16 executing program 4: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) recvmmsg(r1, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000027c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 10:29:16 executing program 0: syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='gid=', @ANYRESHEX]) 10:29:16 executing program 5: r0 = memfd_create(&(0x7f0000000000)='-vboxnet0\x00', 0x6) ftruncate(r0, 0x0) 10:29:16 executing program 3: syz_emit_ethernet(0x2d2, &(0x7f0000000100)={@local, @link_local={0x25}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x29c, 0x2b, 0x0, @local={0xfe, 0x8a00, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x294, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 10:29:16 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) recvmmsg(r1, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000027c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 10:29:16 executing program 4: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:17 executing program 5: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:17 executing program 0: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:17 executing program 3: syz_emit_ethernet(0x2d2, &(0x7f0000000100)={@local, @link_local={0x25}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x29c, 0x2b, 0x0, @local={0xfe, 0x8a00, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x294, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 10:29:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) recvmmsg(r1, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000027c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 10:29:17 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:17 executing program 4: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) recvmmsg(r1, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000027c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 10:29:17 executing program 3: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:17 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:17 executing program 4: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:17 executing program 0: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:17 executing program 2: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:17 executing program 5: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:18 executing program 3: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:18 executing program 5: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:18 executing program 1: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:18 executing program 0: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:18 executing program 4: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:18 executing program 2: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:18 executing program 3: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:19 executing program 1: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) recvmmsg(r1, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000027c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 10:29:19 executing program 2: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) recvmmsg(r1, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000027c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 10:29:19 executing program 4: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) recvmmsg(r1, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000027c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 10:29:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) recvmmsg(r1, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000027c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 10:29:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) recvmmsg(r1, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000027c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 10:29:19 executing program 1: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) recvmmsg(r1, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000027c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 10:29:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) recvmmsg(r1, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000027c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 10:29:19 executing program 4: ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) semget$private(0x0, 0x0, 0x20) ioctl$KVM_GET_XSAVE(0xffffffffffffffff, 0x9000aea4, 0x0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x4004) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) 10:29:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) recvmmsg(r1, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000027c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 10:29:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) recvmmsg(r1, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000027c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 10:29:20 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) recvmmsg(r1, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000027c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 10:29:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) recvmmsg(r1, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000027c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 10:29:20 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:20 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:20 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="71e67a15cdf0319fa22748f9a91c66b3", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) recvmmsg(r1, &(0x7f0000003940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f00000027c0)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 10:29:20 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:20 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:20 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:20 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:20 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:21 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:21 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:21 executing program 5: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:21 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:21 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:21 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:21 executing program 4: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:21 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:21 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000014c0)=@file={0x1, './file0/bus\x00'}, 0x6e) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(0x0, &(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0, 0x0, 0x5400, 0x0) chown(&(0x7f00000000c0)='./file0\x00', r2, 0x0) open$dir(&(0x7f00000001c0)='./file0/bus\x00', 0x40, 0x0) 10:29:21 executing program 0: r0 = inotify_init1(0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000001280)='./file0\x00', 0x20000015) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='security.capability\x00', 0x0, 0x0, 0x0) 10:29:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x2c, r1, 0x205, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x4}]}]}]}, 0x2c}}, 0x0) 10:29:21 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:22 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4204, r1, 0x0, 0x0) [ 194.206307][T11231] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 10:29:22 executing program 0: r0 = inotify_init1(0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000001280)='./file0\x00', 0x20000015) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='security.capability\x00', 0x0, 0x0, 0x0) [ 194.255815][T11237] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 10:29:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x2c, r1, 0x205, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x4}]}]}]}, 0x2c}}, 0x0) 10:29:22 executing program 0: r0 = inotify_init1(0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000001280)='./file0\x00', 0x20000015) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='security.capability\x00', 0x0, 0x0, 0x0) 10:29:22 executing program 0: r0 = inotify_init1(0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000001280)='./file0\x00', 0x20000015) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='security.capability\x00', 0x0, 0x0, 0x0) 10:29:22 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4204, r1, 0x0, 0x0) [ 194.685029][T11256] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 10:29:22 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4204, r1, 0x0, 0x0) 10:29:22 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4204, r1, 0x0, 0x0) 10:29:22 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:22 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x2c, r1, 0x205, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x4}]}]}]}, 0x2c}}, 0x0) 10:29:22 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4204, r1, 0x0, 0x0) 10:29:22 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4204, r1, 0x0, 0x0) 10:29:22 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4204, r1, 0x0, 0x0) [ 195.037086][T11274] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 10:29:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x2c, r1, 0x205, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x4}]}]}]}, 0x2c}}, 0x0) 10:29:23 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:23 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4204, r1, 0x0, 0x0) [ 195.255370][T11282] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 10:29:23 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4204, r1, 0x0, 0x0) 10:29:23 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4204, r1, 0x0, 0x0) 10:29:23 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:23 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:23 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:23 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:23 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:23 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:23 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 196.011416][T11310] debugfs: Directory 'loop0' with parent 'block' already present! 10:29:24 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:24 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:24 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:24 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 196.451331][T11330] debugfs: Directory 'loop0' with parent 'block' already present! 10:29:24 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 196.889411][T11339] debugfs: Directory 'loop0' with parent 'block' already present! 10:29:24 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:24 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 197.058257][T11349] debugfs: Directory 'loop0' with parent 'block' already present! 10:29:25 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 197.215143][T11348] debugfs: Directory 'loop0' with parent 'block' already present! 10:29:25 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:25 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:25 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:25 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:25 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:25 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:25 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:26 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:26 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:26 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 198.285981][T11399] debugfs: Directory 'loop0' with parent 'block' already present! 10:29:26 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:26 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:26 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:26 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 198.774802][T11421] debugfs: Directory 'loop0' with parent 'block' already present! 10:29:26 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:26 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:26 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:27 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:27 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:27 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 199.309774][T11449] debugfs: Directory 'loop0' with parent 'block' already present! 10:29:27 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4204, r1, 0x0, 0x0) 10:29:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x2c, r1, 0x205, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x4}]}]}]}, 0x2c}}, 0x0) 10:29:27 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x2c, r1, 0x205, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x4}]}]}]}, 0x2c}}, 0x0) 10:29:27 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4204, r1, 0x0, 0x0) [ 199.781330][T11483] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 10:29:27 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x2c, r1, 0x205, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x4}]}]}]}, 0x2c}}, 0x0) 10:29:27 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) [ 199.968354][T11477] debugfs: Directory 'loop0' with parent 'block' already present! 10:29:27 executing program 4: r0 = inotify_init1(0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000001280)='./file0\x00', 0x20000015) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='security.capability\x00', 0x0, 0x0, 0x0) [ 200.031808][T11486] netlink: 'syz-executor.5': attribute type 1 has an invalid length. [ 200.086422][T11492] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 10:29:28 executing program 3: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4204, r1, 0x0, 0x0) 10:29:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x2c, r1, 0x205, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x4}]}]}]}, 0x2c}}, 0x0) 10:29:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x2c, r1, 0x205, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x4}]}]}]}, 0x2c}}, 0x0) 10:29:28 executing program 4: r0 = inotify_init1(0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000001280)='./file0\x00', 0x20000015) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='security.capability\x00', 0x0, 0x0, 0x0) 10:29:28 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:28 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x4, {0xa, 0x4e20, 0xfffffffffffffc01, @empty, 0x8}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000140), r1}}, 0x18) ioctl$BLKGETSIZE64(r0, 0x80041272, 0x0) symlink(&(0x7f0000000280)='./file0\x00', 0x0) ioctl$TIOCNXCL(r0, 0x540d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x87, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$clear(0x7, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) timer_create(0x0, 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000380)=[0x1, 0x6], 0xa7) getpgrp(0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000001a00)) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f00000002c0)) ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, 0x0) fcntl$setlease(r0, 0x400, 0x0) 10:29:28 executing program 3: r0 = inotify_init1(0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000001280)='./file0\x00', 0x20000015) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='security.capability\x00', 0x0, 0x0, 0x0) [ 200.479230][T11511] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 10:29:28 executing program 4: r0 = inotify_init1(0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000001280)='./file0\x00', 0x20000015) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='security.capability\x00', 0x0, 0x0, 0x0) [ 200.529892][T11516] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 10:29:28 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x2c, r1, 0x205, 0x0, 0x0, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x4}]}]}]}, 0x2c}}, 0x0) 10:29:28 executing program 1: setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000200), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) [ 200.724694][T11526] netlink: 'syz-executor.5': attribute type 1 has an invalid length. 10:29:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 10:29:28 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x58000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff11, 0x0, @ipv4={[0x3580], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 10:29:28 executing program 3: r0 = inotify_init1(0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000001280)='./file0\x00', 0x20000015) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='security.capability\x00', 0x0, 0x0, 0x0) 10:29:28 executing program 0: unshare(0x400) r0 = socket$inet_dccp(0x2, 0x6, 0x0) fgetxattr(r0, &(0x7f0000000300)=@known='system.sockprotoname\x00', 0x0, 0x0) 10:29:28 executing program 2: syz_emit_ethernet(0x584, &(0x7f0000000000)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x3, {0x3c7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local={0xac, 0x223}, @dev={0xac, 0x70}, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 10:29:29 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x58000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff11, 0x0, @ipv4={[0x3580], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 10:29:29 executing program 0: unshare(0x400) r0 = socket$inet_dccp(0x2, 0x6, 0x0) fgetxattr(r0, &(0x7f0000000300)=@known='system.sockprotoname\x00', 0x0, 0x0) 10:29:29 executing program 3: r0 = inotify_init1(0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000001280)='./file0\x00', 0x20000015) mount$9p_fd(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000680)='9p\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='security.capability\x00', 0x0, 0x0, 0x0) 10:29:29 executing program 2: syz_emit_ethernet(0x584, &(0x7f0000000000)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x3, {0x3c7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local={0xac, 0x223}, @dev={0xac, 0x70}, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 10:29:29 executing program 0: unshare(0x400) r0 = socket$inet_dccp(0x2, 0x6, 0x0) fgetxattr(r0, &(0x7f0000000300)=@known='system.sockprotoname\x00', 0x0, 0x0) 10:29:29 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x58000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff11, 0x0, @ipv4={[0x3580], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) [ 201.431474][T11533] XFS (loop1): Mounting V4 Filesystem [ 201.584848][T11533] XFS (loop1): empty log check failed [ 201.590276][T11533] XFS (loop1): log mount/recovery failed: error -5 [ 201.695010][T11533] XFS (loop1): log mount failed 10:29:29 executing program 1: setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000200), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$xfs(&(0x7f0000000140)='xfs\x00', &(0x7f0000000000)='./file0\x00', 0xffffffff, 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)="5846534200001000000000000000100000000000000000000000000000000000984f0b5042b64b06bc86cba3e6cc3f80020000000000000000000000000000800000f9ffffffff8000000000000000821c000001000010000000000100000000000006c034a40200010000100700000000000000000000000c0908040c", 0x7d}], 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) 10:29:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 10:29:29 executing program 3: unshare(0x400) r0 = socket$inet_dccp(0x2, 0x6, 0x0) fgetxattr(r0, &(0x7f0000000300)=@known='system.sockprotoname\x00', 0x0, 0x0) 10:29:29 executing program 2: syz_emit_ethernet(0x584, &(0x7f0000000000)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x3, {0x3c7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local={0xac, 0x223}, @dev={0xac, 0x70}, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 10:29:29 executing program 0: unshare(0x400) r0 = socket$inet_dccp(0x2, 0x6, 0x0) fgetxattr(r0, &(0x7f0000000300)=@known='system.sockprotoname\x00', 0x0, 0x0) 10:29:29 executing program 4: syz_emit_ethernet(0x66, &(0x7f0000000180)={@link_local={0x1, 0x80, 0xc2, 0x4888, 0x58000000}, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0xffffff11, 0x0, @ipv4={[0x3580], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff80, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 10:29:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 10:29:30 executing program 2: syz_emit_ethernet(0x584, &(0x7f0000000000)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x3, {0x3c7, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local={0xac, 0x223}, @dev={0xac, 0x70}, {[@timestamp={0x8, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 10:29:30 executing program 3: unshare(0x400) r0 = socket$inet_dccp(0x2, 0x6, 0x0) fgetxattr(r0, &(0x7f0000000300)=@known='system.sockprotoname\x00', 0x0, 0x0) 10:29:30 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 10:29:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4) r1 = socket$inet_sctp(0x2, 0x801, 0x84) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 10:29:30 executing program 3: unshare(0x400) r0 = socket$inet_dccp(0x2, 0x6, 0x0) fgetxattr(r0, &(0x7f0000000300)=@known='system.sockprotoname\x00', 0x0, 0x0) [ 202.938339][T11610] XFS (loop1): Mounting V4 Filesystem [ 203.145613][T11610] ================================================================== [ 203.153955][T11610] BUG: KASAN: use-after-free in xlog_alloc_log+0x102b/0x11f0 [ 203.161329][T11610] Read of size 8 at addr ffff8880a922bbd0 by task syz-executor.1/11610 [ 203.169567][T11610] [ 203.171904][T11610] CPU: 0 PID: 11610 Comm: syz-executor.1 Not tainted 5.2.0+ #28 [ 203.179532][T11610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.189579][T11610] Call Trace: [ 203.192884][T11610] dump_stack+0x1d8/0x2f8 [ 203.197243][T11610] print_address_description+0x75/0x5b0 [ 203.202786][T11610] ? log_buf_vmcoreinfo_setup+0x153/0x153 [ 203.208496][T11610] ? __kasan_report+0xbf/0x1c0 [ 203.213535][T11610] __kasan_report+0x14b/0x1c0 [ 203.218395][T11610] ? xlog_alloc_log+0x102b/0x11f0 [ 203.223432][T11610] kasan_report+0x26/0x50 [ 203.227769][T11610] __asan_report_load8_noabort+0x14/0x20 [ 203.233410][T11610] xlog_alloc_log+0x102b/0x11f0 [ 203.238282][T11610] xfs_log_mount+0xc6/0x750 [ 203.242794][T11610] xfs_mountfs+0xcc4/0x1d50 [ 203.247305][T11610] ? xfs_default_resblks+0x70/0x70 [ 203.252420][T11610] ? xfs_mru_cache_create+0x479/0x5c0 [ 203.257807][T11610] xfs_fs_fill_super+0x1035/0x1480 [ 203.263018][T11610] mount_bdev+0x31c/0x440 [ 203.267336][T11610] ? xfs_fs_mount+0x40/0x40 [ 203.271846][T11610] xfs_fs_mount+0x34/0x40 [ 203.276186][T11610] legacy_get_tree+0xf9/0x1a0 [ 203.280866][T11610] ? xfs_destroy_zones+0x310/0x310 [ 203.285976][T11610] vfs_get_tree+0x8f/0x360 [ 203.290399][T11610] do_mount+0x1813/0x2730 [ 203.294752][T11610] ? check_preemption_disabled+0xa9/0x2a0 [ 203.300474][T11610] ? copy_mount_string+0x30/0x30 [ 203.305412][T11610] ? retint_kernel+0x2b/0x2b [ 203.310016][T11610] ? copy_mount_options+0x248/0x370 [ 203.315205][T11610] ? copy_mount_options+0x22e/0x370 [ 203.320573][T11610] ? copy_mount_options+0x23b/0x370 [ 203.325983][T11610] ? copy_mount_options+0x2d8/0x370 [ 203.331176][T11610] ksys_mount+0xcc/0x100 [ 203.335433][T11610] __x64_sys_mount+0xbf/0xd0 [ 203.340192][T11610] do_syscall_64+0xfe/0x140 [ 203.344965][T11610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.350844][T11610] RIP: 0033:0x45c26a [ 203.354744][T11610] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 203.374435][T11610] RSP: 002b:00007f2c05750a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 203.382841][T11610] RAX: ffffffffffffffda RBX: 00007f2c05750b40 RCX: 000000000045c26a [ 203.390906][T11610] RDX: 00007f2c05750ae0 RSI: 0000000020000000 RDI: 00007f2c05750b00 [ 203.398959][T11610] RBP: 0000000000000001 R08: 00007f2c05750b40 R09: 00007f2c05750ae0 [ 203.406944][T11610] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 203.414991][T11610] R13: 00000000004c88f7 R14: 00000000004df540 R15: 00000000ffffffff [ 203.423572][T11610] [ 203.425896][T11610] Allocated by task 11610: [ 203.430750][T11610] __kasan_kmalloc+0x11c/0x1b0 [ 203.435591][T11610] kasan_kmalloc+0x9/0x10 [ 203.439992][T11610] __kmalloc+0x254/0x340 [ 203.444223][T11610] kmem_alloc+0x5a0/0x6a0 [ 203.448538][T11610] xlog_alloc_log+0x488/0x11f0 [ 203.453292][T11610] xfs_log_mount+0xc6/0x750 [ 203.457789][T11610] xfs_mountfs+0xcc4/0x1d50 [ 203.462282][T11610] xfs_fs_fill_super+0x1035/0x1480 [ 203.467385][T11610] mount_bdev+0x31c/0x440 [ 203.471700][T11610] xfs_fs_mount+0x34/0x40 [ 203.476019][T11610] legacy_get_tree+0xf9/0x1a0 [ 203.480680][T11610] vfs_get_tree+0x8f/0x360 [ 203.485085][T11610] do_mount+0x1813/0x2730 [ 203.489413][T11610] ksys_mount+0xcc/0x100 [ 203.493664][T11610] __x64_sys_mount+0xbf/0xd0 [ 203.498245][T11610] do_syscall_64+0xfe/0x140 [ 203.502747][T11610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.511622][T11610] [ 203.520291][T11610] Freed by task 11610: [ 203.524366][T11610] __kasan_slab_free+0x12a/0x1e0 [ 203.529294][T11610] kasan_slab_free+0xe/0x10 [ 203.533808][T11610] kfree+0x115/0x200 [ 203.537698][T11610] kvfree+0x47/0x50 [ 203.541496][T11610] xlog_alloc_log+0x1069/0x11f0 [ 203.546354][T11610] xfs_log_mount+0xc6/0x750 [ 203.550845][T11610] xfs_mountfs+0xcc4/0x1d50 [ 203.555340][T11610] xfs_fs_fill_super+0x1035/0x1480 [ 203.560443][T11610] mount_bdev+0x31c/0x440 [ 203.564761][T11610] xfs_fs_mount+0x34/0x40 [ 203.569165][T11610] legacy_get_tree+0xf9/0x1a0 [ 203.573834][T11610] vfs_get_tree+0x8f/0x360 [ 203.578257][T11610] do_mount+0x1813/0x2730 [ 203.582601][T11610] ksys_mount+0xcc/0x100 [ 203.586851][T11610] __x64_sys_mount+0xbf/0xd0 [ 203.591436][T11610] do_syscall_64+0xfe/0x140 [ 203.595931][T11610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.601803][T11610] [ 203.604122][T11610] The buggy address belongs to the object at ffff8880a922bb40 [ 203.604122][T11610] which belongs to the cache kmalloc-1k of size 1024 [ 203.618175][T11610] The buggy address is located 144 bytes inside of [ 203.618175][T11610] 1024-byte region [ffff8880a922bb40, ffff8880a922bf40) [ 203.631627][T11610] The buggy address belongs to the page: [ 203.637259][T11610] page:ffffea0002a48a80 refcount:1 mapcount:0 mapping:ffff8880aa400c40 index:0x0 compound_mapcount: 0 [ 203.648362][T11610] flags: 0x1fffc0000010200(slab|head) [ 203.653728][T11610] raw: 01fffc0000010200 ffffea00020c0588 ffffea00027fdc88 ffff8880aa400c40 [ 203.662415][T11610] raw: 0000000000000000 ffff8880a922a040 0000000100000007 0000000000000000 [ 203.671087][T11610] page dumped because: kasan: bad access detected [ 203.677499][T11610] [ 203.679816][T11610] Memory state around the buggy address: [ 203.685436][T11610] ffff8880a922ba80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 203.693493][T11610] ffff8880a922bb00: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 203.701550][T11610] >ffff8880a922bb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 203.709613][T11610] ^ [ 203.716299][T11610] ffff8880a922bc00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 203.724394][T11610] ffff8880a922bc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 203.732720][T11610] ================================================================== [ 203.740771][T11610] Disabling lock debugging due to kernel taint [ 203.813900][T11610] Kernel panic - not syncing: panic_on_warn set ... [ 203.820537][T11610] CPU: 1 PID: 11610 Comm: syz-executor.1 Tainted: G B 5.2.0+ #28 [ 203.829580][T11610] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.839638][T11610] Call Trace: [ 203.843028][T11610] dump_stack+0x1d8/0x2f8 [ 203.847390][T11610] panic+0x29b/0x7d9 [ 203.851323][T11610] ? trace_hardirqs_on+0x34/0x80 [ 203.856366][T11610] ? nmi_panic+0x97/0x97 [ 203.858418][ T3894] kobject: 'loop4' (000000004f1200f4): kobject_uevent_env [ 203.860615][T11610] ? ___preempt_schedule+0x16/0x18 [ 203.860629][T11610] ? trace_hardirqs_on+0x34/0x80 [ 203.860647][T11610] __kasan_report+0x1bb/0x1c0 [ 203.869049][ T3894] kobject: 'loop4' (000000004f1200f4): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 203.873380][T11610] ? xlog_alloc_log+0x102b/0x11f0 [ 203.873395][T11610] kasan_report+0x26/0x50 [ 203.873410][T11610] __asan_report_load8_noabort+0x14/0x20 [ 203.908127][T11610] xlog_alloc_log+0x102b/0x11f0 [ 203.912961][T11610] xfs_log_mount+0xc6/0x750 [ 203.917510][T11610] xfs_mountfs+0xcc4/0x1d50 [ 203.922045][T11610] ? xfs_default_resblks+0x70/0x70 [ 203.927149][T11610] ? xfs_mru_cache_create+0x479/0x5c0 [ 203.932504][T11610] xfs_fs_fill_super+0x1035/0x1480 [ 203.937943][T11610] mount_bdev+0x31c/0x440 [ 203.942247][T11610] ? xfs_fs_mount+0x40/0x40 [ 203.946730][T11610] xfs_fs_mount+0x34/0x40 [ 203.951050][T11610] legacy_get_tree+0xf9/0x1a0 [ 203.955803][T11610] ? xfs_destroy_zones+0x310/0x310 [ 203.960890][T11610] vfs_get_tree+0x8f/0x360 [ 203.965286][T11610] do_mount+0x1813/0x2730 [ 203.969627][T11610] ? check_preemption_disabled+0xa9/0x2a0 [ 203.975324][T11610] ? copy_mount_string+0x30/0x30 [ 203.980269][T11610] ? retint_kernel+0x2b/0x2b [ 203.985113][T11610] ? copy_mount_options+0x248/0x370 [ 203.990298][T11610] ? copy_mount_options+0x22e/0x370 [ 203.995473][T11610] ? copy_mount_options+0x23b/0x370 [ 204.000650][T11610] ? copy_mount_options+0x2d8/0x370 [ 204.005853][T11610] ksys_mount+0xcc/0x100 [ 204.010106][T11610] __x64_sys_mount+0xbf/0xd0 [ 204.014695][T11610] do_syscall_64+0xfe/0x140 [ 204.019199][T11610] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.025067][T11610] RIP: 0033:0x45c26a [ 204.028945][T11610] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 204.048531][T11610] RSP: 002b:00007f2c05750a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 204.057030][T11610] RAX: ffffffffffffffda RBX: 00007f2c05750b40 RCX: 000000000045c26a [ 204.064995][T11610] RDX: 00007f2c05750ae0 RSI: 0000000020000000 RDI: 00007f2c05750b00 [ 204.072965][T11610] RBP: 0000000000000001 R08: 00007f2c05750b40 R09: 00007f2c05750ae0 [ 204.080940][T11610] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 204.088922][T11610] R13: 00000000004c88f7 R14: 00000000004df540 R15: 00000000ffffffff [ 204.097879][T11610] Kernel Offset: disabled [ 204.102209][T11610] Rebooting in 86400 seconds..