up interface bond_slave_1 [ 227.455971] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 227.539815] bond0 (unregistering): Released all slaves 17:49:12 executing program 2: r0 = socket$inet(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r0, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f00000001c0)='*', 0x1}], 0x1}, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$nbd(r1, &(0x7f00000000c0)={0x67446698, 0x1, 0x3, 0x4, 0x3, "d77bc38e54f3c2e7bdcbf9d8239e71840b7444fe686e87ee"}, 0x28) recvmsg$kcm(r1, &(0x7f0000000200)={&(0x7f0000000000)=@l2, 0x80, 0x0}, 0x0) 17:49:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x0, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0}, 0x208) 17:49:12 executing program 5: ioctl$VIDIOC_QUERYBUF(0xffffffffffffff9c, 0xc0585609, &(0x7f0000000080)={0x9, 0x6, 0x4, 0xc1000, {}, {0x1, 0xf, 0x800, 0x98f, 0x43c9156d, 0x8001, "019b6b82"}, 0x100, 0x4, @fd=0xffffffffffffff9c, 0x4}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r1) 17:49:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80000, 0x0) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f00000000c0)="fbf152a009e5a0491e1f054c657045466c172d6649f3b9028a55e8c11fb7bc62a78dda9faeb39ae9230491bc7a76b703a009fa41efb7553df94c599271c06e43ea34219b072fb1e49b42dea575e87edb72932ae00da5647120a7242afae16207472d99e691ec593fd50db7146d63e1fb71a92edf0947dc25a07a09a4c9") getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e21, 0x8, @rand_addr="d27dda22e89d07759255613d7c200bdc", 0x1}}, 0x5, 0x7, 0x8, 0x2, 0x87b}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000300)={r3, @in6={{0xa, 0x4e21, 0x5, @mcast2, 0x6}}, 0x2, 0x8001, 0x8766, 0xff, 0x6}, &(0x7f0000000240)=0x98) ioctl$KVM_GET_MP_STATE(r2, 0x8004ae98, &(0x7f0000000080)) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r4, &(0x7f000000d000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000040)={0x3f, 0x1, 0xb}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 17:49:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_sctp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) 17:49:12 executing program 5: r0 = syz_open_dev$sndmidi(&(0x7f0000000040)='/dev/snd/midiC#D#\x00', 0xe440, 0x1) write$binfmt_script(r0, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x310) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080), 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0xbcda34450b800b7a, 0x40000000000a132, 0xffffffffffffffff, 0x0) write$cgroup_type(r0, &(0x7f00000000c0)='threaded\x00', 0xff4c) 17:49:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x0, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0}, 0x208) 17:49:12 executing program 0: r0 = socket$pppoe(0x18, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000a02}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x409, 0x70bd2d, 0x25dfdbff, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x800) openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000001c0)=0x7, 0x4) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) modify_ldt$write(0x1, &(0x7f00007a7ff0)={0xd1f}, 0x10) modify_ldt$write2(0x11, &(0x7f0000000000), 0x10) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) io_setup(0x104, &(0x7f0000000040)) getsockopt$inet_udp_int(r1, 0x11, 0x67, 0x0, &(0x7f0000000180)) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f00000002c0)=""/143) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) connect$pppoe(r0, &(0x7f00000000c0)={0x18, 0x0, {0x1, @local, 'team0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x255, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000380)={@in6={{0xa, 0x4e22, 0x2, @loopback, 0x3}}, 0x0, 0x5, 0x0, "25acbd6332fd6c6455280faf9d156d290d6b764dab106dc6a93177153c8bfbb4fdd31325d3dd7bf09e14bc4b7bd79f14a3e94d740306c04d93afaf9bec538d267f1bf7fd36430907a49fcd86922b3da6"}, 0xd8) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 17:49:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x0, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[]}, 0x78) 17:49:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mmap(&(0x7f00008ae000/0x4000)=nil, 0x4000, 0x0, 0x11c, r0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x400000000000072, 0xffffffffffffffff, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) r2 = mmap$binder(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, 0x80011, 0xffffffffffffff9c, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)={0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000280)={0x84, 0x0, &(0x7f0000000140)=[@clear_death={0x400c630f, 0x4, 0x1}, @transaction={0x40406300, {0x3, 0x0, 0x1, 0x0, 0x10, 0x0, 0x0, 0x0, 0x28, &(0x7f0000000080), &(0x7f00000000c0)=[0x0, 0x48, 0x9c32dc6fb02b3577, 0x78, 0x78]}}, @acquire_done={0x40106309, r2, 0x1}, @increfs_done={0x40106308, r3, 0x3}, @increfs={0x40046304, 0x4}], 0x5a, 0x0, &(0x7f0000000200)="d22b0660d095b9310491b282a37900c56517d5289b577f07618009479e1de528b2792511a08418eb31ae1f9e16fe9f5e79fdcdef389122747d29c969a07c958a24507469c84ae28bfbde34773c7066d56e18c7d09e00c15abfc8"}) [ 227.874335] audit: type=1400 audit(1556473752.897:61): avc: denied { map } for pid=8470 comm="syz-executor.1" path="socket:[31024]" dev="sockfs" ino=31024 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=rawip_socket permissive=1 [ 228.000510] protocol 88fb is buggy, dev hsr_slave_0 [ 228.006005] protocol 88fb is buggy, dev hsr_slave_1 [ 228.170492] protocol 88fb is buggy, dev hsr_slave_0 [ 228.175995] protocol 88fb is buggy, dev hsr_slave_1 [ 230.410169] IPVS: ftp: loaded support on port[0] = 21 [ 230.755247] chnl_net:caif_netlink_parms(): no params data found [ 230.792624] bridge0: port 1(bridge_slave_0) entered blocking state [ 230.799023] bridge0: port 1(bridge_slave_0) entered disabled state [ 230.806203] device bridge_slave_0 entered promiscuous mode [ 230.813511] bridge0: port 2(bridge_slave_1) entered blocking state [ 230.819902] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.827214] device bridge_slave_1 entered promiscuous mode [ 230.845546] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 230.854666] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 230.872735] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 230.879790] team0: Port device team_slave_0 added [ 230.885853] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 230.893086] team0: Port device team_slave_1 added [ 230.898252] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 230.905611] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 230.992377] device hsr_slave_0 entered promiscuous mode [ 231.050407] device hsr_slave_1 entered promiscuous mode [ 231.110580] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 231.117489] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 231.133024] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.139375] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.146049] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.152456] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.182496] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 231.188596] 8021q: adding VLAN 0 to HW filter on device bond0 [ 231.197784] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 231.206334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 231.214313] bridge0: port 1(bridge_slave_0) entered disabled state [ 231.221004] bridge0: port 2(bridge_slave_1) entered disabled state [ 231.230628] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 231.236707] 8021q: adding VLAN 0 to HW filter on device team0 [ 231.245245] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 231.252875] bridge0: port 1(bridge_slave_0) entered blocking state [ 231.259206] bridge0: port 1(bridge_slave_0) entered forwarding state [ 231.268656] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 231.276501] bridge0: port 2(bridge_slave_1) entered blocking state [ 231.282899] bridge0: port 2(bridge_slave_1) entered forwarding state [ 231.298488] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 231.306346] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 231.315712] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 231.327499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 231.337416] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 231.347715] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 231.353820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 231.367760] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 231.378459] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 231.740476] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:49:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$BLKROSET(0xffffffffffffffff, 0x80140912, 0x0) 17:49:17 executing program 5: creat(&(0x7f0000000240)='./bus\x00', 0x0) open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r2, 0x0) read(0xffffffffffffffff, 0x0, 0x0) pwritev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="60be625e0a8db581d4baae985f3f83d3db29ec142a", 0x15}, {&(0x7f0000000280)="9e1766f07a46d7b9ac292334556f8c63711c4a82e1d75c6ec6ef94ebcdd8c704a9e562375dbf56e32684f0de9cb29cc8e5c3811237a5061ce7734798e8b7d61bbfc75bfc7324d22ff7284823e9d1ee157d6242cbf9f4d710762079565a223e7fa2f73e4f2312ddc55ee3aee63329a17b1d199ffedc0b8cda65c0537407c1c21e6024c3780287f9a5684ed4b88788a00bca", 0x91}], 0x2, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) 17:49:17 executing program 2: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x3ff, 0x3c200) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000080)={r0}) syz_emit_ethernet(0x2e, &(0x7f0000000140)=ANY=[@ANYBLOB="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"], 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f00000000c0)=0x1) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000005c0)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000000580)=0xe8) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000480)={0x3, {0x4, 0x9, 0x1f, 0x0, 0x24, 0x400}}) sendmsg$can_bcm(r0, &(0x7f0000000440)={&(0x7f0000000100)={0x1d, r3}, 0x10, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB="04000000400200000700000000000000", @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="000000c001000000040000e010020000a5e8cf6c06206b77f76bcdc548d4166497f0c5ad4ed12b99d9e787c680435efd7ab078fd3ad8ba3837ce46662b7370435f4ed0c9732bc041f2a73fd3fd8d7813"], 0x80}, 0x1, 0x0, 0x0, 0x20048001}, 0x4000) getitimer(0x2, &(0x7f00000004c0)) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000300)={0x6, 0x3, 0x3}) bind(r0, &(0x7f0000000280)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x3, 0x1, 0x2, {0xa, 0x4e22, 0x101, @local, 0x8000}}}, 0x80) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f0000000000)=0xffffffffffffffff, 0x4) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000340)={0x87, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x2, 'none\x00', 0x11, 0x7, 0x2e}, 0x2c) 17:49:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x0, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[]}, 0x78) 17:49:17 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x9, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x13}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000001180)={'team0\x00', 0x0}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/vga_arbiter\x00', 0x18102, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x15, 0x8, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffffffff121, 0x0, 0x0, 0x0, 0x800}, [@alu={0x7, 0x1, 0xf, 0x1, 0x5c80a7b1eb73c176, 0x50, 0xfffffffffffffff5}, @alu={0x7, 0x80000001, 0x7, 0x2, 0xa, 0x0, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0x2d}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000140)='GPL\x00', 0xdf, 0x1000, &(0x7f0000000180)=""/4096, 0x41f00, 0x1, [], r0, 0xb, r1, 0x8, &(0x7f0000001200)={0x80, 0x9}, 0x8, 0x10, &(0x7f0000001240)={0x0, 0x6, 0x2, 0x3ff}, 0x10}, 0x70) socket$inet6_udplite(0xa, 0x2, 0x88) 17:49:17 executing program 0: unshare(0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8, 0x40) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) uname(0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) 17:49:17 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f0000000180)) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) setitimer(0x1, 0x0, &(0x7f00000002c0)) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000340)={&(0x7f0000000000), 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, 0x0, 0x0, 0x70bd27, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x20004880}, 0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)=0x0) perf_event_open(0x0, r3, 0x209, 0xffffffffffffffff, 0x9) open(&(0x7f0000000280)='./bus\x00', 0x141046, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, 0xffffffffffffffff, 0x0) 17:49:17 executing program 2: r0 = request_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='/dev/sequencer\x00', 0xfffffffffffffffa) r1 = request_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='\xd1\x00', 0xfffffffffffffffd) keyctl$unlink(0x9, r0, r1) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r3 = socket$inet_dccp(0x2, 0x6, 0x0) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm-monitor\x00', 0x100, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r4, 0x80e85411, &(0x7f0000000340)=""/166) getsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f0000000080)={@initdev, @broadcast}, &(0x7f00000000c0)=0xc) listen(r2, 0x1) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) getsockopt$inet_int(r4, 0x10d, 0xe, &(0x7f00000002c0), &(0x7f0000000280)=0x4) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x88300, 0x0) [ 232.427672] audit: type=1804 audit(1556473757.447:62): pid=8499 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir593340160/syzkaller.ZE6jvc/36/bus" dev="sda1" ino=16682 res=1 [ 232.517058] audit: type=1804 audit(1556473757.487:63): pid=8499 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir593340160/syzkaller.ZE6jvc/36/bus" dev="sda1" ino=16682 res=1 [ 232.614255] syz-executor.1 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 17:49:17 executing program 0: unshare(0x0) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8, 0x40) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) uname(0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) 17:49:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x0, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[]}, 0x78) 17:49:17 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200000, 0x100) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000040)={0x7}) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) readv(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000400)=""/76, 0x4c}], 0x1) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000001f40)={'syz0\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) 17:49:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x0, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB]}, 0x78) [ 233.004476] audit: type=1804 audit(1556473757.517:64): pid=8499 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir593340160/syzkaller.ZE6jvc/36/bus" dev="sda1" ino=16682 res=1 [ 233.055675] audit: type=1804 audit(1556473757.517:65): pid=8499 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir593340160/syzkaller.ZE6jvc/36/bus" dev="sda1" ino=16682 res=1 17:49:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$BLKROSET(0xffffffffffffffff, 0x80140912, 0x0) 17:49:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") readv(r0, &(0x7f0000000000), 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x6, 0xc, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) 17:49:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") timer_create(0x0, &(0x7f0000000080)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vhci\x00', 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) readv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/134, 0x86}], 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x40008032, 0xffffffffffffffff, 0x0) tkill(0x0, 0x1000000000014) r2 = syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x8, 0x420000) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r2, 0x400454ce, r3) 17:49:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x0, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB]}, 0x78) 17:49:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101200, 0x0) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000400)={0xb, @pix={0x7, 0x400, 0x77737f79, 0x5, 0xa0b1, 0x5ed8, 0x6, 0x9, 0x1, 0x1, 0x1, 0x2}}) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r1, 0x3) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r2, 0xc0185500, &(0x7f0000000100)={0x4000100323, 0x7}) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]) [ 233.084074] audit: type=1400 audit(1556473757.667:66): avc: denied { name_connect } for pid=8507 comm="syz-executor.2" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 233.108397] audit: type=1804 audit(1556473757.687:67): pid=8499 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.5" name="/root/syzkaller-testdir593340160/syzkaller.ZE6jvc/36/bus" dev="sda1" ino=16682 res=1 17:49:18 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) inotify_init() socket$inet_udplite(0x2, 0x2, 0x88) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) llistxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/190, 0xbe) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0x0) unshare(0x400) syz_execute_func(&(0x7f0000000000)="04efb5b598cd801b69e4f56962f5696200d9d9d0c441395bf91cc18fe9589b26410f8da5d0bf7ee009edfec4427d822a2a00c4da7676f2168f4808eebce00000806000c4c2a9057c5d324d9ac8378fe9509b9d649d64000060e2ed8c0f0b818165dc5f00c3660f3832c5363ef80f9966030faee42c24a1a1460f569f000026400f0d180f1a0efe5ff6e3df818e20b00000f1dc00000fefb3000000000f01c36666450f17720d14111d54111d00") 17:49:18 executing program 1: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, &(0x7f0000000180)) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f00000000c0)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000080), 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r2 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) setitimer(0x1, 0x0, &(0x7f00000002c0)) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000340)={&(0x7f0000000000), 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, 0x0, 0x0, 0x70bd27, 0x25dfdbfd}, 0x1c}, 0x1, 0x0, 0x0, 0x20004880}, 0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000100)) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000140)=0x0) perf_event_open(0x0, r3, 0x209, 0xffffffffffffffff, 0x9) open(&(0x7f0000000280)='./bus\x00', 0x141046, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, 0xffffffffffffffff, 0x0) 17:49:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x0, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB]}, 0x78) 17:49:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$BLKROSET(0xffffffffffffffff, 0x80140912, 0x0) 17:49:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0xc8, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f7674693000000000000000"]}, 0x140) [ 233.441653] protocol 88fb is buggy, dev hsr_slave_0 [ 233.446799] protocol 88fb is buggy, dev hsr_slave_1 17:49:18 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r0, r0, 0x80000) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x554, 0x4000) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = dup(r0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000200)=0x2) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000000100)=0xdb) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='net/route\x00') preadv(r4, &(0x7f0000000480), 0x1000000000000269, 0x10400003) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x60001, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x800, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, &(0x7f0000000000)=0xae7, &(0x7f0000000040)=0x4) 17:49:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0xc8, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f7674693000000000000000"]}, 0x140) 17:49:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0xc8, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f7674693000000000000000"]}, 0x140) 17:49:19 executing program 0: syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7f, 0x101001) 17:49:19 executing program 5: mknod(&(0x7f00000003c0)='./bus\x00', 0x0, 0x0) clone(0x2102001fd6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) mount$9p_tcp(&(0x7f0000000200)='\n27.0.0.1\x00', &(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=']) 17:49:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x12c, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"/300]}, 0x1a4) 17:49:19 executing program 2: r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000003c0), 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000040)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000003800)=[{&(0x7f00000002c0)="f4001100002b2c25e994efd18498d66202baa68754a3000000000200000000000000000000ffffff840000002b000000c00195c1e2d4f32ebdbed8280e38dd308252644135333a847bbaeb4e914b976c5b7e34", 0x53}], 0x1}, 0x0) 17:49:19 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, 0x0, 0x0) [ 234.505979] 9pnet_virtio: no channels available for device [ 234.505979] 27.0.0.1 [ 234.521378] 9pnet_virtio: no channels available for device [ 234.521378] 27.0.0.1 17:49:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x2b, 'pids'}]}, 0x79) 17:49:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x12c, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"/300]}, 0x1a4) [ 234.852340] device bridge_slave_1 left promiscuous mode [ 234.857893] bridge0: port 2(bridge_slave_1) entered disabled state [ 234.932785] device bridge_slave_0 left promiscuous mode [ 234.938324] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.081819] device hsr_slave_1 left promiscuous mode [ 235.124341] device hsr_slave_0 left promiscuous mode [ 235.165718] team0 (unregistering): Port device team_slave_1 removed [ 235.175519] team0 (unregistering): Port device team_slave_0 removed [ 235.185145] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 235.243700] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 235.325537] bond0 (unregistering): Released all slaves [ 237.840322] IPVS: ftp: loaded support on port[0] = 21 [ 238.149999] chnl_net:caif_netlink_parms(): no params data found [ 238.184906] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.191417] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.198319] device bridge_slave_0 entered promiscuous mode [ 238.205663] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.212185] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.219079] device bridge_slave_1 entered promiscuous mode [ 238.238444] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 238.247736] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 238.267367] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 238.274721] team0: Port device team_slave_0 added [ 238.280368] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 238.287434] team0: Port device team_slave_1 added [ 238.292788] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 238.300131] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 238.362376] device hsr_slave_0 entered promiscuous mode [ 238.440428] device hsr_slave_1 entered promiscuous mode [ 238.480597] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 238.487553] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 238.500577] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.507085] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.513770] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.520538] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.551393] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 238.557498] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.566453] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 238.575119] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.583640] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.591961] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.602271] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 238.608363] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.617997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.625992] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.632437] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.644071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 238.651855] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.658186] bridge0: port 2(bridge_slave_1) entered forwarding state [ 238.672580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 238.680677] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 238.689901] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 238.701246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 238.711395] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 238.722165] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 238.728193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 238.741185] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 238.751506] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 239.141034] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:49:25 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x6, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") readv(r0, &(0x7f0000000500)=[{&(0x7f0000000140)=""/7, 0x7}, {&(0x7f0000000280)=""/236, 0xec}], 0x2) 17:49:25 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000140)={r2, 0x0, 0x2, r2}) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f00000000c0)={r3, 0x1000000, 0x2, r3}) 17:49:25 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() capset(&(0x7f0000000000)={0x20071026, r0}, 0x0) 17:49:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x12c, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"/300]}, 0x1a4) 17:49:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:49:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xe, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x4e}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000000)=""/195}, 0x48) 17:49:25 executing program 0: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @netrom, @bcast, @bcast, @rose, @null]}, 0x48) 17:49:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x15e, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f6700"/350]}, 0x1d6) [ 240.012251] capability: warning: `syz-executor.1' uses deprecated v2 capabilities in a way that may be insecure 17:49:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000140)={r2, 0x0, 0x2}) 17:49:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:49:25 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000140)=0x9) 17:49:25 executing program 1: r0 = syz_open_dev$vivid(&(0x7f0000000140)='/dev/video#\x00', 0x3, 0x2) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="b1", 0x1}], 0x1) 17:49:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x15e, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f6700"/350]}, 0x1d6) 17:49:25 executing program 2: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00001a9c54040989bd"], 0x9) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 17:49:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe0000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000140)={0x79, 0x0, [0x60000048b, 0xfffffffffffffffc]}) 17:49:25 executing program 5: syz_execute_func(&(0x7f0000000300)="952ca50f050520d0f807e3144109af8f9089ac95249524f93031f9c4016cf23e0f740abff6000000a0e5be34d1c4e1f8c421fc5122c1d72121660f3a1544a509000fe1c40fbb01c4a2250cce86000000c4810a5c7300c481fc52463fc481f8521f5726449ec481597c981943eb42a9c14600090fbdcbc4c27d01d33e11bd110f00000f3804830a000000") 17:49:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x15e, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"/350]}, 0x1d6) 17:49:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@dev, @in6=@local}}, {{@in=@initdev}, 0x0, @in6=@dev}}, 0x0) r0 = socket(0x10, 0x803, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0x80, &(0x7f0000000380)=[{&(0x7f0000000040)=""/95, 0x14b}, {&(0x7f00000000c0)=""/85, 0xb}, {&(0x7f0000000fc0)=""/4096, 0x1000}, {&(0x7f0000000400)=""/120, 0x6c}, {&(0x7f0000000480)=""/60, 0x3dd}, {&(0x7f0000000200)=""/77, 0xae}, {&(0x7f0000000540)=""/154, 0x40d}, {&(0x7f0000000340)=""/22, 0x16}], 0x142, &(0x7f0000000600)=""/191, 0xbf, 0x20000000000000}}], 0x40000000000020a, 0x0, &(0x7f0000003700)={0x77359400}) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000000)={0x18, 0x0, {0x0, @local, 'ip6gre0\x00'}}) 17:49:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:49:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580)=0xffffffffffffffff, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='pids.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x9, 0x3, &(0x7f0000000640)=@raw=[@jmp={0x5, 0x5, 0xc, 0x2, 0x7}, @ldst={0x3, 0x3, 0x0, 0x6, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff}, @generic={0x3, 0xfff, 0x6, 0x0, 0x4}], &(0x7f0000000100)='GPL\x00', 0x1, 0x81, &(0x7f0000000200)=""/129, 0x41100, 0x0, [], 0x0, 0x4, r1, 0x8, &(0x7f0000000300)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x2, 0x6, 0x1}, 0x10}, 0x70) 17:49:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x177, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b42918241"]}, 0x1ef) 17:49:25 executing program 1: 17:49:25 executing program 0: 17:49:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x177, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x1ef) 17:49:25 executing program 1: [ 240.691461] device bridge_slave_1 left promiscuous mode [ 240.697027] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.771944] device bridge_slave_0 left promiscuous mode [ 240.788675] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.984315] device hsr_slave_1 left promiscuous mode [ 241.037649] device hsr_slave_0 left promiscuous mode [ 241.078048] team0 (unregistering): Port device team_slave_1 removed [ 241.109756] team0 (unregistering): Port device team_slave_0 removed 17:49:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffd}]}) setgid(0x0) 17:49:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580)=0xffffffffffffffff, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='pids.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x9, 0x3, &(0x7f0000000640)=@raw=[@jmp={0x5, 0x5, 0xc, 0x2, 0x7}, @ldst={0x3, 0x3, 0x0, 0x6, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff}, @generic={0x3, 0xfff, 0x6, 0x0, 0x4}], &(0x7f0000000100)='GPL\x00', 0x1, 0x81, &(0x7f0000000200)=""/129, 0x41100, 0x0, [], 0x0, 0x4, r1, 0x8, &(0x7f0000000300)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x2, 0x6, 0x1}, 0x10}, 0x70) 17:49:26 executing program 0: 17:49:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00001a9c54040989bd14e71f3be4a14e6e05e96cf7d21df43fc582ed6e7afb845ef017"], 0x23) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 17:49:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x177, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x1ef) [ 241.179955] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 241.266212] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 241.301785] audit: type=1326 audit(1556473766.327:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8702 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0xffff0000 [ 241.518014] bond0 (unregistering): Released all slaves [ 242.082000] audit: type=1326 audit(1556473767.107:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=8702 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45bc0a code=0xffff0000 [ 244.110199] IPVS: ftp: loaded support on port[0] = 21 [ 244.480988] chnl_net:caif_netlink_parms(): no params data found [ 244.515362] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.521873] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.528752] device bridge_slave_0 entered promiscuous mode [ 244.535689] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.542210] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.549050] device bridge_slave_1 entered promiscuous mode [ 244.568830] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 244.577959] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 244.597960] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 244.605400] team0: Port device team_slave_0 added [ 244.610886] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 244.617937] team0: Port device team_slave_1 added [ 244.623348] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 244.639993] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 244.694074] device hsr_slave_0 entered promiscuous mode [ 244.730477] device hsr_slave_1 entered promiscuous mode [ 244.770826] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 244.777749] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 244.792548] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.798919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.805619] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.812008] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.842741] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 244.848861] 8021q: adding VLAN 0 to HW filter on device bond0 [ 244.857366] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 244.865991] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 244.874240] bridge0: port 1(bridge_slave_0) entered disabled state [ 244.881205] bridge0: port 2(bridge_slave_1) entered disabled state [ 244.891267] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 244.897361] 8021q: adding VLAN 0 to HW filter on device team0 [ 244.905974] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 244.913660] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.920073] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.929286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 244.937201] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.943616] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.957882] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 244.977571] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 244.987944] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 244.998994] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 245.005946] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 245.013530] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 245.021209] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 245.028633] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 245.036234] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 245.049119] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 245.060811] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 245.480773] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:49:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580)=0xffffffffffffffff, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='pids.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x9, 0x3, &(0x7f0000000640)=@raw=[@jmp={0x5, 0x5, 0xc, 0x2, 0x7}, @ldst={0x3, 0x3, 0x0, 0x6, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff}, @generic={0x3, 0xfff, 0x6, 0x0, 0x4}], &(0x7f0000000100)='GPL\x00', 0x1, 0x81, &(0x7f0000000200)=""/129, 0x41100, 0x0, [], 0x0, 0x4, r1, 0x8, &(0x7f0000000300)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x2, 0x6, 0x1}, 0x10}, 0x70) 17:49:31 executing program 0: 17:49:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x184, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x1fc) 17:49:31 executing program 1: 17:49:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:49:31 executing program 2: 17:49:31 executing program 2: 17:49:31 executing program 1: 17:49:31 executing program 0: 17:49:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x184, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x1fc) 17:49:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') openat$cgroup_ro(r0, &(0x7f00000000c0)='pids.events\x00', 0x0, 0x0) 17:49:31 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_CROPCAP(0xffffffffffffffff, 0xc02c563a, &(0x7f0000000100)={0x9, {0x8000}, {0x401, 0x0, 0x4, 0x7}, {0x4, 0x5}}) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0::0:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 17:49:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580)=0xffffffffffffffff, 0x4) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='pids.events\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x9, 0x3, &(0x7f0000000640)=@raw=[@jmp={0x5, 0x5, 0xc, 0x2, 0x7}, @ldst={0x3, 0x3, 0x0, 0x6, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff}, @generic={0x3, 0xfff, 0x6, 0x0, 0x4}], &(0x7f0000000100)='GPL\x00', 0x1, 0x81, &(0x7f0000000200)=""/129, 0x41100, 0x0, [], 0x0, 0x4, r1, 0x8, &(0x7f0000000300)={0x2, 0x3}, 0x8, 0x10, &(0x7f0000001680)={0x2, 0x6, 0x1}, 0x10}, 0x70) 17:49:31 executing program 0: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000180)={0xa, &(0x7f0000000100)}) 17:49:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x184, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x1fc) 17:49:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:49:31 executing program 2: mknod(&(0x7f00000003c0)='./bus\x00', 0x0, 0x0) clone(0x2102001fd6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000200)='\n27.0.0.1\x00', &(0x7f0000000100)='./bus\x00', &(0x7f0000000140)='9p\x00', 0x0, 0x0) 17:49:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x18a, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000"]}, 0x202) 17:49:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r1, &(0x7f0000000000), 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb01001800000000000000040000001c0000000000000043000000008541599a0a29b748a45144de6a902e2d5c1a27ba7e10eacdd7df111572dadd7dcd628b85157e563c37bf0a1a9744b5759e8f1129734d008c600be13a3cc30000535fdf"], 0x0, 0x60}, 0x20) setsockopt(r1, 0x65, 0x1, &(0x7f0000000080), 0x1d0) 17:49:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:49:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580)=0xffffffffffffffff, 0x4) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000600)='pids.events\x00', 0x0, 0x0) [ 246.799266] 9pnet_virtio: no channels available for device [ 246.799266] 27.0.0.1 [ 246.837954] 9pnet_virtio: no channels available for device [ 246.837954] 27.0.0.1 17:49:31 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:49:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x18a, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x202) 17:49:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') ioctl$BLKROSET(0xffffffffffffffff, 0x80140912, 0x0) 17:49:32 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x402000, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r1, 0x0, 0x70bd25, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_dccp_int(r0, 0x21, 0x1b, &(0x7f0000000300), 0x4) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="fddb1f123c123f319bd070") pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write$9p(r0, &(0x7f0000002280)="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", 0xffffffffffffffc8) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x8000, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r5, &(0x7f0000000080), 0x1c) r6 = dup2(r5, r5) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = gettid() setsockopt$inet6_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) ptrace$setopts(0x4206, r7, 0x0, 0x0) ioctl$RNDGETENTCNT(r3, 0x80045200, &(0x7f00000002c0)) tkill(r7, 0x1000000003c) fcntl$setstatus(r6, 0x4, 0x42806) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r4, 0x40045731, &(0x7f0000000100)=0x1) syz_execute_func(&(0x7f0000001180)="b1bb91cd80d3d369ef69dc00d9d0d0c44139fd5bf930c7c7e4c653fbc461f85af063e461e468f4a95ff9c44149f2168f4808eebce00000802000c421fc51c1eaf3416ec48192558de8c3c3664545186746c4c10211cf26660fe98d0d0000009426ca400f0d18a018a0fe5ff6e3df646736676666dd430fefb3000000000004f4f30f1a1254f20f7c29") fchmod(r4, 0x10b) 17:49:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x18a, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x202) 17:49:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:49:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580)=0xffffffffffffffff, 0x4) 17:49:32 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000280)={0xfffffffffffffffd, 0x10001, 0x3f, {0x77359400}, 0x3, 0x1}) accept$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14) recvmmsg(0xffffffffffffff9c, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0, 0x2d3, 0x0, 0xffffffffffffffed}}], 0x1, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) fcntl$getownex(r1, 0x10, &(0x7f0000000200)={0x0, 0x0}) r3 = syz_open_procfs(r2, &(0x7f0000000240)='net?hnycast6\x00') ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f00000001c0)=0x6) ioctl$TIOCGICOUNT(r3, 0x545d, 0x0) preadv(r3, &(0x7f00000017c0), 0x3a8, 0x3c) getsockname$llc(r3, &(0x7f0000000300)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000340)=0x10) 17:49:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x18d, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x205) 17:49:32 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:49:32 executing program 2: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000040)=0x8, 0x4) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) ppoll(&(0x7f0000000180)=[{r1}], 0x1, &(0x7f00000001c0), 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f00000002c0)=ANY=[@ANYBLOB="6e618531673774000001000f0000000000000000e4dbb77487e9ff0000000000408000000000000000000000000000021803f2abf9240000ac010000000000001004c1e090e1fe916dd282e0f3e52a83672f90ff2f"], 0x1) ptrace$setopts(0x4206, r4, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r4, 0x3c) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) connect$packet(r0, &(0x7f00000000c0)={0x11, 0x8, r5, 0x1, 0x2, 0x6, @random="10891f792a7d"}, 0x14) 17:49:32 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(r0, &(0x7f0000000380)=[{&(0x7f0000000240)=""/49}, {&(0x7f0000000280)=""/232}], 0x220, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') fcntl$setsig(r0, 0xa, 0x31) preadv(r2, &(0x7f0000000100), 0x2df, 0x80000000000) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) 17:49:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) 17:49:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x18d, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000"]}, 0x205) 17:49:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:49:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x18d, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x205) 17:49:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580)=0xffffffffffffffff, 0x4) [ 247.402173] device bridge_slave_1 left promiscuous mode [ 247.407766] bridge0: port 2(bridge_slave_1) entered disabled state 17:49:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 247.472139] device bridge_slave_0 left promiscuous mode [ 247.484502] bridge0: port 1(bridge_slave_0) entered disabled state 17:49:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580)=0xffffffffffffffff, 0x4) 17:49:32 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 247.775008] device hsr_slave_1 left promiscuous mode [ 247.826004] device hsr_slave_0 left promiscuous mode [ 247.884533] team0 (unregistering): Port device team_slave_1 removed [ 247.947182] team0 (unregistering): Port device team_slave_0 removed [ 247.993393] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 248.034816] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 248.139010] bond0 (unregistering): Released all slaves [ 250.820237] IPVS: ftp: loaded support on port[0] = 21 [ 251.139036] chnl_net:caif_netlink_parms(): no params data found [ 251.183032] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.189438] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.196587] device bridge_slave_0 entered promiscuous mode [ 251.203998] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.210467] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.217410] device bridge_slave_1 entered promiscuous mode [ 251.241943] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 251.251175] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 251.269100] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 251.276472] team0: Port device team_slave_0 added [ 251.287163] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 251.294347] team0: Port device team_slave_1 added [ 251.299550] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 251.307050] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 251.364044] device hsr_slave_0 entered promiscuous mode [ 251.390470] device hsr_slave_1 entered promiscuous mode [ 251.451959] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 251.458980] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 251.476261] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.482654] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.489228] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.495647] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.526466] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 251.533168] 8021q: adding VLAN 0 to HW filter on device bond0 [ 251.546553] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 251.555177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.562676] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.569344] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.583439] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 251.589528] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.598571] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 251.606319] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.612830] bridge0: port 1(bridge_slave_0) entered forwarding state [ 251.627610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 251.640122] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.646474] bridge0: port 2(bridge_slave_1) entered forwarding state [ 251.661071] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 251.671176] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 251.678084] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 251.694869] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 251.705342] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 251.716002] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 251.725715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 251.733424] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 251.741178] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 251.754794] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 251.763271] device bridge_slave_1 left promiscuous mode [ 251.768824] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.800784] device bridge_slave_0 left promiscuous mode [ 251.806336] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.932915] device hsr_slave_1 left promiscuous mode [ 251.972857] device hsr_slave_0 left promiscuous mode [ 252.012658] device team_slave_1 left promiscuous mode [ 252.018466] team0 (unregistering): Port device team_slave_1 removed [ 252.028618] device team_slave_0 left promiscuous mode [ 252.034564] team0 (unregistering): Port device team_slave_0 removed [ 252.045549] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 252.093511] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 252.176716] bond0 (unregistering): Released all slaves [ 252.225791] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 252.233789] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:49:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:49:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580)=0xffffffffffffffff, 0x4) 17:49:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:38 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000480)={0x84, r1, 0x30, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x53cd}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffffffffff9}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8001}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r2 = creat(&(0x7f0000000400)='./file0\x00', 0x110) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xffffffffffffffe9) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat2(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) r5 = shmget$private(0x0, 0x2000, 0xa08, &(0x7f0000ffb000/0x2000)=nil) shmat(r5, &(0x7f0000ffd000/0x1000)=nil, 0x2000) lstat(&(0x7f0000000580)='./file0\x00', &(0x7f0000000640)) lsetxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f0000000440)=ANY=[@ANYBLOB="04fcbbac2de4a2a5fd00ff070000000000006b1100000000"], 0x1, 0x0) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)) getsockopt$inet_sctp6_SCTP_NODELAY(r4, 0x84, 0x3, &(0x7f0000000080), &(0x7f0000000180)=0x4) msgget(0xffffffffffffffff, 0x100) write$P9_RMKDIR(r2, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) mount$9p_rdma(&(0x7f00000002c0)='127.0.0.1\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0xc002, &(0x7f0000000bc0)=ANY=[]) syz_open_dev$video4linux(&(0x7f00000001c0)='/dev/v4l-subdev#\x00', 0x9, 0x400000) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f00000007c0)=""/202) socket$inet_udp(0x2, 0x2, 0x0) 17:49:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x18f, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e0000000000000000"]}, 0x207) 17:49:38 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) 17:49:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x18f, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x207) 17:49:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) 17:49:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x18f, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x207) 17:49:38 executing program 0: r0 = socket$kcm(0x29, 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x2, 0x0, 0x20000000) 17:49:38 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) 17:49:38 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:49:38 executing program 3 (fault-call:5 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x207) 17:49:38 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0xc3, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x406, 0x0) sendmmsg$nfc_llcp(r1, &(0x7f0000004a40)=[{&(0x7f0000000000)={0x27, 0x0, 0x0, 0x3, 0x100, 0x3ff, "f8a5a806afecad92be9e8d884ad982a7d70da7beb01ae4bcf42a27070ec5aa609752f642824f84aacc8297704d72bf543e4dd0f10d9db5b6949f7ecb40c8f1", 0x29}, 0x60, &(0x7f0000000500)=[{&(0x7f0000000140)="f739ef178866cf8a56b7a09ce2383d6392bf53c84f5e1333b01519ed166c1ad179da44fee453926d6cb955b0da8084cd474b90f613c3d487a4ee5ceed9da99e3e33a3985b4b71e38789d44b55f4914ae1da929e53bf7a29148a2d4d5d009cf9a129f607b8ea80391e3eaa3a1960aba45ba912f3797e328649f36122bc3e0eae140f921990d6ebe8908a240d0527d13cefdc6690ea85789c2551a30801e2041e029d425962f753946ff250fe1c37633db445a2132c1a8363299fa72355e28d1f126f959b7f55da464c382e8bb9f2a9547618c6a845c108c2fbd1f51f910e903ccd6a9972966ce7377473645b2c3d6485a3c69581a", 0xf4}, {&(0x7f0000000240)="179f6ee1c26f21d38b5096922b9ffb2449a24c68cd2bedda20c0f64904c4b500e9d7ff7bb66ce264630f502385c6bbc3685cbfc5b7038496273df028ef0f511a3c9ee4ce923bd63481a15b7164d38eb4729c613ad8c579ef3ccd31ae3d8c7405b2e728383108ec6f94ca14a65f2844fe4731152967000db02d03ef9b16068683668556480319873cbfc39b4b2348363401f2698695f2d91d88a9b594e6d026ef59debc37a4a80dab203d8478aed41b6e989ce740ab58f9b1ade40283dff4121ac28e858798906d8b2c761d328c4e56cae272a355b8e768102fa246e0f641e1aa32b581a5e8e757f3fc4069d2b9d50e05bb7926996e97", 0xf6}, {&(0x7f0000000340)="5c3f8fced2e192340bd55e6de6cae55f5dae3fe0f0a72c88a74749ccc49b1f61436ff1444b97a1cc4f51391560ea8c67a90bcfcbab9cc2a7a888195f72600c8b6a1d15cde55d0eb9aadf0e4962cf062d988a62e8444d9eea2dac818449d076b24de12362e74733f8c9", 0x69}, {&(0x7f00000003c0)="9a456de775bc4837a45bff5b6988c51b69465002531dddf6bd3c78ae5c4a033fd41bde2a0847ee7f6a99f4ef20db", 0x2e}, {&(0x7f0000000400)="9e55840b53925fe71cbed9f04e5760708bbd01c2e33a489eee5f67f6227197edbdbbc9c96769b3a676adb73b71bc10b52893c34d457e1287f7a4fdad32261ea24bb345bda655ca7077bb6a1984ce1999d1495029c3e0ee64ff6bb3d5f552f865fa25f1c2a9787b115ed05ad6aaa7b78fd9cfda3d82d5be440b28915a1bb722e31aa529ba", 0x84}, {&(0x7f00000004c0)="88", 0x1}], 0x6, &(0x7f0000000580)={0x58, 0x112, 0x7, "5b9c27e7a2effb644e380cd940f531eef4148f2cdc38cb7fc7f9812a49762de33501477c9c59d455eff092d220aa2a4397f1a4f23d3a643e590e6ef0a51c5bc649df0dc25e0b"}, 0x58, 0x24000804}, {&(0x7f0000000640)={0x27, 0x1, 0x0, 0x2, 0x1, 0x1, "431c1a3037fdd185d592d3ee6d42f9b920f6df7cb866ee9c8e5a3a2a261dd960c78a327120c6bda3a146902f537a845d5185de70c791f7a4bedecd64d8bd1d", 0x2f}, 0x60, &(0x7f0000000900)=[{&(0x7f00000006c0)="53f63540a6de0b77e109c99d00a478add49f1ac0f3b65af305bdaab0155359496f0d9afa05111a6375", 0x29}, {&(0x7f0000000700)="967ff76c411655ffb04086b4ddc061cad15eceb617e1b348906e461c46ec0b2f5753094c69d8d3631005c62f8d3c9268c94d22b1e6f420f33033f27157c7cd653ae1f445a660681919fadf89", 0x4c}, {&(0x7f0000000780)="1a5e2f8ee02b4e5e799c050988f1d6d1959a69c30c85a2db338cc57e9f353b23585affd7e0277f4748c1a8dd0f39ac8a6ca9af4cec5e7444b1920959147d68448800c03a4fb47d6b63d6ca97dca67c187b4a706f023e5573b6126f6c6dd802df9fad22945874e658c16247473d477aa9c421bdfe0bcf554abdc0d45fa4a2bb6684ce6f531b29d0a4add9fc905ddea167c61e8dfa7e055a19b9defc6316ca7369b1babe7e68fc2b008a4bb0b71dd64006489f74bb4f6ce0a487b7c1dae4cadfeefec3443632ddfe260a274404d4f95bd2", 0xd0}, {&(0x7f0000000880)="5b7ce83d00569343b304c29cb67ba612be22d038f16d355a55eff26d2bf7683400f7a738ec85ee5625b51bd042dec30a3bcaef4d18f7f2e8d41c0bf883142686c1e8fbe2704193422ec307d2d75abd74304627024ad0ca190cd93b5c22c647556426183458873df396d124c9d967a5752f13e6e09e", 0x75}], 0x4, &(0x7f0000000940)={0x40, 0x103, 0x40, "40464f8c0d000d2fcd4b6e56b6afaec811ad4519d36d36b54de6c53dab3ef7da895cbd7437c97624fc08"}, 0x40, 0xc080}, {&(0x7f0000000980)={0x27, 0x0, 0x2, 0x5, 0x3f, 0x5, "73fff2429282da574d4818b8922349daeb133ae98ef706c4ec40bb4b7fc05a28e50946b9559171e6a381230397b6bc44707ddbb7bd55e16bf4209faf721e7d", 0x33}, 0x60, &(0x7f0000000f00)=[{&(0x7f0000000a00)="c2eaf9e423904d5bad9d1d404ac17e70044133f29609ba9bf0731cd95dbb777de0454dc937799db2dc6dc35472f53dd8caae2b00b0d95f75af13022fadc6c09a1efa655bd590499915cec5eb1369064a1b382888bb2f65ee99f12e134899bbd5744ef9b88806491053e6de43106fb540789ebfec911788ff069ee108c079bc346bece1d2df510c6bf0703e1f3d821e1f59d1", 0x92}, {&(0x7f0000000ac0)="14d9b0d187743145b553f2cd35be1951e47fb01b60ce5fd940c2f83f", 0x1c}, {&(0x7f0000000b00)="31aef8be27a791e9a8bbf65e23e12aae83df6ccb4472228779e2a18d9eebe4ab223250816437bb2881eb4c8ba1c97d1bfc44aee974bb163f56f69d4cd43b63954001dab958251b00f9ee9fa4098cd85ca298b58508763ef3749e87bdbdc3754495dbad249bb4e5bcb50611ea51a8c9ebb371ed847adf71e01d94ed547b0750750d3c4d960daf5684cace712515ca04bf4464dd2211668fa8426ce991d210679bb52a803c0740c52e201461ae", 0xac}, {&(0x7f0000000bc0)="16dfe1e480bedbd0f21e8463ab238c45eca15d225509d7fb05c9d258b123e9e0522fbfda8fd2def99e7cf0c0e336b6bdaceceb2b48c812378675a1a93754b159e172b2e6fd79abee1aa774c939d36cc3e6d93f7295750042af35ee6b033e8e359cac3fdec50996fd48985784080c69fafd1cb994b9b10ab0cdc571bc2ae95c5f1c7598574d89eccd248f15443c98281108862ff7c92fd3d41cb29ab9da77aaa37ab258ac69cff65e67f418bd0c17a69f4b5c95da4808e2ce8b3c8d5719e0", 0xbe}, {&(0x7f0000000c80)="58cfc53b1ba278d1fd715290aaacd1aef4fa2a4216ecc614614098840b384bc1f2e8f30aebef1b4aa5697ee4439370395efff9ebae4b1dafc703feab7bcbf58b2b03862dd9258110f09e8465efb6fa5520997cd5f3dab42ead950244f071567d", 0x60}, {&(0x7f0000000d00)="ffc2cc2b6efa06aa22604fea902b8e", 0xf}, {&(0x7f0000000d40)="d40da7643d8adfde9b11923c358540178efe4af07becc4707c3a1411d7a080efa8bf36b3624a3d88cd244cec224fc67b5443531feb2fe4a2fe7bc6b3353fe464ea9fbdc2558bf0f5ee3cd94f2925842af029ed50e49115fb8edb7c314e4829d4fe1d13dae2081171574263ec05e0122afd33ae5d7593f8840557d429aa16d31061df0722eb77e0ee4155222ac8601fba2a6a486edd1af505c4b2bf93a8512973d7cbfa", 0xa3}, {&(0x7f0000000e00)="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", 0xfc}], 0x8, &(0x7f0000000f80)={0x108, 0x119, 0xfffffffffffffffd, "db1541fb5a0f0185951c6c304efdea6c1372d34adeb7c4da041762e97fe36e3672428e6de32df751262e0f674ca7ac5c8ee430797c1fa568a0c30c52685a2b1444c55a90dfa869923381e06796a8f05035e37a781c135b1ff6b69701d94cadbebf0ccb63f65fbb5070545c9e6c2feef45f910ee1435411fa4a28e4d062ca43eb4ab102ecacbde3b71925c684b3b372cb4a3910ed4873be5bfee0204b1f03ba0f3a24c9e55313cf9afca2b8137c39bb1868e5d004ed593961165db744d75e4abb887c96ac661a7bbe8c6201698125d0983b6a93f9cc27d3e1a4a9a2812a3df22617a955bfcd54ccac1ad0027f543953ecd50b09cb6ccd"}, 0x108, 0x40}, {&(0x7f00000010c0)={0x27, 0x0, 0x2, 0x5, 0x8001, 0x4, "5ecf1c54ddfc9611a681a8534bbc5e0a6e37132afa4246d4229590cea5d83f688331921508cb17b94f79e75a3a9b6d6576cce511ab55881b90544d28a55dec", 0x1a}, 0x60, &(0x7f0000002500)=[{&(0x7f0000001140)="841ca0c7df658422c4a7eef9eec6fbe09d3a6e43c08c446f7081b5f0564dd1a0309214cd693b396f373bf266cc09933903ae46b8c6d2c6744ac1d1697faff4e2afe35d3ca73fc78405d2d8d7be5376bf22bf3f908761b0e80885ea02099a6220183c2896515c947e0194cfd73d6539b50bb744ea8abbf61b5f777d2ff3fa0571b5e33541ab7262682c39b64ac38e0362e445f1207a9d20", 0x97}, {&(0x7f0000001200)="fe64ae3394267aef06ab3d9b0daf87090ceedc0f79f1e84231310759037a102ac362e98df3f8dd7959f4912c2a79727cef330e02be0f1e70cc1d4317ab734c1a9b1bac547e9bf337c22a2227a7f40d51971bf482b17f3312633eedd2469e24d107876bc917ea644eae3a79588c97ab44a59f0322aded4e48f6a5df424e040632dd603b7c34df0d948c9471cff391171cdd43d587c64dbfd5fab590768ea2c96350362b279972e26d407a3aa6395d1c3b12074dfa2811f50b0353f23e40a1d0b29098e489b76c1fdd10afe4e4001d18f77a4a94177ca675293672bf362df648457f1a", 0xe2}, {&(0x7f0000001300)="e673ee6f5d105140a9ced142c76903e74de4733f3321cbbe826ce648f06f8d735675b4dfeec333b09de7c2fa674a7e38827fb3501d08f5e0e40dd1c4956a72bbe00b6400be9409c384a0e0c2fecc7d86bf1f", 0x52}, {&(0x7f0000001380)="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", 0xfe}, {&(0x7f0000001480)="8a2422fc1d0fb5f9d1ef3ba355f20671ff9bda8e6dae6594e0c6a7d1560b98840ef49ee2ab04b5a4badc9bda6f880c46aa58713f9bfc71549739c33cc6b15ac1d495c482d826cf5f5497fc678071f3d251529a25dabc4f3e6fb9c2c60db7496c5ac0c67dca1c2179b3f904fc70dd8ff3a4e90fd73e3bdc78aea435c00b375e3a61a56645bbfc24a268a5e13649c14485631bffd83b47ce84174ae0f5243cb225077b6837261fe7fa93bf77ea332391a030ba6a8d7c11bc585eb37782323e87163c9a6ec78270d774bd8e5bc3d535e1db6934e1c67da789bc9f6fdca23496a225b38a2076e5dca290fc526d732664294b519134b09c1c581c7e521479f51a08d8a693bc27f9f731414d8a9bb507ad5fdcba33f2f43ee579b9e11ed4afe38813d2308208c1d75e1ef307363b5cb145cecc34acdb60dd124f34dd3d5c4e2b8c9002268f6543043167e40f7745273d844563845935a444d7f24de614b6acc17f0e2781a60afec7e199b401fb1eaee4f4a58f045b6d67843c43d79a9e62e1cb1b7a38dddb781d6c83592453a939b413720978edb9ba2b2b8d5dc3c156cd5e98efe81cad0c07881977f878286d8b7afa79ebffa069aa6aac4a54450b586d2b57ff2086a2b6608a75720ee15a0c5b70f39a598e58b04ee3805ac293f0a42ae38e020c642ffdca8a91de11e64e4c9d7275174f1a87b8d2df22643b83fa51f9fb93f7a1529ec13001976db4bed42b8b9e7095c8017d0bc5f7d4451b4dbba31e565c3cdd36a2459f9330015cd79f784f165fcafbfd22f4d64c7fdea303419d4df0a1189542e8edcead24e114fbd42dfb0498cd062d76080942ec062b0b0cd60f9577c8ffcf88a75552b4fad1c33c21b70b9ec7f00ec35b3577ad2d75797aa8cc74b97d78b484a23d196b39e0feb43578d16ad76125904f1a1419ded7f05d17e5ff666d34de0eb23c9351faedb15abdbd4dd08bc23a6e4731e24569b66731eb33983243e646c067e67587cec3083f1055dd08e6f2c570b18d9fc652eabd858fcc66a851d4ba33bff609dfa5fd2b39d1db74a4d2876f802fd505d2606329302f41c2ae273d5795f0f0f8fe095ecf43723c2d1f2597d10c094fad1354c612714badbdddf7ab059cecd34768acbad8dc1767f38b3d18476a840b1c3ab9bdfc467b1b84ad01f0af87426abb29226f9f55ae107455ca63e7d41c9e6bc97dfe924ee9a7f11fa0a5acc0333002391e477895a88b1743d6a5ba037a9c94382db3b2e210d19b94b29a2090cb1d0cd6cb207db0b6047eba8849ad605f021b2bbb6ebe3b1183a35efbd988b4f5921e4580c2e768a23f2284abd1b8374456816b4448d3c6106a7fccdeb243e17846f9c3de1db7635099188cd8d3eaa12ece6bb1caa65ea6a1f220f8831fd0a0e8cefa221f763d67be43dfd9b2cac274eeeb21973d68be81063073638def357c87b8ef7ccad88b96bcaa3c3b9a27dec13f5a9c43534f6a28b09d932c3fab39886d94c41f2235201eccbca058368604b6ebd054a22a3faa7d06faf5f598a24844340e9cfb4ca00c48e4ee919cfd1b77685a218c1f65a66af14faaa36bf71d02a8051e35d97e3bd2bed9871786e8a223b8862a0448546b031cb3fee754210c47ffa20ecc959405532b3227306590afbc1467179ceb79cf621afea7a59650cb329b2f0d27fd40b642eb37151b7064284f90be387f24718bcebd7838b6eb847b595f8d970b7c3c0885f57d1c0946bded759f16f0f3263857986030c45395058c588ddf473aa492c95a931f735cf75aa8af1fbafde8d9fa0fd4544cbeaa4d0d90d974b0823c1c84efc27c3f5300fe26c85e7dae69fd5933320a77ca54dc8021e0e845a8b4e16b075b8f7b7d8ea57a1f051beb160c5a1609e0bbafea3364f22df1b9c4acf4b0f99f56787c587a9ec87d0822781a3ae0fd5e75d03c89a69cb9da54b167585220967e35e9dc2d7dcac903c8290bf8b2318aa090ac1d6b96650f32ed3f0f8bce92b0022d481a83a789246d6877cb0abe488653904bce46b6d532553f37fe7f2340bf5a1924112b72fc70fa379f4e399ad7a4fbd3042b922834bc1611e982c1c0729d6cea2176488f7b8c903e7ed4fb21cf392feeea95c618b1bce0dd7e40bc23c7bf47b5084e64ae7edbdfb2edb790fa73f51350056b16c3d157d1e35da5b2d943699be17877946f42551fc5c71dcb32ee816458b5d3e6be20dfb169a9d7c3a72cdb77ea955a10e2e1b4540c8216141366ac116502306d9d872999efa504b9112f798d47477af3ca0c17bdef65a8afcd8ced625dd87fadcbde2cb7b284a9300ab7abd5ea0b8ce6c5e237e1b816f1c1f59673e6e95d9979c1a909743d5197a0bcd253c0c0ae79d90cef9c9637a42ae0e070bdf0adab4e14799d22c6b5acabd9a7b995265fd930bcd853d24ecda791200b43a665c50a74bbcfdef38dfce0a56c6f7455e0cd91ddb3aaaf1c5f39c96fadc509c7096f06d4752fe49c99d73d21e2c8b7643e82191dbdf77e416b9df2e558590e418ea9d006f50a45cea7124e1cc5b7f7b3ab553b3c813234358021741bdd32feb4f56a9ef1af4a5ac6d0792554b4d7ae2a89e94d33f0ef05ddcc2609c0c7b7ce65330f4ac61f6378e741ac9a615d4eb8f8756bf821a4ca95e1d1490f6002a2ea2989619c93389d1719a79664162aece911dc25da17d3adca04f4153033132d63eadde061d6e1c3460417c9fdbfa6a3609dcf7565da271f3cc80e902867a4fad3dc337b7099ad3efe1c8d4ffc501f90d91014692903c8b2411a2ae82dc7e6b9a4180af79b62d759922d27ff34ffe440a2c2db4ea138f18698e2bcb708d8589ef914e58debfd7419bae20a9e49553e40760bf451898a7cfe54510410a248df2b4f0af48a5160d39229d380a39c71089919695ab3bafc79f27b3f06466087b79c5cf387b081ce65b6ef4a4669a335dc4fcf6a9f16e1e7802bd6ea044f4d21768310de19747f144ca1abe6bb4b67c6e38f76151b3b5eaf749e3f589a2f632a5bd043cb487bd70fe5752266c42feec139450c860a02d930037bf337df6eb32f49186d4e6991f8c0d6f38d7b6e9eecf3db3f08dbd5733b71b9c3789a1199df11d20c4f7103d1a6d378af48d5b8b495e279d37460237af66463b955bc0bf3f8ac1eac7d3c6eece8d7cfa7dff8cdaf925ed19e657a0216848228ba9073e53df1f6f47ab488ab38e81bf99b8f0d1f0e4fa8952af1b9d49406c50964b55019aec82935affe66b8a0a09d0319211b06b1bc7cef99c1766acebb0d39266477a02734bc7d4c3f7e2e642776cb58e6093ce6eccdf62bf13cc0198e357915d24e8410d951fbe516d9daa6eb561665c76fc2427030ea2de74f6133913c0bcae21783ad30bf1ff1d004beec4254baba6de66ae84b29e25384ef2184b8584219aaa387384accf337fa01f1a8f3887a5d42c4b005c36806f743f737b7c5e9b0dbd159a2785eb4aba9a53ceb20395ad532aaba46abfb3d608b04c5ddfcf34a9d0d901a1ec714988463fcfdc2c00e2e027bd3fc527009239808bd5a614804bb849aacd40dfde2a58b3588425b63ed66456ebea83ce3fc979a551883fe1013103a35639e9e4775f3a268072535452eb304088043a016ffe8b90fbf12d0e2a4695045334b033478a23694b2cc6d06309267cb548b77d52718fd1f0e1acdd09c19fc633aa3c044be446bf03fd7caac16034e33f7ddeccd65179171f10b2b633167556bb6cc7f658a505c3938dcd9b29365cf349d63bb1f1e3958385b2ab779e8bb4735fa732dcb6f03c53f460ca0a3531d0e3164f10c2b6e271bc3a29a18d38f74b351484613fe273aeb17d55c6cb7cb118a5cc28da4093e414322bec07749d0aef9148a44e9aad5570ea4574d40b40bd8bfc07355490d894edd91ea06009bf011aaf5b2b36b069f523c065627ec5a09daaf11151a72faf1bde593105eb696d4a629be09d0411cf4cfa3eac61b55a4e48bbf830b1c52342aefc617c92b9f2ca9926d59c48c3698c21d94374b2effb8b97310303d01fa96924a409b0fb4e2f288594cf73e39c968cc1c93b1a8ba53b6eb96b48c715ab110ec536f5daa146bd0711f670484118bb5f69ac68fd8a9abcb0134807686bd7d3be17aea1eafa2aa94c0cd8c34ac3e8befdc9b8597b7898fdfefb3142d3e36591998662eb67b07252fd8cc33e17fe801e67c690c329d7c400329a6d97bc00b89842e1167d3663790fef4d7db6d74463ad5c95d3314267dacb99e8a6866fbf52c35d3b8aa939378d2f80d4ef16a63fb8e93d97d86d892dbaff3236b6fecba62b92f6ea64a7ffe8edfb143b9b6816bb893d1ae9c668bd0fb7ef0f1aad8d4784f7b3d5a555ba8afa31748ee8199509d2ae367ccae52c2158bebae5bac0d415617fc40bb5a265292ac7603733e0dbc044bfedc3b1e7fc9de6a17cf58cec80b9f7b1cc6006671ab35a6cb67c626cc182b0fa227038fbc7782e05999847528e84724278a9eb0a986a2a88c4f34527ab4c28af2f6de170f9cea1da8db272798e0c02413b208d9bb93b2855a2cf8ec174fd0ff7a185e04566e8d45b33b3227002bbe6cb566fe0ddbfd3ec8e0716b7f128f47407014d48b4b9fb040e92363c30c79d12f65590f21968f3edef69475e5c063da28c09c3898f7f19f341b25161c7f555b7026fcbbf5402872abae3e67d7bcb833cd60e0695abe20dc6a45abc2ce16790e10c2d113f2be254b47454e9feabf631861f9519468f9b2f6f0582321ae420ca6e6376cb5aa3f3dc91526dbc005a1c0f5c21d9c93f7617c797e0680de235023d77745ef9a21b290279501ec76828cd1dce1981196a35038c78b4baff286a9d7347e44cc16c9a685a2210c032bf2cfed747ebdeaa832e7f5b4a16146c34483b7b5bc2084401eb31e50cd103135741ed61a898ddfcf9c8b634d063b45c2ad7889a98110676bce610082f916245b9a2c843c4a22ab01c59db3a7e994e2a6ebf6984cc57c518fbfa9fb425bd5a9f1f0f7b9b75c1f42f494b94e19cebee6488a13ff9933425902674f73f8c463f4f14afeff3e5d57a266c727dea5b2aed8e540537dc3bc528ff2d12d25576c6839829e3c8abf48e68b2f4606e5a2f801e4d90851ba584596cd093ffc8c2ac8e966711318a608357a10ea3b82d21978084a472ff15b23aef28c43dd775f0a59304a3995a4bcdb6a48f48c00ac828ba685f2964e560521571ef266f14c00dcded43a308bd6460118e5107b698cbb108dd067af3934260471bf7945cf8479a12ba5d585d1018703b3995ca3c0e89189689d69fffe80be5236508d464147c00a186d026c8ec5a4994ca913f62745e3e0dc939b9a848274a964d5c05bab4c3f5c3439c83520a0b8233ebb5a699e5b9419ea36fdd189d1b7ddcb0f271baf286cd373fab7d35fd9e3ff144ba15d58d5dcb9ac00951bf175bd6bf3c455b041c565a786241958f7d09abd33d1271b3e71de664090ccfd8f170dba25a1f5adc5d545c4998d77ca996b2be319e1ce6500309bc146ed0082f16974162e3135052a64f57dc7b76f2203e82529848f5ce602fe54ca5004f318500eb2cd9e3b5be64a25f8cad1f524dc55b16f661ba9b25b5fa442f03401f5e873987d2d38859bbabba656d03769906d51fa29e8220e5270a64bfef8a8ab83f8d6f5d8fe49a3337d555010268a5413ec8ccf5c9fea47e731967a0e4c56c760891566fa22dd18bfdd9dade705ede0be8e6971f7f2664e7ef343a000e0bd7bfd0db8d8557443c3fc791cbdab61291c6c71f060eb416babdec4a61376730fb9bd644ce883650f7bb76f", 0x1000}, {&(0x7f0000002480)="d5cfd15c2f4876b1078e9fc61a4ef56d4f3b68ca054e901d5f3a8560e6c539b4393bea81bdf548ce69d967968a6614ee13827fd601dd99045f2573e435b4742960243adf4a81f0a7d26dd198fd2d0909a82ca09db07580ac", 0x58}], 0x6, &(0x7f0000002580)={0xa8, 0x108, 0x100000000, "54dbcdfab4296ba2ed30c8f1cbb6ce2c2d100ab5fce8b2f257ecce0bd99b73080119a0b2a7496fd73d8dbfcfd982b0c05fad1dd8daae5230e806565829f2e5199c93d142473d2f342ad7dcb6ac7ceb614291f1b4bdddaed87d9656ed2090f8ec605c671207ed93286a59bd75d55490f8c28f7569b1df934d77bd422c859300ce0f40db090da066bc62ae4713fe931c6af2"}, 0xa8, 0x40}, {&(0x7f0000002640)={0x27, 0x0, 0x0, 0x7, 0x2, 0x63e4, "4efb71668d52a289049eeaa506b35b1b95eefe4159529e6f38bc0b8fac269a78018246b3d3e7620e395235dac19819abc7d03c0b912dd561ba55d1bf3e5c9a", 0x9}, 0x60, &(0x7f0000003780)=[{&(0x7f00000026c0)="103ee0b3a32fbf9ff28d9651ff8716a86195f29ca9d6307832f4617e4380689759f32396cb4db322f3ad14f9d91e64717630cfe4dd4f9a3b330b878749a4b4a984d7a1673794542e3cd0a65c1c0a36274e606f7ea2247a5922a1adabd1594113b2f80c5d70390e7dc0878bef15796c84dd89a098a3a84fcec029f5df66c2e1f2ec", 0x81}, {0x0}, {&(0x7f0000002780)="3a9876b6ead8098bd7c3e73f24ac401dbc0c72d4d168117fa83a4e4d9d6a792a889a1ab37457419a3ab123125fe8ce00108c9ca8271527f9d452aaae85655a413e12676e101d861157c3fb7bf71f170e0bbcedba7cbadcaaac6b7aee914557c529592946f71bcb9d9f1e5e27a894633690966367fca6beea9d477145ea3a5dded0cf31e3ebf8974c47259e7078651389f5f9532bc981d2bc7c5e77cb6f5933343d45674676e154455d019cb819967a0102274c53d24ed8249f5519489ea07cda7ca345db382724f91a34556653b5e865a87b84fd0330e3ae5f11f5491498e94411aa22136d637afd87511d67f5f4106290fb4bcb6126621e7a85258f31e9077ae5dc8e9003779026218f0fc45346ca343841efcedfddbd22276a942a8662dc744893e829814e5373c23a2b030b7a1852a71ff007d304502dfb9719361a4c7cf66a694a127d7ca520bc64c8136065f9a8b9fc5494f4a31e5420979e04889786d371b90301b90fd7469d5a1e9d808a3778d19077b827094017c78fa02d36ca0742eb32d097d068129f9c5a6687223835cf445e21d36cef9682f14ed8fa8b0d5411cb4e4cf29b023ddd4b2985124471dc79e7112dc954b0348a1f1f9ab564e067b70c935422b58ca4a9e3ddb1b4e06122569e0f53d5a87e20b97a2a723519f6e5a8059b091a4e03b8fa56c1a7e7e6be6e1abc449f8392b0e4e295e04441fec042c38584a860c43b44c790f1b6f4730e38a1b618e815174c1c44cfa566b12b8adb1e637512962bfce8f34a76cb03a9298657ce6b3596d552a89587743337607bb426cf68a67cf6e97dbcb2d821b9cebdf4cbc52b9340f1e33e8713a8dc608b65b533402fb33f6cfe2ef51808d7c3b1c9b542e0e38ed56aca8f7f80eca7bb07fab5bf13ec44eb1068a47bc9eba1ff1504cb18cf88daf7adf762e6f14609ecec7d7a74e1accc32f0f201ed45ecc9d019a31c60ceb809c8ad77ade949c61716579c3705d2115724e4204ed3a97e46424ac716f74d6ffa51c9737642f054239cee3d3ff325cff23fcd40ca67df199aeb9b2c80daa259c7d29b20bf3459ce8c164119f3ac5f238a1664e7f542e432995ed879c244ebd2d77baf9d5fe41ca93a5495f0e9b545fbf4203d3b463678250bba6714ef8499e77215c70faa47053fbfe09c926e9801f17ea2fa4f502fe6a4dc282c70de45211a3407a25908f842d76752a3d538daa853bb96b8810a5f17236c2fa65599ee7530fe931d2a215660ad335d258d3efdd6c80c0f24bd3e51baacefb2361f4c5cde03f317f060959f12e221bc4c92fb3581199a587352181e4bba5a6951e62533713640c1d50f472285e4f05267a0778d19d1bac2d884be4a43676398a18f1408954aca7f2d243715624aab7c0d5209022a1e07cabadb12139d57db45d4240c845147a25f2e64c2bcb5b81326f9f03e4b29ee4c62d5d8fe0b5ddee0d0881d92dabd8deddfc6987115617fe8fd3e3f30ced840f48d07544642c1ce5e1ab6b84687c499d19d9f5df5c161eb5a25b04cbcf51fa302c0187f090108ac26a69e0aad2adda1741153de32e6102be6dae86e3464c9ca7bf843e72098e9f8ccdb61dc77eef29069d2e2d4c6da047dd497b98173fd6487c6298f051e6bcc2bb0dc87ace40d680b5ee161cc53c5c5ede44f2eea461bc58580ea016d1c4877349cf07a405dc160145a8c3cb2da2bc7271ae5ce071a66632475adbf0304602b5ca7a21b1ce35771a7a6248d67043e36eb226a92564f27f4d936dae7d1a000010449c180d86ad98b0416b5c21cc2045aa644c8c24f98ee311d799351305208a97f882dca16500c0432b6f9da82c247d275f4386cbf2265eb15b1d1ff156c1b93a7c132c555377e3ed292be007e973796e46a4c57f6ab6c56b7d89edd6ac5d4dafcd7f65131275f4ee6759de1d8b362d095c367bf92b70d4e68b7d9f849201718aa89be53abb22037a1462b95a2cb3d42234d62cc4b91bdeae7b0a60e280b3eff10373baca9060de5d69d8d383a4d23aa8b0b4c6ff545e6fee7ae5931b1fc396aa11510c00d2f6836f98d234309665e1fdf8740c6b21a05151cab120e4611f14e3356c13b68f68f9662b792d8e059650d5ebacd2f5a19b9207db6cbe2ccb8bfea259e598adfb32e2be8f1273a7d70b2e322c095537c0eebf2265d8908db3b0dbeb41096aee782092472df4fa29952d7ec9ad1efcd41a369debff58f7e98cc05ae350e96c881c7b7b0b694dff6372bce653f23cf85cf58619d469d4c991391348e722a3f70647bfcb4f9160703a0267b8ced23d1e6907d504d9a494a76e0e41140b1654b85526c749a3b477e726a5f819600a8c8fe847a8a602c2e4d7fdce48d0ba03d041a13d25656bb84500303ea6d2a5a35e888689e25b0e797b50d423c56cfd132aa571c20228873f8013764970d65517cfe7ef472f933b2f2d00a64a24f57ecbbe81c3da00d957eef8de6d421166f23cb1043ae665a165d8b4798f64b2690bd3a4179146782c57f5f189735917eadce74cd44d1fa78b3acd3f39556c6e8e680133ad6b03d6f004cb2993ce2060234d89ade9ec94ee62e9a209e53a7f97d34933ced0bb199141185e382f683d602f1d1a0a1ed17a9bc91e6907cb096372cd3ae00a3a7efa8e366b3fb60695c17ebdad33bec8e0952ad1a2e8c683755a8cffb151aede7379c8282049423cd3827b68735ead20aa7b758894b0d4793de85f22857336d1d3602b85df3ea2ecc16137b7175ed95fac57f290e2e5a62bac9d8c4690251871aafc7ec0c2685798ec1a40deb9339f13c0e2a6e8a3f4cf14a587bafb7ef0fcfaa3114a99a79dd8772d6a1e473a54e8733adfa8bf54624fdb6f2132027a75f77b949bc4b31b3eac481e51af6b29c0aaa36bffb666973d891c9946ffc20c3df35da733a317140cf17fcfbb5e5c76ec0d9edf1b6528bab5ec1e04dd455368b9ad5479458e448e52df87fad0c06dcee606c47256aba92c850c64faf43c1288f2b2b80a045d5a5830dcafa21481b4f94445420b5db9b09c43d033ba469d5a0ea69ead41113761ff97d2f028a2d9469cc04e82f8aa17a41779313bc993ed6ec95ccb254d25f680f1e2a037ebfadea324b27b93c75979ffffb3f84415e4aa2ee9bb45df976c1342225365d02e14565b28cd3381797ff15875571fb5972d2e5be51debe43a983c4aad2bebf5ba9d911b060b70e5324bc75d5c8c75c645763ad84b0a9689a0604514679962801a05f3e7b5d8fe7e0576f6d33c969f806be3beac7e44762c756e183d9627410f560a1d44d9cc25d294d6c6de36411da7b9e4a0dd28256dc168efe4bd07a39459601644378019bdd84aeef6f41d42cc5eecbd39dc41630da80afa7303af2e0e8fbe02df0909d5c6ffd7b19f9817876a220c0092f9b62cf1b055d24dce7bc5d79e641a79eae3ac907b322f741103f97d0d6fc076227a5b91099c89fb20025fa8a97939c2fa88d36b9c9fd8ef04f9f9bdb99b5eb819933efcea9e459fe53fa5ba9e0594924762a8843674b23db62af8e6db3aab0407acd79ba6fb41982191b793f348129591ba824e865fb020c10b719529ee19c0269e4ced54456dc1968c0f7937278d3d5227245a32d1a301280a1db51f2da65c940cce4aa97a8447b94b843f8b9abcb267d00d58370f1c56cc32554bf68701059c45d6b6c8e3ef607e7c0eb83b01d83bdb221098a8a1119f492f578f037a9228bebd779542640f921222c98aeaa08c18539cfc166997c1511a31283a97c6bdd4db36fd237e237ac8b39508f729ed6a6d19d5c3bbc0cbbb0b088467d3ec6ba96dd294810119c0c0740263d38177de303e451881201350483327b50eb493ada54c4bfd3b8b65a0fd233735d6995fde2d13b15de870f84857f62c290fe964e492fea0fdf155d547ac142d4e0de90f7e13e1a0d7eb6a845102f5bfaad2e35d8725815efe75a78bac563112b3bbb97114bccce4d909d0a4bdcf6db14a84439f1bd1bc271d7d03f19ef4e5337b6fede32373f17551404fc4196bdcbd106b49c6a8c918a785bbe192df4b6703f81e5b0694282c1ba7c6bbe904ab4cccfae1d50db14ca076e5b89a4918e63606d291d799197e89ee87abe59ac95ae2deb8c259f6ce6f28869803188bd7b00ee731823780a1e402aea75cdfc844fa48fef4a2a0a11e9e37854f438524a0b06802ac28c14402afe0fdfc42594bf8b7b4914530326e25180c8fb816292b1dd35bd255b38e72a68cae5621b42b531740853ace9008a5607126d9de5fa8c6da961671e2009e5d8f5e7de24d8e7c9804cbcd2826cb1b58dff4366c0c78e4f71e5c32f81f537c5c875a200a325a0247649b5b3b0c617544dfdcd66013d5f46efa4db49d66f5124923be291edfa1a378a3dcab102c523b288e378b9e5cfce74b15b19d7e74a45e81e94e6ac339c4324153001c72858d483910644eba68852b0156c641d8cc74290c8afe9ec7ab4ffb7bec1a1e301497a0f53f660296bcd245502f01142e52e84de4b380c6f893f04a27a82e8c314c8d88ce91b78048855e15c3a7a568b50dbcedb2794a795995e7fc36464ff9976a3b2c4bd63b6e9e658184cd5b9ad9e75ad01ad2fa4d6ba97bce8fb0fc6eed8d0a805b55208b57e55345225eddeff41a43b5c9e60fcd8b0c9d9a107471d59eaae9c5fd0a06fd3102634e983d5878ce210ba842f9890e395eed2c8c454f4183e806d3f71a01d3a61d45cdcfb33497d29101a5c14371e38e244894de3cc6f079ed9d506a06dc126f17002576eb24c809f92e0561b94c6fd85389b781385e1b7138416801d5b76aad5938d14fee979422c02e3efe5cf5ed5927c44939d8d0b4879c5d100334de4715bc44af319a60d14d8990027ac47930eb63d70ca66ecbfbce2489acbef6adcc384cb4858329630f22745fa7841ce6bdd3281f41471a7ef47263a6d2ca9eff19c15f023021051c7c46dc2931d445ca6019e64a4b2c5e283e6982a9a4d6e93222d403bc844a5760fb562f1f3210fd393329ff42230d775916eef8cce456d8743752ca5012cec124e9e84ac3bb09ffb9e7eb2d44cc9a80f50d0a03613e166801958df1650657aa189b23d9ab85569d96b039c7d17110e6f3b9d291310a4b21b498bd6c73f15ba8d2dd725bfe3badf95559f4aca58cbd7bb6e1e020c4395e31bd72dbe4cc7ebeaf949113808bcdc4992fd774dfa34b28b489f2cf3f31a383de29cc4d7cfdb8b824268541fe917f5926f2f755e55de817d5671be179ebdb2b08fbf4df3860be47bc20697a42d8d82e9845088f6210e6c6e6297f71a7f1a7d0948125683bbd3a429de0b0cd4ed7cfdf459d8de16caf0dbc0d2f2aac5b73ca3703bbccf6d6c89fab4b6f3c6ccc7af7998a7a091b67f406bbf285fd3ca2ac97f0a2b4c97bbf5d67f6b52cc1dbecb5ba96d012ed90f8b24c5905112e714275fff6e03b188640bed999e61bcee464e37c1100a56d4ef9bff4b7541906282e59f6ea8718fe958d0cf3cffec6f7d416470ae04aef4fa55af69465dd8e61786c21eb35a4e6866c67fb3dba05f47512fbd90722e73ff6c1b91158c40df118891a6482e7c66cc5e4ba9d730e5d4c5c93c0d4f2e6f5c1a7f09601dbf57f249062ef4efb863549521e661ac4d33cad61151f7f4d846778d44858ffe1f695d79191bbaaeabde602e251c83360d56e7a5c4fafe6fff4d671da4d3c74e7031342784d2a5edb04bd9ca34a260bd0982cde7cb44c6dfe8ea0449730cdd36f0e77472d50e66929fe4756a255dfed87202ef1b8619c4a20b4d75087f18af0947265b99f257", 0x1000}], 0x3, &(0x7f00000037c0)={0x68, 0x105, 0x3, "1580a9a844a35b140550ed09bdb37b22485519e19ba5543237960fb8e0a4c285f6f3537507af423ba42fde7b01a6b1905a5e0a10aadd364824219f56db5659ab766bc4c173beaef9cd1b3b13495ceaf12fe887429ff7f248"}, 0x68}, {&(0x7f0000003840)={0x27, 0x1, 0x2, 0x5, 0x5, 0x8001, "f0464876d84c84c96fc611afce4db8f3e0eb3e2c8408a2e9d91e948dd8f31ea44c914d7ae918b36eb222d796f73edbd77b205136c155f51398b71436ace2e9", 0x31}, 0x60, &(0x7f0000004a00)=[{&(0x7f00000038c0)="ea9a80207b4e298981e13b60f38cfe6a01788f78aa513df918c1b2b2ed0b17039ce97b2334fe60466b6b46d599e736053342ac5360cc8b3aec54332632686edfd32aec5e723eb40eba0e4e070903db37e64bb5de18e472bc770471696ee8141cc85b334df5c4ee1650249fcd2158", 0x6e}, {&(0x7f0000003940)="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", 0x1000}, {&(0x7f0000004940)="fe0bfdfaba16b74122a9a99530b6fd189bf93782c93f11f7f71c3229830a7602dde6d165687ed8bba684329adca697ea4a03073eda2bb63f3aa1c7f21b2a5ec8b7be9fac73ea", 0x46}, {&(0x7f00000049c0)="0da19802af01edcd9d1db65e247255a060943aa1757177d2a97e504635e1954d856c659531b0e99bf6f9625f521614a4f89a36bb133f0d104b589525", 0x3c}], 0x4, 0x0, 0x0, 0x24000000}], 0x6, 0x0) r2 = dup2(r0, r1) read(r2, &(0x7f00000000c0)=""/85, 0x321) 17:49:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 254.650854] device bridge_slave_1 left promiscuous mode [ 254.656405] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.750800] device bridge_slave_0 left promiscuous mode [ 254.756313] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.874032] device hsr_slave_1 left promiscuous mode [ 254.934474] device hsr_slave_0 left promiscuous mode [ 254.973133] team0 (unregistering): Port device team_slave_1 removed [ 254.983643] team0 (unregistering): Port device team_slave_0 removed [ 254.993635] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 255.025096] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 255.095006] bond0 (unregistering): Released all slaves [ 257.610253] IPVS: ftp: loaded support on port[0] = 21 [ 257.948483] chnl_net:caif_netlink_parms(): no params data found [ 257.984479] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.991001] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.997940] device bridge_slave_0 entered promiscuous mode [ 258.004811] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.011327] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.018199] device bridge_slave_1 entered promiscuous mode [ 258.035539] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 258.044852] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 258.061695] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 258.068773] team0: Port device team_slave_0 added [ 258.074376] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 258.081795] team0: Port device team_slave_1 added [ 258.087018] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 258.094409] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 258.164390] device hsr_slave_0 entered promiscuous mode [ 258.200506] device hsr_slave_1 entered promiscuous mode [ 258.240853] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 258.247793] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 258.260769] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.267151] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.273839] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.280246] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.311044] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 258.317152] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.325791] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 258.335700] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 258.342956] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.349586] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.359409] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 258.365676] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.374287] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 258.382083] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.388454] bridge0: port 1(bridge_slave_0) entered forwarding state [ 258.397736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 258.406037] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.412433] bridge0: port 2(bridge_slave_1) entered forwarding state [ 258.430691] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 258.438398] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 258.446791] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 258.455390] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 258.467342] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 258.476166] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 258.482892] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 258.496074] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 258.507024] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 258.940616] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:49:44 executing program 2: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f00000000c0)={0x3, 0x0, 0x2, 0x3e}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000100)={0x1, r1}) set_mempolicy(0x4002, &(0x7f0000000140)=0x6, 0x9) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x8004, &(0x7f00000003c0)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x200000, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000080)=[@in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e21, 0xf402, @empty, 0x9}], 0x2c) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f00000001c0)=0x400) 17:49:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x240, 0x0) socket$inet(0x2, 0x3, 0x8000000000008) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) 17:49:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:49:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) 17:49:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:49:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:44 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) 17:49:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:44 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:49:45 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:45 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 262.000731] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 262.260293] IPVS: ftp: loaded support on port[0] = 21 [ 262.594624] chnl_net:caif_netlink_parms(): no params data found [ 262.632693] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.639170] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.646858] device bridge_slave_0 entered promiscuous mode [ 262.654189] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.660651] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.667578] device bridge_slave_1 entered promiscuous mode [ 262.686575] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 262.697015] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 262.717067] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 262.725406] team0: Port device team_slave_0 added [ 262.731089] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 262.738154] team0: Port device team_slave_1 added [ 262.743578] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 262.750874] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 262.804121] device hsr_slave_0 entered promiscuous mode [ 262.840487] device hsr_slave_1 entered promiscuous mode [ 262.881502] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 262.888471] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 262.902397] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.908824] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.915510] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.922005] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.954842] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 262.961139] 8021q: adding VLAN 0 to HW filter on device bond0 [ 262.969107] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 262.978189] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.985866] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.992953] bridge0: port 2(bridge_slave_1) entered disabled state [ 263.003945] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 263.010327] 8021q: adding VLAN 0 to HW filter on device team0 [ 263.021453] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 263.029040] bridge0: port 1(bridge_slave_0) entered blocking state [ 263.035465] bridge0: port 1(bridge_slave_0) entered forwarding state [ 263.043071] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 263.050908] bridge0: port 2(bridge_slave_1) entered blocking state [ 263.057248] bridge0: port 2(bridge_slave_1) entered forwarding state [ 263.073531] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 263.081313] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 263.092655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 263.102597] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 263.116030] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 263.126799] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 263.133446] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 263.140642] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 263.153244] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 263.165027] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 263.580648] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:49:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f00000002c0)=0x200, &(0x7f0000000380)=0x2) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') socket$inet(0x2, 0x3, 0x800000000000b) syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x1000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x379) socket$nl_xfrm(0x10, 0x3, 0x6) 17:49:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.stat\x00', 0x0, 0x0) 17:49:49 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:49 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:49 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:49:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f0000000000)="4bed59d50808002a72e2bddd654569ce5950e5b1cdbe0fb42a0d9e809d6747dd3eaa69839edf1dce4cd253a542d4d930991536209f593117766e2b2b32d4218754ae29f197f230b6591194c275a479f6fb2c8ef79ba2ad07f4485a2ac3956cd69aa9") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000000000"]}, 0x208) 17:49:49 executing program 2: clone(0x107fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x80, 0x0) connect$pptp(r0, &(0x7f0000000040)={0x18, 0x2, {0x3, @remote}}, 0x1e) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000940)='comm\x00') exit(0x808) write$P9_RFLUSH(r1, &(0x7f0000000080)={0x7, 0x6d, 0x2}, 0x7) connect$bt_rfcomm(r1, &(0x7f00000000c0)={0x1f, {0x7, 0x3, 0x7, 0x80, 0x3, 0xfffffffffffffffb}, 0x100}, 0xa) write$FUSE_NOTIFY_DELETE(r1, 0x0, 0x0) 17:49:49 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:49:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f0000000080)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x3, 0x800000000000b) r3 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000040)={0x42, 0x0, 0x2}, 0x10) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:49:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008910, &(0x7f0000000000)="4bed59d50808002a72e2bddd654569ce5950e5b1cdbe0fb42a0d9e809d6747dd3eaa69839edf1dce4cd253a542d4d930991536209f593117766e2b2b32d4218754ae29f197f230b6591194c275a479f6fb2c8ef79ba2ad07f4485a2ac3956cd69aa9") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000000000"]}, 0x208) 17:49:49 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:49 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:49 executing program 3: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet_buf(r0, 0x0, 0x2f, &(0x7f0000000100)="8535beb07f90b7c04b09a5360fa315595d447dd74fcc55f99aa8f49e5f965e09e78dd427bff3911fe248ed", 0x2b) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x800000000000b) r4 = request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000280)='vboxnet1trusted}!#\']vboxnet1em0trusted#\x00', 0xfffffffffffffff9) r5 = add_key(&(0x7f00000002c0)='pkcs7_test\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, r4, 0xffffffff80000001, 0x5, r5) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000000)={0x10003, 0x1, 0x100000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x0, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000780)=ANY=[]}, 0x78) 17:49:49 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:49 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r1, 0x80140912, 0x0) 17:49:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) socket$nl_crypto(0x10, 0x3, 0x15) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:49:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:50 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:50 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:50 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept(r0, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000140)=""/44, 0x2c}], 0x1}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000040)=0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000000c0)={[], 0x315, 0x7, 0xfff, 0x3, 0x9, r3}) 17:49:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 265.150942] device bridge_slave_1 left promiscuous mode [ 265.156506] bridge0: port 2(bridge_slave_1) entered disabled state 17:49:50 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:50 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 265.251930] device bridge_slave_0 left promiscuous mode [ 265.257470] bridge0: port 1(bridge_slave_0) entered disabled state 17:49:50 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:50 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 265.533251] device hsr_slave_1 left promiscuous mode [ 265.594375] device hsr_slave_0 left promiscuous mode [ 265.654006] team0 (unregistering): Port device team_slave_1 removed [ 265.677007] team0 (unregistering): Port device team_slave_0 removed [ 265.712205] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 265.774928] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 265.858695] bond0 (unregistering): Released all slaves [ 268.300192] IPVS: ftp: loaded support on port[0] = 21 [ 268.646381] chnl_net:caif_netlink_parms(): no params data found [ 268.683228] bridge0: port 1(bridge_slave_0) entered blocking state [ 268.689642] bridge0: port 1(bridge_slave_0) entered disabled state [ 268.696933] device bridge_slave_0 entered promiscuous mode [ 268.704346] bridge0: port 2(bridge_slave_1) entered blocking state [ 268.711018] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.718029] device bridge_slave_1 entered promiscuous mode [ 268.737399] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 268.747936] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 268.767581] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 268.775033] team0: Port device team_slave_0 added [ 268.780799] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 268.787867] team0: Port device team_slave_1 added [ 268.793238] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 268.800684] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 268.882483] device hsr_slave_0 entered promiscuous mode [ 268.930601] device hsr_slave_1 entered promiscuous mode [ 268.975746] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 268.982770] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 268.995581] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.001974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.008564] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.014952] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.046052] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 269.052604] 8021q: adding VLAN 0 to HW filter on device bond0 [ 269.061759] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 269.069925] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 269.078089] bridge0: port 1(bridge_slave_0) entered disabled state [ 269.085052] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.094449] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 269.101632] 8021q: adding VLAN 0 to HW filter on device team0 [ 269.110474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 269.118138] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.124562] bridge0: port 1(bridge_slave_0) entered forwarding state [ 269.135420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 269.143209] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.149569] bridge0: port 2(bridge_slave_1) entered forwarding state [ 269.166664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 269.174398] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 269.191641] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 269.201677] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 269.212367] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 269.218876] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 269.226772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 269.234582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 269.242489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 269.257796] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 269.267858] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 269.630580] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:49:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r1, 0x80140912, 0x0) 17:49:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c0d3f319bd070") syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x3, &(0x7f00007e0000)=""/4, &(0x7f0000000080)=0x4) ioctl(r1, 0x4, &(0x7f0000000000)="0cd047fdec5a4e7a698a03015679ba6c2a13c94f4f18984623d818d7a8fa846b9e17b92561598539118643d541cdf641ce64c4f98c0464b2c24278e04976090000000000000062d8ae5300"/85) 17:49:55 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000000000000000000000020000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000000000"]}, 0x204) 17:49:55 executing program 2: r0 = syz_open_dev$loop(0x0, 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000100), 0x2) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x0) sendfile(r0, r1, 0x0, 0x20000502000007) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000000)=ANY=[@ANYBLOB="02000000d99ad1ae9672d517dc158d75980000"]) 17:49:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:55 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000240)) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") bind$netrom(r1, &(0x7f0000000280)={{0x3, @bcast, 0x7}, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$GIO_UNIMAP(r0, 0x4b66, 0xfffffffffffffffe) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$KEYCTL_PKEY_QUERY(0x18, r4, 0x0, &(0x7f00000001c0)='em0vboxnet0vboxnet0@md5sum\'/\x00', &(0x7f0000000200)) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) keyctl$KEYCTL_PKEY_QUERY(0x18, r4, 0x0, &(0x7f00000005c0)='\x00', &(0x7f0000000600)) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x239) connect$inet(r1, &(0x7f0000000580)={0x2, 0x4e23, @local}, 0x10) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r5) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0xca, &(0x7f0000000080)={0x0, 0x1, 0x2, 0x0, 0xb4}, 0xc) 17:49:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r1, 0x80140912, 0x0) 17:49:55 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000600)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00', 0x0}) getpeername(0xffffffffffffff9c, &(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000000)=0x80) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x1d9840, 0x0) ioctl$KVM_SIGNAL_MSI(r2, 0x4020aea5, &(0x7f0000000300)={0xd000, 0xd004, 0x80000001, 0xfffffffffffffd6c, 0x3}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0xe5, "800139d7eb05a54ce2a5659a4d06160f6753e9b8e4718ad318206c62280c1dfca2eeaba29793cccd2ecf183979296503678ef9ebaf32b08643bba169da4623e72dc1b26fbbf24ddb770d75c1cb4fb2e4f0fa7e95f36198294b4fe9571f59c24919d2006cf37c1926602a90285d4a879600a25c2af9d250d1a8365d15a2d291c67a3dcb05222e5a376b96361032a8749f4e8dd0669df634e6e8e9565d84212f600f48257d153028e19334ceb724d085123929ae4e58547c4410e4c25b598216cbff82e6dbd58cc9bc01683e1b76d8b0741d53fc9837bd2d29b9b75da89facdc7db586776923"}, &(0x7f0000000200)=0xed) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000240)={0x9, 0x0, 0x3ec, 0xf291, r3}, &(0x7f0000000280)=0x10) 17:49:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:55 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x20e) 17:49:55 executing program 2: pipe(0x0) r0 = syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2f, 0x0, 0x0) perf_event_open(&(0x7f0000000a40)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x100082) r3 = memfd_create(&(0x7f0000000040)='\\eth0mime_type$%\x00', 0x0) pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000005c0)='\'', 0x1}], 0x1, 0x81806) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) write$P9_RREADDIR(r1, &(0x7f00000006c0)=ANY=[], 0x0) r4 = add_key(&(0x7f0000000400)='ceph\x00', &(0x7f0000000440)={'syz', 0x1}, &(0x7f0000000480)="447433e87dc0138287d8adeb46b989449e0142a722f7fcd6a4b27f3de53c69b314d1af0dc22d1898609125c68dcc6af1d8a5a4de254f6e56da21f63f16f64e30d2702d460e1cd44e32a6a978a52d70bc91e8e3ffdf559103ee9fe5230aad2e920d8fac84af3e135c70cae096bb386883ba8aa266b0e38c81d34a4b4452f628e5040a4e81501de85926854c2766b12db3ef74f00079c17ce25515919cdea21db77d07d4b18a10a53a548734e565662cb51caedb6f57c651954fb469e105281fae9847c21cc97ecd88c2fac782ef28d6208951ae4835e8f06c", 0xd8, 0xfffffffffffffffb) r5 = request_key(0x0, &(0x7f0000000640)={'syz', 0x3}, &(0x7f0000000680)='\x00', 0x0) request_key(&(0x7f00000006c0)='logon\x00', &(0x7f0000000700)={'syz', 0x3}, &(0x7f0000000740)='.request_key_auth\x00', r4) keyctl$instantiate(0xc, r4, &(0x7f0000000580)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'TIPCv2\x00', 0x20, 0x8001}, 0x32, r5) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') perf_event_open(0x0, 0x0, 0x0, r1, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000280)) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8320}, 0xc, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="000007000000ffdbdf2516000000980001004c00020008000200ca6256470800030001040000080001001d0000000800020002000000080002000900000008000400070000000800040007000000080001000e00000008000400010000002c0004001400010002004e220000005e00000000000000001400020002004e230000000500000000000000001c00020008000100060000000800030008000000080001000d000000"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x810) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000001c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6b2, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x3, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f00000008c0)=ANY=[@ANYBLOB="000000000000000000000000000000000100000004000000020000000000000000000000000000800c000000000000000008000000000000000000000000000000000000000000000005000000000000000000000000000000f348c64a00000000000000000000000000000000000000000100000000000000000000000000000072ba74391c58ac5de423bcf6d0574c3935785f0ff9a70504e08304b7996c4c98c7a237df76a3fd668491454f703d9d6dd0ad6ed9ffafb300c7bc44c1f66e7b4d35a23d3dd63c9e206e4c2ae862793daf229554c7ea0627611a126dc16fb1da06034827d54a80ac77741ec017a229189999c19b05904df439a9eb94f40b917683a5690c88cf4cb48d2b157f80d08d1861ba3dcd450159b044384d50760a6e10aeab6c6088e55a4db78aa7645063afbf4000c767e7b6ba10f1ed086334aa55e00400355d94c70f72cfa7376dd30a"]) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x4e23, 0x69378ec7, @mcast1, 0x8}, 0x1c) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f00000002c0)={0xba, 0x2, 'client0\x00', 0x0, "1155d7012db76889", "18389e38f1086cf2ebd815ee0184c477e3b58ab6d0c1a787e6326bc7c8919f0c", 0x5, 0x3}) sendfile(r2, r3, 0x0, 0x20000102000007) 17:49:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:55 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:55 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:49:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x4d9b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) setsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000040)=0xfffffffffffffff9, 0x4) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x242) 17:49:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:56 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x101000, 0x0) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000040)=0x3, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) sendmsg$tipc(r0, &(0x7f0000000700)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x1, {0x0, 0x2, 0x4}}, 0x10, &(0x7f0000000600)=[{&(0x7f0000000280)="1e3669e0f273457a30f23c520fe18c342c6359fbaa80c98f084792d6a2e343acb27007e1a4e26491c15d5e0c7a201aa10e964ae3a911d7daa3d8af2ae1052708d3191afec602db23fc002c6a7612901045c73273f6316eab01e815ba32f87bf2", 0x60}, {&(0x7f0000000380)="5fde0dbe0d96e3c9ac247a66c783646f9c5b4879157ec138ad48b6d22bce06d4bcafb7113ee98da066fb0879aa8b1d61872c3f249c105cbd169ba54986c7e26a53f416a0846260e20e91ea3108bb59547a9c3d7e879ced269c51f7e3648217d0f034296e0e68cb56c04d1470062794ca24353fdcb6fb104c0e7d79803ecce1813c3fc0ffc4db10054328ade2e662436e35a33451d764fd10e8", 0x99}, {&(0x7f0000000440)="2f5f10100e50b8f71384655ddda8cafcf2d4b609401fc0ec760830485357de7224da45a683413de891c17a81a0d596f11d20a38d6c21f922d4b3b6b81dbce7c3e12e160577db9d4056717f7ae92f", 0x4e}, {&(0x7f00000004c0)="85c0aec4263752ffddcaf0e064e8cf9217c7d5bc10824cbc3d4d718f1fccd0f0c5cfade30c861a50af0ee23e20f4ae7233a7d4067e8fe3b7aebe", 0x3a}, {&(0x7f0000000500)="5193abbc1198a732e63e33486b5c384a33eb5f1d61f7619134cb3271955b27ea2882d63d5de297f66ea00fee4c544b99ba729ee5c6ae135405d8500a627eeee42be463d297109f22e453edf7222e01e24a4488b7cdea06b192cb4138dcf522fe9bc69f0c302dacd82cee467e152bcfeda136031803340867d104ee90082c6520e90402ca360bcf8bdc1b552aba384fa80d42f1c5f1437b77f5ee6f8e2304c42a4f3d229dc94c3653af15a49188b6d8fbf3ce288fd6c99c4dc6efb040e2c5d2789d7a7d68d07d706a35315099d38f22e9e90bbb70eea1a1386bb183f11a1dffc1f11cfb", 0xe3}], 0x5, &(0x7f0000000680)="3dda115404d023137363788360cdb151c57017dcad0d1b5d5e3b96bd097d8b7d175569878f5de88fcd0b5966c4d70f5fa90d093b3475d6d34bda43312650d4ed92ffdfcd1b864f8d20651a1ee9d7bdc0a5b47c36f3b8f878c6ff81f50354620a5bcd1b56114310c7a4b757b26aa653bf5733233c7a988829095bf4cfa6185517", 0x80, 0x80}, 0x4000) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:49:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:56 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)={0x1, 0x8, 0x100000001, 0x8000000001, 0x1}, 0x2c) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x2, 0x0, 0x77fffb, 0x7, 0x820005, r0, 0x0, [], 0x0, r1}, 0x3c) poll(&(0x7f00000000c0)=[{r0, 0x80a4}], 0x1, 0xb1) r3 = bpf$MAP_CREATE(0x2, &(0x7f0000000080)={0x3, 0x0, 0x73fffb, 0x0, 0x20820000, r2}, 0x2c) poll(&(0x7f0000000000)=[{r3, 0x2000}, {r3, 0x8000}, {r2}], 0x3, 0xfffffffffffffff9) 17:49:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:49:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept(r0, &(0x7f00000000c0)=@rc, &(0x7f0000000040)=0x80) bind$tipc(r1, &(0x7f0000000140)=@nameseq={0x1e, 0x1, 0x3, {0x1, 0x2, 0x2}}, 0x10) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f00000001c0), 0x4) r2 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x3ff, 0x105000) setsockopt$inet_tcp_int(r2, 0x6, 0x0, &(0x7f0000000280)=0xfffffffffffffffa, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, 0x0, 0x218) write$binfmt_misc(r0, &(0x7f0000000400)={'syz0', "e658a0dbb6a57d5d044e871a9a2740f8f9ea84209f71f9817a0264191469868f1578ba54ace980db32823daa8d0a031f068bf75373f1b596cbdf86ddda306bfe0b6cd09f9d53ae50ca27ee39d34be845ca92652ad744221cc5d30ef5661a57ac9d1a8c166f59f156dfee96baca07bfdb060947173b6a45de2673c915c00bf318376213c3024d86a595676ba8d7d1d25df5"}, 0x95) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}, 0x226) setsockopt$RDS_RECVERR(r2, 0x114, 0x5, &(0x7f0000000000), 0x4) 17:49:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:49:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:49:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 271.971763] device bridge_slave_1 left promiscuous mode [ 271.977393] bridge0: port 2(bridge_slave_1) entered disabled state [ 272.030972] device bridge_slave_0 left promiscuous mode [ 272.037661] bridge0: port 1(bridge_slave_0) entered disabled state [ 272.222504] device hsr_slave_1 left promiscuous mode [ 272.262972] device hsr_slave_0 left promiscuous mode [ 272.316362] team0 (unregistering): Port device team_slave_1 removed [ 272.326436] team0 (unregistering): Port device team_slave_0 removed [ 272.336063] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 272.365024] bond0 (unregistering): Releasing backup interface bond_slave_0 17:49:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008992, &(0x7f0000000040)="0adc1f123c123f319bd070") shmget$private(0x0, 0x2000, 0x54001d20, &(0x7f0000ffe000/0x2000)=nil) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) connect$nfc_llcp(r1, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x7, 0x3, 0x51, "6c1af207058e715ff64268d4364405ca653e90e59f423ba276a84e4145bb3494f71895836be1bc2f54dcb15ddeefba384fa17296651c4d0b4c4176d69dc58e", 0x39}, 0x60) [ 272.436380] bond0 (unregistering): Released all slaves [ 275.110180] IPVS: ftp: loaded support on port[0] = 21 [ 275.538732] chnl_net:caif_netlink_parms(): no params data found [ 275.577008] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.583599] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.591172] device bridge_slave_0 entered promiscuous mode [ 275.597856] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.605026] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.612495] device bridge_slave_1 entered promiscuous mode [ 275.629755] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 275.638967] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 275.657738] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 275.665068] team0: Port device team_slave_0 added [ 275.670948] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 275.678026] team0: Port device team_slave_1 added [ 275.683789] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 275.691254] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 275.754103] device hsr_slave_0 entered promiscuous mode [ 275.790509] device hsr_slave_1 entered promiscuous mode [ 275.830804] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 275.837742] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 275.851534] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.857940] bridge0: port 2(bridge_slave_1) entered forwarding state [ 275.864645] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.871020] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.901684] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 275.907787] 8021q: adding VLAN 0 to HW filter on device bond0 [ 275.916124] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 275.924851] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 275.933051] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.939670] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.949377] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 275.955616] 8021q: adding VLAN 0 to HW filter on device team0 [ 275.964212] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 275.971927] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.978323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 275.987984] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 275.995865] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.002270] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.019300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 276.027145] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 276.037174] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 276.048594] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 276.058715] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 276.069674] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 276.075983] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 276.088904] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 276.100888] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 276.520860] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:50:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x3, 0x800000000000b) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000000040)={r0, 0x401, 0x7fff, "5e9bb2396033555404317b322955713604c61427fd50d9fe729e27ebd361f694afd19be07eab1cada026e162058b0ce62bdf2326c0873e42d469"}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000380)={{0x7, 0x7f}, 'port1\x00', 0x8f, 0x40, 0x0, 0x6, 0x5b, 0x9, 0x7fffffff, 0x0, 0x5, 0x6}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000000000"]}, 0x208) 17:50:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(r0, r0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x61, &(0x7f0000000080)={'filter\x03\xb8\x00'}, &(0x7f0000000100)=0x28) 17:50:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x213) 17:50:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x2}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r1, 0x107, 0x100000b, &(0x7f0000000000), &(0x7f00000000c0)=0x4) 17:50:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) r3 = dup2(r1, r2) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000000)) 17:50:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) r2 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x20) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000040)=0x5) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, 0x0, 0x218) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcs\x00', 0x2200, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]}, 0x261) 17:50:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) r2 = request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='#[[.[&em0bdev\x00', 0x0) r3 = add_key(&(0x7f0000000280)='pkcs7_test\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, r2, 0xff, 0x3, r3) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000000000"]}, 0x208) 17:50:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@loopback, @in6=@loopback}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:02 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 277.860658] device bridge_slave_1 left promiscuous mode [ 277.866211] bridge0: port 2(bridge_slave_1) entered disabled state 17:50:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:02 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x72, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x5, 0x8, 0x6, 0xfff, 0x3, 0x7, 0x80, 0x5d, 0x38, 0x4d, 0x101, 0x100, 0x20, 0x2, 0x3f, 0x9, 0xbb}, [{0x60000000, 0x0, 0x9, 0x6, 0x1, 0x2299, 0xfffffffffffffff8, 0x2}, {0x3, 0x7, 0x1, 0x80000001, 0x6, 0x1c00000, 0x1, 0xffffffff}], "41e93a2fa6de137e8690c8139793349fcc53c053c44ccccfe21f8c5ed1c1999c7476577f61084a8bde749027df8f28eef0df9fa1fb431d5e1f66cbc278d31f5413bf208ca7a24a860ec40a9c66c31c0b401a9c8282da7c73f193a134d919872b0658ba4260c5f3", [[], []]}, 0x2df) sendto$inet(r1, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080)={0x7}, 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) recvfrom$llc(r0, &(0x7f00000001c0)=""/81, 0x51, 0x2020, &(0x7f0000000240)={0x1a, 0x1, 0x3, 0x80, 0x786, 0x400, @local}, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/fib_triestat\x00') prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) write$input_event(r2, &(0x7f0000000340)={{0x77359400}, 0x5, 0x3, 0x20}, 0x18) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) mq_open(&(0x7f0000000680)='Ywlan1*\x00', 0x40, 0x20, &(0x7f00000006c0)={0x5, 0x3ff, 0x135, 0x0, 0x7f, 0xd8, 0x9c2, 0x100000001}) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r3, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000140)) 17:50:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 277.961509] device bridge_slave_0 left promiscuous mode [ 277.967161] bridge0: port 1(bridge_slave_0) entered disabled state 17:50:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 278.225591] device hsr_slave_1 left promiscuous mode [ 278.284199] device hsr_slave_0 left promiscuous mode [ 278.326267] team0 (unregistering): Port device team_slave_1 removed [ 278.353164] team0 (unregistering): Port device team_slave_0 removed [ 278.377501] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 278.435484] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 278.526875] bond0 (unregistering): Released all slaves [ 281.090365] IPVS: ftp: loaded support on port[0] = 21 [ 281.462682] chnl_net:caif_netlink_parms(): no params data found [ 281.497347] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.503981] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.511407] device bridge_slave_0 entered promiscuous mode [ 281.518007] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.524515] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.533213] device bridge_slave_1 entered promiscuous mode [ 281.551962] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 281.561116] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 281.578737] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 281.587495] team0: Port device team_slave_0 added [ 281.593303] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 281.600801] team0: Port device team_slave_1 added [ 281.606092] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 281.613526] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 281.673836] device hsr_slave_0 entered promiscuous mode [ 281.720580] device hsr_slave_1 entered promiscuous mode [ 281.762340] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 281.769411] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 281.782708] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.789122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.795878] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.802298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.834844] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 281.841893] 8021q: adding VLAN 0 to HW filter on device bond0 [ 281.851007] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 281.859546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 281.867299] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.874527] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.884428] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 281.891480] 8021q: adding VLAN 0 to HW filter on device team0 [ 281.900174] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 281.907939] bridge0: port 1(bridge_slave_0) entered blocking state [ 281.914482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 281.930490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 281.938185] bridge0: port 2(bridge_slave_1) entered blocking state [ 281.944688] bridge0: port 2(bridge_slave_1) entered forwarding state [ 281.962197] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 281.972149] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 281.983337] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 281.990470] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 281.998173] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 282.005930] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 282.013837] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 282.021584] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 282.028489] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 282.042679] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 282.053584] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 282.450815] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:50:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:08 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x72, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) write$binfmt_elf32(r0, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x5, 0x8, 0x6, 0xfff, 0x3, 0x7, 0x80, 0x5d, 0x38, 0x4d, 0x101, 0x100, 0x20, 0x2, 0x3f, 0x9, 0xbb}, [{0x60000000, 0x0, 0x9, 0x6, 0x1, 0x2299, 0xfffffffffffffff8, 0x2}, {0x3, 0x7, 0x1, 0x80000001, 0x6, 0x1c00000, 0x1, 0xffffffff}], "41e93a2fa6de137e8690c8139793349fcc53c053c44ccccfe21f8c5ed1c1999c7476577f61084a8bde749027df8f28eef0df9fa1fb431d5e1f66cbc278d31f5413bf208ca7a24a860ec40a9c66c31c0b401a9c8282da7c73f193a134d919872b0658ba4260c5f3", [[], []]}, 0x2df) sendto$inet(r1, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080)={0x7}, 0x4) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000)=0xda9, 0x4) recvfrom$llc(r0, &(0x7f00000001c0)=""/81, 0x51, 0x2020, &(0x7f0000000240)={0x1a, 0x1, 0x3, 0x80, 0x786, 0x400, @local}, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/fib_triestat\x00') prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) write$input_event(r2, &(0x7f0000000340)={{0x77359400}, 0x5, 0x3, 0x20}, 0x18) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) mq_open(&(0x7f0000000680)='Ywlan1*\x00', 0x40, 0x20, &(0x7f00000006c0)={0x5, 0x3ff, 0x135, 0x0, 0x7f, 0xd8, 0x9c2, 0x100000001}) r3 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r3, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000140)) 17:50:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x0, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[]}, 0x78) 17:50:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) dup3(r1, r1, 0x80000) 17:50:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r1, 0x80140912, 0x0) 17:50:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) arch_prctl$ARCH_SET_GS(0x1001, 0x3f) r2 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000000400)={&(0x7f0000000280), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffffb}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r4 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x9, 0x40000) write$selinux_access(r4, &(0x7f0000000040)={'system_u:object_r:apt_var_cache_t:s0', 0x20, '/usr/sbin/cups-browsed', 0x20, 0xfff}, 0x51) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000000000"]}, 0x208) 17:50:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r1, 0x80140912, 0x0) 17:50:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, 0x0, 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9, 0x18000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, 0x0, 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, 0x0, 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, 0x0, 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x0, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 283.851701] device bridge_slave_1 left promiscuous mode [ 283.857256] bridge0: port 2(bridge_slave_1) entered disabled state 17:50:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, 0x0, 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 283.956170] device bridge_slave_0 left promiscuous mode [ 283.965949] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.152137] device hsr_slave_1 left promiscuous mode [ 284.193862] device hsr_slave_0 left promiscuous mode [ 284.253913] team0 (unregistering): Port device team_slave_1 removed [ 284.286955] team0 (unregistering): Port device team_slave_0 removed [ 284.310703] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 284.364521] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 284.446680] bond0 (unregistering): Released all slaves [ 287.030262] IPVS: ftp: loaded support on port[0] = 21 [ 287.404615] chnl_net:caif_netlink_parms(): no params data found [ 287.449262] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.455792] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.463194] device bridge_slave_0 entered promiscuous mode [ 287.471080] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.477514] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.484722] device bridge_slave_1 entered promiscuous mode [ 287.507019] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 287.516381] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 287.537146] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 287.544647] team0: Port device team_slave_0 added [ 287.554125] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 287.561341] team0: Port device team_slave_1 added [ 287.566592] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 287.574123] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 287.614598] device hsr_slave_0 entered promiscuous mode [ 287.670571] device hsr_slave_1 entered promiscuous mode [ 287.740700] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 287.750667] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 287.764581] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.771013] bridge0: port 2(bridge_slave_1) entered forwarding state [ 287.777678] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.784114] bridge0: port 1(bridge_slave_0) entered forwarding state [ 287.816889] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 287.823184] 8021q: adding VLAN 0 to HW filter on device bond0 [ 287.831809] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 287.842268] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 287.849608] bridge0: port 1(bridge_slave_0) entered disabled state [ 287.856494] bridge0: port 2(bridge_slave_1) entered disabled state [ 287.870940] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 287.877036] 8021q: adding VLAN 0 to HW filter on device team0 [ 287.886948] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 287.894707] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.901209] bridge0: port 1(bridge_slave_0) entered forwarding state [ 287.922147] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 287.929852] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.936279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 287.945511] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 287.953887] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 287.964186] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 287.980526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 287.988020] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 287.997086] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 288.003953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 288.020678] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 288.030543] 8021q: adding VLAN 0 to HW filter on device batadv0 17:50:13 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r1, 0x80140912, 0x0) 17:50:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, 0x0, 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) r2 = shmget$private(0x0, 0x1000, 0x78001450, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_INFO(r2, 0x3, &(0x7f0000000440)=""/4096) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x200, 0x0) ioctl$VIDIOC_S_FBUF(r3, 0x4030560b, &(0x7f0000000040)={0x38, 0x40, &(0x7f0000000380)="01a33ff125744bac44fac955ff9ba398d3b9bed6ed8a15eb6c767157eb8b9545fb49da4d590e71f0d046f4d674b14910becf64ef3064b5f3f900291a1625552c44a4d90892e597290ea67b89999727d7d11faa96709bb6551f41f4486cb7d82ef43dffd778fe1c75b01e3608795e771594ae55509ee3d049fde56487932ffe2fd4cf3fca694ba0c973c833a9976c54fd4ac8793dc39567714ad53ac79cc2479b2d6a", {0x8, 0x0, 0x34365f5c, 0xd, 0x7, 0x6, 0xe, 0x1ff}}) 17:50:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:13 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff000000000000000000000000fdffffff07000000000000000000000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000feffffff0100000003000000000000000000796102300000010000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f67000000000000000000000000000000000000000000000000000000000028000000e1ffffff00f6369f8825cdf9100d4b4291824103000000a545ed633d0f08a7d875af8e000000000000000000"]}, 0x1ef) [ 288.402993] device bridge_slave_1 left promiscuous mode [ 288.408551] bridge0: port 2(bridge_slave_1) entered disabled state [ 288.501233] device bridge_slave_0 left promiscuous mode [ 288.506894] bridge0: port 1(bridge_slave_0) entered disabled state [ 288.653129] device hsr_slave_1 left promiscuous mode [ 288.704169] device hsr_slave_0 left promiscuous mode [ 288.764865] team0 (unregistering): Port device team_slave_1 removed [ 288.783235] team0 (unregistering): Port device team_slave_0 removed [ 288.795356] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 288.864388] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 288.945693] bond0 (unregistering): Released all slaves 17:50:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r1, 0x80140912, 0x0) 17:50:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, 0x0, 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:14 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) [ 289.015044] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 291.360380] IPVS: ftp: loaded support on port[0] = 21 [ 291.682938] chnl_net:caif_netlink_parms(): no params data found [ 291.726377] bridge0: port 1(bridge_slave_0) entered blocking state [ 291.732937] bridge0: port 1(bridge_slave_0) entered disabled state [ 291.739886] device bridge_slave_0 entered promiscuous mode [ 291.749678] bridge0: port 2(bridge_slave_1) entered blocking state [ 291.756132] bridge0: port 2(bridge_slave_1) entered disabled state [ 291.763643] device bridge_slave_1 entered promiscuous mode [ 291.783664] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 291.797087] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 291.814276] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 291.821680] team0: Port device team_slave_0 added [ 291.827121] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 291.834506] team0: Port device team_slave_1 added [ 291.839847] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 291.849528] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 291.912763] device hsr_slave_0 entered promiscuous mode [ 291.950400] device hsr_slave_1 entered promiscuous mode [ 291.990661] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 291.997681] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 292.014232] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.020624] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.027210] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.033617] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.067767] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 292.074492] 8021q: adding VLAN 0 to HW filter on device bond0 [ 292.084229] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 292.096082] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 292.103484] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.110291] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.119730] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 292.126385] 8021q: adding VLAN 0 to HW filter on device team0 [ 292.135275] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 292.143111] bridge0: port 1(bridge_slave_0) entered blocking state [ 292.149477] bridge0: port 1(bridge_slave_0) entered forwarding state [ 292.162676] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 292.170580] bridge0: port 2(bridge_slave_1) entered blocking state [ 292.176947] bridge0: port 2(bridge_slave_1) entered forwarding state [ 292.193426] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 292.201758] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 292.215915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 292.226068] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 292.237916] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 292.248326] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 292.255045] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 292.262271] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 292.271174] device bridge_slave_1 left promiscuous mode [ 292.276686] bridge0: port 2(bridge_slave_1) entered disabled state [ 292.331026] device bridge_slave_0 left promiscuous mode [ 292.336512] bridge0: port 1(bridge_slave_0) entered disabled state [ 292.474221] device hsr_slave_1 left promiscuous mode [ 292.515148] device hsr_slave_0 left promiscuous mode [ 292.563275] team0 (unregistering): Port device team_slave_1 removed [ 292.574981] team0 (unregistering): Port device team_slave_0 removed [ 292.584557] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 292.643765] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 292.726116] bond0 (unregistering): Released all slaves [ 292.788109] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 292.795150] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 292.807945] 8021q: adding VLAN 0 to HW filter on device batadv0 17:50:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, 0x0, 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r1, 0x80140912, 0x0) 17:50:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r2, 0xc0305710, &(0x7f0000000040)={0x0, 0x8, 0x7, 0x7}) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000080)=0x3, 0x4) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x6, &(0x7f0000000000)='nodev\x00'}, 0x30) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000080)=0x0) rt_tgsigqueueinfo(r3, r4, 0x25, &(0x7f0000000280)={0x28, 0x1, 0xffff}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ad633d0f08a7d875af8e000000000000000000"]}, 0x208) 17:50:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, 0x0, 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f00000003c0)) socket$inet(0x2, 0x3, 0x800000000000b) pipe2$9p(&(0x7f0000000300), 0x4800) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000440)={@remote, r3}, 0x14) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/audio\x00', 0x20c080, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r4, 0xc028564e, &(0x7f0000000380)={0x0, 0x1, [0x2, 0xff, 0x5, 0x8, 0x100000001, 0x101, 0x7f, 0x9]}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, 0x0, 0x218) ioctl$EVIOCGKEYCODE_V2(r4, 0x80284504, &(0x7f0000000480)=""/152) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) getsockopt$EBT_SO_GET_INIT_INFO(r4, 0x0, 0x82, &(0x7f0000000000)={'\x01\x00lter\x00\xee\x00'}, &(0x7f0000000540)=0xffcd) 17:50:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:18 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 295.890245] IPVS: ftp: loaded support on port[0] = 21 [ 296.277003] chnl_net:caif_netlink_parms(): no params data found [ 296.321849] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.328282] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.335538] device bridge_slave_0 entered promiscuous mode [ 296.346375] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.352888] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.359804] device bridge_slave_1 entered promiscuous mode [ 296.378377] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 296.387680] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 296.414283] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 296.421940] team0: Port device team_slave_0 added [ 296.427417] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 296.434752] team0: Port device team_slave_1 added [ 296.439948] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 296.447378] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 296.504307] device hsr_slave_0 entered promiscuous mode [ 296.540421] device hsr_slave_1 entered promiscuous mode [ 296.600882] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 296.607979] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 296.625711] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.632168] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.638769] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.645185] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.675400] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 296.682242] 8021q: adding VLAN 0 to HW filter on device bond0 [ 296.695282] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 296.704501] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 296.712151] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.718771] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.729377] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 296.737864] 8021q: adding VLAN 0 to HW filter on device team0 [ 296.750672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 296.758288] bridge0: port 1(bridge_slave_0) entered blocking state [ 296.764740] bridge0: port 1(bridge_slave_0) entered forwarding state [ 296.780959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 296.788582] bridge0: port 2(bridge_slave_1) entered blocking state [ 296.795010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 296.814257] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 296.822627] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 296.830919] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 296.838469] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 296.852081] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 296.861962] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 296.868001] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 296.881217] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 296.892810] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 296.899801] device bridge_slave_1 left promiscuous mode [ 296.905752] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.931132] device bridge_slave_0 left promiscuous mode [ 296.936624] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.062246] device hsr_slave_1 left promiscuous mode [ 297.123626] device hsr_slave_0 left promiscuous mode [ 297.163449] team0 (unregistering): Port device team_slave_1 removed [ 297.174101] team0 (unregistering): Port device team_slave_0 removed [ 297.183894] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 297.223832] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 297.304567] bond0 (unregistering): Released all slaves [ 297.364975] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:50:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(0x0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r1, 0x80140912, 0x0) 17:50:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x48, 0xa) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) ioctl$int_in(r1, 0x5452, &(0x7f0000000000)=0xffffffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:22 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x2000, 0x2) getsockopt$inet_dccp_buf(r0, 0x21, 0x80, &(0x7f0000000040)=""/24, &(0x7f0000000080)=0x18) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x10000, &(0x7f0000000000)="00000000f07f0000") openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x20002, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x0, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000700)=ANY=[]}, 0x78) 17:50:22 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:22 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 299.921218] device bridge_slave_1 left promiscuous mode [ 299.926729] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.990857] device bridge_slave_0 left promiscuous mode [ 299.996371] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.134490] device hsr_slave_1 left promiscuous mode [ 300.184393] device hsr_slave_0 left promiscuous mode [ 300.225151] team0 (unregistering): Port device team_slave_1 removed [ 300.234811] team0 (unregistering): Port device team_slave_0 removed [ 300.245125] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 300.285538] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 300.365204] bond0 (unregistering): Released all slaves [ 302.940244] IPVS: ftp: loaded support on port[0] = 21 [ 303.338672] chnl_net:caif_netlink_parms(): no params data found [ 303.375216] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.381790] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.388758] device bridge_slave_0 entered promiscuous mode [ 303.395639] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.402190] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.409199] device bridge_slave_1 entered promiscuous mode [ 303.427195] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 303.436351] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 303.454950] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 303.462425] team0: Port device team_slave_0 added [ 303.468445] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 303.476217] team0: Port device team_slave_1 added [ 303.481695] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 303.488950] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 303.544028] device hsr_slave_0 entered promiscuous mode [ 303.582740] device hsr_slave_1 entered promiscuous mode [ 303.620890] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 303.627871] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 303.641021] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.647408] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.654143] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.660588] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.691330] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 303.697446] 8021q: adding VLAN 0 to HW filter on device bond0 [ 303.705792] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 303.714699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 303.722329] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.729209] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.738964] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 303.745168] 8021q: adding VLAN 0 to HW filter on device team0 [ 303.753699] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 303.762100] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.768467] bridge0: port 1(bridge_slave_0) entered forwarding state [ 303.791682] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 303.799328] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.805770] bridge0: port 2(bridge_slave_1) entered forwarding state [ 303.814038] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 303.821886] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 303.829723] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 303.837310] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 303.845937] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 303.855186] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 303.861385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 303.874035] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 303.884150] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 304.320483] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:50:30 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='bbr2', 0x4) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x23}}, 0x10) 17:50:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:30 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:30 executing program 3: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]}, 0x212) 17:50:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 17:50:30 executing program 2: 17:50:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x7, 0x8) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x1fb) 17:50:30 executing program 2: 17:50:30 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 307.760241] IPVS: ftp: loaded support on port[0] = 21 [ 308.082526] chnl_net:caif_netlink_parms(): no params data found [ 308.119669] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.126165] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.133529] device bridge_slave_0 entered promiscuous mode [ 308.140413] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.146789] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.154143] device bridge_slave_1 entered promiscuous mode [ 308.170866] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 308.179600] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 308.199177] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 308.206530] team0: Port device team_slave_0 added [ 308.212881] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 308.219992] team0: Port device team_slave_1 added [ 308.225355] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 308.232759] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 308.282383] device hsr_slave_0 entered promiscuous mode [ 308.320568] device hsr_slave_1 entered promiscuous mode [ 308.360735] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 308.367649] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 308.381591] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.387955] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.394639] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.401133] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.434593] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 308.440997] 8021q: adding VLAN 0 to HW filter on device bond0 [ 308.449249] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 308.457739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 308.465964] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.473574] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.483242] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 308.489306] 8021q: adding VLAN 0 to HW filter on device team0 [ 308.500564] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 308.508124] bridge0: port 1(bridge_slave_0) entered blocking state [ 308.514535] bridge0: port 1(bridge_slave_0) entered forwarding state [ 308.525975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 308.533850] bridge0: port 2(bridge_slave_1) entered blocking state [ 308.540238] bridge0: port 2(bridge_slave_1) entered forwarding state [ 308.561461] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 308.569155] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 308.577484] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 308.586043] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 308.594813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 308.605510] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 308.611609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 308.625026] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 308.635716] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 309.070464] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:50:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 17:50:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000000000"]}, 0x208) 17:50:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:34 executing program 2: 17:50:34 executing program 2: 17:50:34 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x37) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 17:50:34 executing program 2: 17:50:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 17:50:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:34 executing program 2: 17:50:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_mr_vif\x00') ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"/404]}, 0x20c) 17:50:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 17:50:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[{0xc}], 0xc}, 0x0) 17:50:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000000)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x19e, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x216) 17:50:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 17:50:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 17:50:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0x37b, 0x80) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f00000002c0)={0xb1, 0x5, 0x7, 0x7, 0x10001}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0xd20) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4001, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x9, 0x0, 0x1, 0x3f}) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000080)={0x800, r4, 0x0, 0x1}) 17:50:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f000003e000)='\'', 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f00000000c0)) 17:50:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:35 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) [ 310.153853] device bridge_slave_1 left promiscuous mode [ 310.159347] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.242556] device bridge_slave_0 left promiscuous mode [ 310.248184] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.462563] device hsr_slave_1 left promiscuous mode [ 310.533079] device hsr_slave_0 left promiscuous mode [ 310.583727] team0 (unregistering): Port device team_slave_1 removed [ 310.595414] team0 (unregistering): Port device team_slave_0 removed [ 310.605295] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 310.673713] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 310.744512] bond0 (unregistering): Released all slaves [ 313.360243] IPVS: ftp: loaded support on port[0] = 21 [ 313.732565] chnl_net:caif_netlink_parms(): no params data found [ 313.771179] bridge0: port 1(bridge_slave_0) entered blocking state [ 313.777609] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.784762] device bridge_slave_0 entered promiscuous mode [ 313.791707] bridge0: port 2(bridge_slave_1) entered blocking state [ 313.798100] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.805382] device bridge_slave_1 entered promiscuous mode [ 313.821568] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 313.830737] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 313.849642] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 313.857027] team0: Port device team_slave_0 added [ 313.862689] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 313.869763] team0: Port device team_slave_1 added [ 313.875754] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 313.883011] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 313.954098] device hsr_slave_0 entered promiscuous mode [ 313.990531] device hsr_slave_1 entered promiscuous mode [ 314.050851] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 314.057770] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 314.070668] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.077028] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.083714] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.090116] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.119382] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 314.125769] 8021q: adding VLAN 0 to HW filter on device bond0 [ 314.135090] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 314.144284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 314.151665] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.158354] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.169359] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 314.175671] 8021q: adding VLAN 0 to HW filter on device team0 [ 314.184657] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 314.192460] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.198853] bridge0: port 1(bridge_slave_0) entered forwarding state [ 314.208610] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 314.216287] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.222798] bridge0: port 2(bridge_slave_1) entered forwarding state [ 314.238065] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 314.246154] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 314.257495] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 314.267029] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 314.278575] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 314.288341] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 314.295105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 314.307311] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 314.317655] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 314.720538] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:50:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb62}, 0x28) 17:50:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f0000000000)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default]}) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180b10000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f67000000000000000000000000000000000000000000e700000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000000000"]}, 0x208) 17:50:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sndseq(&(0x7f0000b39000)='/dev/snd/seq\x00', 0x0, 0x0) r0 = memfd_create(&(0x7f000003e000)='\'', 0x0) r1 = syz_open_dev$sndseq(0x0, 0x0, 0x0) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f00000000c0)) 17:50:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 17:50:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x554, 0x4000) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000200)=0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000100)=0xdb) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/route\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000269, 0x10400003) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x800, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000000)=0xae7, &(0x7f0000000040)=0x4) 17:50:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb62}, 0x28) 17:50:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb62}, 0x28) 17:50:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb62}, 0x28) 17:50:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000000)=0x5, &(0x7f0000000040)=0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb62}, 0x28) 17:50:40 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x554, 0x4000) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000200)=0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000100)=0xdb) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='net/route\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000269, 0x10400003) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x800, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r3, 0x112, 0xa, &(0x7f0000000000)=0xae7, &(0x7f0000000040)=0x4) 17:50:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) socket$inet(0x2, 0x800, 0xffff) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x223) 17:50:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb62}, 0x28) 17:50:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb62}, 0x28) 17:50:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xb62}, 0x28) 17:50:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000380)=""/132) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") sendto$unix(r1, &(0x7f0000000440)="1fb44e52e0bb87223d8caab09365db995bd97bc7a4fd573fceb727032a7de3bfef37a2eed5ea5ca1c28060ed5fc30659317996b7c9c001811dfb830ae3d89f9b894066817cd3cf85be2ffaba15c26cdc6f6b5100b742619151290c1819af3a159941842d5524b73b0aeb558e6830bed530aa1885096e14fc4cfc9d3e80795ea9506ea1924491a9", 0x87, 0x4000, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e24}, 0x6e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000000000"]}, 0x208) [ 316.121255] device bridge_slave_1 left promiscuous mode [ 316.127215] bridge0: port 2(bridge_slave_1) entered disabled state 17:50:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xb62}, 0x28) 17:50:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb62}, 0x28) 17:50:41 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xb62}, 0x28) [ 316.232888] device bridge_slave_0 left promiscuous mode [ 316.238791] bridge0: port 1(bridge_slave_0) entered disabled state 17:50:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xb62}, 0x28) 17:50:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb62}, 0x28) [ 316.594980] device hsr_slave_1 left promiscuous mode [ 316.654166] device hsr_slave_0 left promiscuous mode [ 316.688873] team0 (unregistering): Port device team_slave_1 removed [ 316.718798] team0 (unregistering): Port device team_slave_0 removed [ 316.753087] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 316.796229] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 316.897300] bond0 (unregistering): Released all slaves [ 319.370288] IPVS: ftp: loaded support on port[0] = 21 [ 319.684001] chnl_net:caif_netlink_parms(): no params data found [ 319.719088] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.725688] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.732679] device bridge_slave_0 entered promiscuous mode [ 319.739247] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.745911] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.752986] device bridge_slave_1 entered promiscuous mode [ 319.772420] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 319.782051] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 319.800224] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 319.807382] team0: Port device team_slave_0 added [ 319.813307] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 319.820629] team0: Port device team_slave_1 added [ 319.825911] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 319.833386] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 319.904124] device hsr_slave_0 entered promiscuous mode [ 319.941234] device hsr_slave_1 entered promiscuous mode [ 319.990822] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 319.997907] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 320.011870] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.018254] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.024968] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.031370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.063215] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 320.069369] 8021q: adding VLAN 0 to HW filter on device bond0 [ 320.078193] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 320.087601] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 320.095014] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.101807] bridge0: port 2(bridge_slave_1) entered disabled state [ 320.113675] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 320.119771] 8021q: adding VLAN 0 to HW filter on device team0 [ 320.128552] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 320.136221] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.142635] bridge0: port 1(bridge_slave_0) entered forwarding state [ 320.161380] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 320.168987] bridge0: port 2(bridge_slave_1) entered blocking state [ 320.175439] bridge0: port 2(bridge_slave_1) entered forwarding state [ 320.183545] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 320.191242] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 320.199539] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 320.209520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 320.222031] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 320.233508] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 320.239578] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 320.253555] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 320.265129] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 320.670525] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:50:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xb62}, 0x28) 17:50:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x7, 0x0, &(0x7f0000000000)="015283e0627bcb", 0x0, 0xb62}, 0x28) 17:50:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r0, 0xffffffffffffffff, 0x80000) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x554, 0x4000) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cpuacct.usage_user\x00', 0x0, 0x0) r2 = dup(r0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000200)=0x2) r3 = openat$cgroup_ro(r2, &(0x7f00000000c0)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f0000000100)=0xdb) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x1}], 0x100000c7, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='net/route\x00') preadv(r4, &(0x7f0000000480), 0x1000000000000269, 0x10400003) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x60001, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x800, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r5, 0x112, 0xa, &(0x7f0000000000)=0xae7, &(0x7f0000000040)=0x4) 17:50:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"]}, 0x303) 17:50:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xb62}, 0x28) 17:50:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x5, 0xffff, 0x1}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xb62}, 0x28) 17:50:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xb62}, 0x28) 17:50:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x7, 0x0, &(0x7f0000000000)="015283e0627bcb", 0x0, 0xb62}, 0x28) 17:50:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x7, 0x0, &(0x7f0000000000)="015283e0627bcb", 0x0, 0xb62}, 0x28) 17:50:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="00fb8401ff61fbf6057c5785cf5da83fececa5ae2efa4186f166528550ccf013e8ac1a3ac27339d2f07b97c43baca5dd567f7897abff19c9dddaa2914015cb6d975b440603f844dbbb2863736507952c888627d8deed26166564ba45aefbe1dfe22618578de45f7b641ac26217a3ea1c7ca85f18266a1e78206f34721770a5c96fc30af0"], 0x84, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x3, 0x800020000000b) r3 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x80) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000080)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000007c0)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000600)=0x6b) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000640)={{{@in=@broadcast, @in6=@ipv4={[], [], @multicast2}, 0x4e24, 0x72eb, 0x4e23, 0x3, 0x2, 0x0, 0x80, 0x7b, r4, r5}, {0x5624415b, 0x7, 0x2, 0xffffffff, 0xffffffffffffffff, 0xe6, 0x50, 0x7d}, {0x100000000, 0x4, 0x2, 0xfffffffffffffc01}, 0x1, 0x6e6bb6, 0x0, 0x0, 0x2}, {{@in=@loopback, 0x4d2, 0xff}, 0xa, @in=@dev={0xac, 0x14, 0x14, 0xd}, 0x3506, 0x0, 0x2, 0x1, 0x100, 0x8}}, 0xe8) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]}, 0x213) ioctl$DRM_IOCTL_AGP_ALLOC(r3, 0xc0206434, &(0x7f0000000000)={0x4dac4180, 0x0, 0x10003, 0xfffffffffffffffb}) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, &(0x7f0000000780)={0x1, r6}) 17:50:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xb62}, 0x28) 17:50:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x7, 0x0, &(0x7f0000000000)="015283e0627bcb", 0x0, 0xb62}, 0x28) 17:50:46 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x7, 0x0, &(0x7f0000000000)="015283e0627bcb", 0x0, 0xb62}, 0x28) 17:50:46 executing program 2: ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x500, 0x0, 0x1000000000054}, 0x98) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) 17:50:46 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x7, 0x0, &(0x7f0000000000)="015283e0627bcb", 0x0, 0xb62}, 0x28) 17:50:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79", 0x0, 0xb62}, 0x28) 17:50:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:46 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x7, 0x0, &(0x7f0000000000)="015283e0627bcb", 0x0, 0xb62}, 0x28) 17:50:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x7, 0x0, &(0x7f0000000000)="015283e0627bcb", 0x0, 0xb62}, 0x28) [ 322.011456] device bridge_slave_1 left promiscuous mode [ 322.017150] bridge0: port 2(bridge_slave_1) entered disabled state 17:50:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79", 0x0, 0xb62}, 0x28) [ 322.091371] device bridge_slave_0 left promiscuous mode [ 322.130969] bridge0: port 1(bridge_slave_0) entered disabled state 17:50:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x7, 0x0, &(0x7f0000000000)="015283e0627bcb", 0x0, 0xb62}, 0x28) 17:50:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79", 0x0, 0xb62}, 0x28) 17:50:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79", 0x0, 0xb62}, 0x28) 17:50:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79", 0x0, 0xb62}, 0x28) [ 322.463762] device hsr_slave_1 left promiscuous mode [ 322.524236] device hsr_slave_0 left promiscuous mode [ 322.583955] team0 (unregistering): Port device team_slave_1 removed [ 322.616801] team0 (unregistering): Port device team_slave_0 removed [ 322.648132] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 322.708407] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 322.808124] bond0 (unregistering): Released all slaves 17:50:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79", 0x0, 0xb62}, 0x28) 17:50:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79", 0x0, 0xb62}, 0x28) 17:50:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xd, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d", 0x0, 0xb62}, 0x28) 17:50:47 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79", 0x0, 0xb62}, 0x28) [ 325.340191] IPVS: ftp: loaded support on port[0] = 21 [ 325.675043] chnl_net:caif_netlink_parms(): no params data found [ 325.712298] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.718760] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.725965] device bridge_slave_0 entered promiscuous mode [ 325.732843] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.739228] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.746551] device bridge_slave_1 entered promiscuous mode [ 325.764030] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 325.773159] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 325.789636] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 325.796992] team0: Port device team_slave_0 added [ 325.802496] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 325.809591] team0: Port device team_slave_1 added [ 325.815142] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 325.822535] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 325.882477] device hsr_slave_0 entered promiscuous mode [ 325.920535] device hsr_slave_1 entered promiscuous mode [ 325.980640] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 325.987665] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 326.004722] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.011162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.017751] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.024176] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.054161] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 326.060650] 8021q: adding VLAN 0 to HW filter on device bond0 [ 326.068800] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 326.077889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 326.085388] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.092896] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.103740] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 326.109862] 8021q: adding VLAN 0 to HW filter on device team0 [ 326.118815] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 326.126563] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.132935] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.144288] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 326.152023] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.158368] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.173667] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 326.186299] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 326.193648] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 326.206288] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 326.216494] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 326.227025] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 326.234218] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 326.242003] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 326.249953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 326.265217] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 326.275796] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 326.661421] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:50:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79", 0x0, 0xb62}, 0x28) 17:50:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffffff, 0x2400) mq_timedreceive(r1, &(0x7f0000000100)=""/36, 0x24, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$getown(r0, 0x9) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x103000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000280)={0x7809600, 0x0, 0x10003, 0x4}) ioctl$DRM_IOCTL_AGP_BIND(r4, 0x40106436, &(0x7f00000002c0)={r5, 0x4ec}) ptrace$setsig(0x4203, r3, 0xfffffffffffffffa, &(0x7f0000000000)={0x15, 0xef, 0x2}) r6 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r6, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x20f) 17:50:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xd, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d", 0x0, 0xb62}, 0x28) 17:50:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x7, 0x0, &(0x7f0000000000)="015283e0627bcb", 0x0, 0xb62}, 0x28) 17:50:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xd, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d", 0x0, 0xb62}, 0x28) 17:50:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xd, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d", 0x0, 0xb62}, 0x28) 17:50:52 executing program 3: socket$inet_sctp(0x2, 0x1, 0x84) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) r3 = socket$inet(0x2, 0x3, 0x800000000000b) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x94, r4, 0x2, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x80, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_bridge\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lapb0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x1}, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x210) 17:50:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79", 0x0, 0xb62}, 0x28) 17:50:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xd, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d", 0x0, 0xb62}, 0x28) 17:50:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x7, 0x0, &(0x7f0000000000)="015283e0627bcb", 0x0, 0xb62}, 0x28) 17:50:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xd, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d", 0x0, 0xb62}, 0x28) 17:50:52 executing program 4: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x7, 0x0, &(0x7f0000000000)="015283e0627bcb", 0x0, 0xb62}, 0x28) 17:50:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0}, 0x28) 17:50:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x101400, 0x0) bind$can_raw(r1, &(0x7f0000000280), 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:50:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xd, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d", 0x0, 0xb62}, 0x28) 17:50:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0}, 0x28) 17:50:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0}, 0x28) 17:50:52 executing program 4: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0aba") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) r2 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0}, 0x28) 17:50:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xd, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d", 0x0, 0xb62}, 0x28) 17:50:52 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0}, 0x28) 17:50:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0}, 0x28) 17:50:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0}, 0x28) 17:50:52 executing program 4: mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:52 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x3, 0x800000000000b) r3 = open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x1) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f00000005c0)={0x2, &(0x7f0000000040)=[{}, {0x0}]}) ioctl$DRM_IOCTL_UNLOCK(r3, 0x4008642b, &(0x7f0000000280)={r4, 0x4}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000440)={0x0, 0xd2, "499f871c1d75bc4f349e2f885978d24a090827d71b2ab78ac8cb56bcb8a3db15e955487065a30c2e348aace0b725e2935c7961a3c9fda6a525e6bef46e57056864e965247516f295f57c4396989f0bbe5fd828b838f25619e69e452a021981d5ee57aa88be036f2bb1ea29314c9df5e2bf75afed1f2f6d43dba9763a13acfccf87a23166dc2f49058ac757290000d790e7e047928ba632090b42f0d02136fbb22aef2c1cfcbfc59cbe8adcef4a6b97a0078e5752568dc80fa778f0682820146356ced2bbb9e251f08b9553775416a639c47f"}, &(0x7f0000000540)=0xda) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000580)={r5, 0x1}, 0x8) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) socket(0x5, 0x3, 0x3) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) lremovexattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000380)=@known='system.advise\x00') 17:50:52 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xd, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d", 0x0, 0xb62}, 0x28) 17:50:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0}, 0x28) 17:50:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000700)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x0, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000280)=ANY=[]}, 0x78) 17:50:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xd, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d", 0x0, 0xb62}, 0x28) 17:50:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0}, 0x28) 17:50:53 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0}, 0x28) 17:50:53 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x80000, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x30f) 17:50:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0}, 0x28) 17:50:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xb, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79", 0x0, 0xb62}, 0x28) 17:50:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xd, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d", 0x0, 0xb62}, 0x28) 17:50:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0}, 0x28) 17:50:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xb62}, 0x28) 17:50:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xb62}, 0x28) 17:50:53 executing program 4: mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xb62}, 0x28) 17:50:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0}, 0x28) 17:50:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0xb62}, 0x28) 17:50:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb62}, 0x28) 17:50:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb62}, 0x28) 17:50:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) r2 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000000)=0x5, &(0x7f0000000040)=0x2) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vfio/vfio\x00', 0x42440, 0x0) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000400)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1d4, 0x181200) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0xffffffffffffffc0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000280)={r3, 0x3, 0x381000000000000, 0x3, 0x2, 0x1}, 0x14) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$KVM_GET_DEVICE_ATTR(r2, 0x4018aee2, &(0x7f0000000380)={0x0, 0x9, 0x12, &(0x7f00000002c0)=0x204000000000000}) socket$inet(0x2, 0x4000000000000a, 0x400) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000000000"]}, 0x208) 17:50:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb62}, 0x28) 17:50:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb62}, 0x28) 17:50:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x3, 0x800) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x200600, 0x0) ioctl$BLKRAGET(r2, 0x1263, &(0x7f0000000080)) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb62}, 0x28) 17:50:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:53 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 17:50:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:53 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8000, 0x80000) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e23, 0xff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}, {0xa, 0x4e22, 0x3, @loopback, 0x9}, 0x0, [0x0, 0x200, 0x4, 0x2d, 0x30, 0x5, 0x10000, 0x6]}, 0x5c) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 17:50:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 17:50:54 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 17:50:54 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:54 executing program 1 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="55d54cc236fbbb214922bdafa09e9dd93dc849392fb4f3e58bb8b3915347c0185abb3db552b55cbb64506db852c48013a31b5e61b89852a6e6d1489f3c08c93512801b9293f19f") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000003c0)={0x8, 0x0, 0x2, 0x40}) ioctl$DRM_IOCTL_AGP_BIND(r2, 0x40106436, &(0x7f0000000400)={r3, 0x8b}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000440)={{0xb7, @local, 0x4e21, 0x0, 'none\x00', 0x3, 0x7, 0x4e}, {@dev={0xac, 0x14, 0x14, 0x1e}, 0x4e21, 0x10000, 0xfff, 0x1, 0x3}}, 0x44) syz_open_dev$sndpcmc(&(0x7f00000004c0)='/dev/snd/pcmC#D#c\x00', 0x5, 0x100) 17:50:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:54 executing program 5 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:54 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000080)=0x5, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet(0x2, 0x3, 0x800000000000b) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x8000, 0x0) ioctl$TIOCGICOUNT(r4, 0x545d, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000005b86eacf3338dd32510000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000000000"]}, 0x211) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000040)={'ip_vti0\x00', @local}) 17:50:54 executing program 0 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 329.418872] FAULT_INJECTION: forcing a failure. [ 329.418872] name failslab, interval 1, probability 0, space 0, times 1 17:50:54 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x501e}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000140)) r2 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') preadv(r2, &(0x7f0000000480), 0x1000000000000237, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f00000000c0)=0x8, 0x4) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000080)) [ 329.516635] CPU: 0 PID: 10293 Comm: syz-executor.1 Not tainted 4.14.114 #4 [ 329.523705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.533145] Call Trace: [ 329.535919] dump_stack+0x138/0x19c [ 329.539687] should_fail.cold+0x10f/0x159 [ 329.543937] should_failslab+0xdb/0x130 [ 329.547964] __kmalloc+0x2f3/0x7a0 [ 329.551642] ? lock_downgrade+0x6e0/0x6e0 [ 329.551707] ? bpf_test_init.isra.0+0x7c/0xe0 [ 329.560499] bpf_test_init.isra.0+0x7c/0xe0 [ 329.564836] bpf_prog_test_run_skb+0xe5/0x9a0 [ 329.569452] ? __fget_light+0x172/0x1f0 [ 329.573444] ? bpf_test_init.isra.0+0xe0/0xe0 [ 329.578007] ? fput+0xd4/0x150 [ 329.578081] ? __bpf_prog_get+0x153/0x1a0 [ 329.585824] SyS_bpf+0x751/0x392c [ 329.585842] ? bpf_test_init.isra.0+0xe0/0xe0 [ 329.585853] ? bpf_prog_get+0x20/0x20 [ 329.585913] ? wait_for_completion+0x420/0x420 [ 329.585925] ? __sb_end_write+0xc1/0x100 [ 329.606380] ? fput+0xd4/0x150 [ 329.609588] ? SyS_write+0x10b/0x180 [ 329.613337] ? bpf_prog_get+0x20/0x20 [ 329.617209] do_syscall_64+0x1eb/0x630 [ 329.621110] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 329.626058] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 329.631253] RIP: 0033:0x458da9 [ 329.631260] RSP: 002b:00007fdb0ba30c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 329.631352] RAX: ffffffffffffffda RBX: 00007fdb0ba30c90 RCX: 0000000000458da9 [ 329.649510] RDX: 0000000000000028 RSI: 0000000020000140 RDI: 000000000000000a [ 329.656805] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 17:50:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) [ 329.664280] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdb0ba316d4 [ 329.672252] R13: 00000000004bf012 R14: 00000000004cff60 R15: 0000000000000005 [ 329.693419] FAULT_INJECTION: forcing a failure. [ 329.693419] name failslab, interval 1, probability 0, space 0, times 0 [ 329.715179] CPU: 1 PID: 10301 Comm: syz-executor.5 Not tainted 4.14.114 #4 [ 329.722716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.732070] Call Trace: [ 329.734671] dump_stack+0x138/0x19c [ 329.738311] should_fail.cold+0x10f/0x159 [ 329.742497] should_failslab+0xdb/0x130 [ 329.746473] __kmalloc+0x2f3/0x7a0 [ 329.750016] ? trace_hardirqs_on_caller+0x400/0x590 [ 329.755038] ? bpf_test_init.isra.0+0x7c/0xe0 [ 329.759535] bpf_test_init.isra.0+0x7c/0xe0 [ 329.763863] bpf_prog_test_run_skb+0xe5/0x9a0 [ 329.768363] ? bpf_test_init.isra.0+0xe0/0xe0 [ 329.772858] ? fput+0xd4/0x150 [ 329.776049] ? __bpf_prog_get+0x153/0x1a0 [ 329.780217] SyS_bpf+0x751/0x392c [ 329.783676] ? bpf_test_init.isra.0+0xe0/0xe0 [ 329.788170] ? bpf_prog_get+0x20/0x20 [ 329.791973] ? wait_for_completion+0x420/0x420 [ 329.796551] ? __sb_end_write+0xc1/0x100 [ 329.800613] ? fput+0xd4/0x150 [ 329.803803] ? SyS_write+0x10b/0x180 [ 329.807524] ? bpf_prog_get+0x20/0x20 [ 329.811333] do_syscall_64+0x1eb/0x630 [ 329.815220] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 329.820071] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 329.825260] RIP: 0033:0x458da9 [ 329.828446] RSP: 002b:00007fd18bb08c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 329.836152] RAX: ffffffffffffffda RBX: 00007fd18bb08c90 RCX: 0000000000458da9 [ 329.843425] RDX: 0000000000000028 RSI: 0000000020000140 RDI: 000000000000000a [ 329.850691] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 329.857955] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd18bb096d4 17:50:54 executing program 1 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:54 executing program 0: exit_group(0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 329.865235] R13: 00000000004bf012 R14: 00000000004cff60 R15: 0000000000000005 17:50:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept$nfc_llcp(r1, &(0x7f0000000040), &(0x7f0000000280)=0x60) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x400, &(0x7f00000013c0)="74a112669ae283d2a88a67223347d9b2b456218cd8937a8c2ba83e8de5d23f57bbf5abfdf80eb4533ab2005d5fff784a8c96afb00e96ec90db67ad45e0322881f906704ba9e4b39c7480d44d66232c4150e0215c040a3c7281b3103c1ab10d0e08") socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000380)=""/4096, &(0x7f00000002c0)=0x1000) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000001380)='ip6gre0\x00') setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:55 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0xffffffffffffffff, r0, 0x0, 0x1d, &(0x7f0000000200)='+^self\\ppp1\'*,-$-[{\xd8\']md5sum\x00'}, 0xfffffffffffffd79) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x0, 0x0) ptrace$peek(0x1, r1, &(0x7f0000000280)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000005c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000680)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x90100000}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x24, r4, 0x28, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x80000001}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20044000}, 0x80) syz_init_net_socket$rose(0xb, 0x5, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x400100, 0x0) bind$bt_l2cap(r5, &(0x7f00000002c0)={0x1f, 0x5, {0x0, 0x5, 0x9, 0x4, 0x28, 0x1f}, 0x3, 0x2}, 0xe) ioctl$TIOCLINUX6(r5, 0x541c, &(0x7f0000000100)={0x6, 0x101}) 17:50:55 executing program 2: r0 = socket(0x200000000010, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0x400}, {0x6}]}, 0x10) sendmsg$nl_netfilter(r0, &(0x7f0000000280)={0x0, 0x2, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000000005030100aa00000000002040000000"], 0x14}}, 0x0) 17:50:55 executing program 5 (fault-call:2 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 330.009444] FAULT_INJECTION: forcing a failure. [ 330.009444] name failslab, interval 1, probability 0, space 0, times 0 17:50:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x2, 0x800000000000c) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) [ 330.079800] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pig=10336 comm=syz-executor.2 17:50:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) [ 330.126811] FAULT_INJECTION: forcing a failure. [ 330.126811] name failslab, interval 1, probability 0, space 0, times 0 [ 330.152996] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1280 sclass=netlink_route_socket pig=10342 comm=syz-executor.2 [ 330.166092] CPU: 0 PID: 10326 Comm: syz-executor.1 Not tainted 4.14.114 #4 [ 330.173131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.182583] Call Trace: [ 330.185194] dump_stack+0x138/0x19c [ 330.188859] should_fail.cold+0x10f/0x159 [ 330.193027] should_failslab+0xdb/0x130 [ 330.197014] kmem_cache_alloc+0x47/0x780 [ 330.201177] ? __phys_addr+0x78/0xe0 [ 330.204902] ? kasan_unpoison_shadow+0x35/0x50 [ 330.209581] __build_skb+0x35/0x2e0 [ 330.213236] build_skb+0x1f/0x160 [ 330.216745] bpf_prog_test_run_skb+0x157/0x9a0 [ 330.221359] ? __fget_light+0x172/0x1f0 17:50:55 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) memfd_create(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x0) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f0000000000)={'veth0\x00', @ifru_data=0x0}) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x111000) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000100)={0x3, 0x1, @start={0x1}}) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000180)={0x3, 0x1, 0x2, 0x200, 0x2fa}) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000080)) [ 330.225360] ? bpf_test_init.isra.0+0xe0/0xe0 [ 330.229869] ? fput+0xd4/0x150 [ 330.233075] ? __bpf_prog_get+0x153/0x1a0 [ 330.237239] SyS_bpf+0x751/0x392c [ 330.240728] ? bpf_test_init.isra.0+0xe0/0xe0 [ 330.245246] ? bpf_prog_get+0x20/0x20 [ 330.249064] ? wait_for_completion+0x420/0x420 [ 330.253659] ? __sb_end_write+0xc1/0x100 [ 330.257770] ? fput+0xd4/0x150 [ 330.260983] ? SyS_write+0x10b/0x180 [ 330.264724] ? bpf_prog_get+0x20/0x20 [ 330.268648] do_syscall_64+0x1eb/0x630 [ 330.272546] ? trace_hardirqs_off_thunk+0x1a/0x1c 17:50:55 executing program 2: socket$inet6_sctp(0xa, 0x80000000000001, 0x84) r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000040)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, 0x0, 0xffffffffffffffff) [ 330.277415] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 330.282610] RIP: 0033:0x458da9 [ 330.285795] RSP: 002b:00007fdb0ba30c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 330.285807] RAX: ffffffffffffffda RBX: 00007fdb0ba30c90 RCX: 0000000000458da9 [ 330.285813] RDX: 0000000000000028 RSI: 0000000020000140 RDI: 000000000000000a [ 330.285819] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 330.285825] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdb0ba316d4 [ 330.285834] R13: 00000000004bf012 R14: 00000000004cff60 R15: 0000000000000005 [ 330.379059] CPU: 1 PID: 10337 Comm: syz-executor.5 Not tainted 4.14.114 #4 [ 330.386135] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.395518] Call Trace: [ 330.398126] dump_stack+0x138/0x19c [ 330.401772] should_fail.cold+0x10f/0x159 [ 330.405943] should_failslab+0xdb/0x130 [ 330.409941] kmem_cache_alloc+0x47/0x780 [ 330.414104] ? _copy_from_user+0x43/0x110 [ 330.418267] ? __phys_addr+0x78/0xe0 [ 330.421992] ? kasan_unpoison_shadow+0x35/0x50 [ 330.426582] __build_skb+0x35/0x2e0 [ 330.426597] build_skb+0x1f/0x160 [ 330.426612] bpf_prog_test_run_skb+0x157/0x9a0 [ 330.426627] ? __fget_light+0x172/0x1f0 [ 330.438282] ? bpf_test_init.isra.0+0xe0/0xe0 [ 330.438295] ? fput+0xd4/0x150 [ 330.438308] ? __bpf_prog_get+0x153/0x1a0 [ 330.438333] SyS_bpf+0x751/0x392c [ 330.438351] ? bpf_test_init.isra.0+0xe0/0xe0 [ 330.446819] ? bpf_prog_get+0x20/0x20 [ 330.446840] ? wait_for_completion+0x420/0x420 [ 330.446851] ? __sb_end_write+0xc1/0x100 [ 330.446866] ? fput+0xd4/0x150 [ 330.446877] ? SyS_write+0x10b/0x180 [ 330.446893] ? bpf_prog_get+0x20/0x20 [ 330.446908] do_syscall_64+0x1eb/0x630 [ 330.446917] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 330.446934] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 330.446948] RIP: 0033:0x458da9 [ 330.502934] RSP: 002b:00007fd18bb08c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 330.510657] RAX: ffffffffffffffda RBX: 00007fd18bb08c90 RCX: 0000000000458da9 [ 330.517934] RDX: 0000000000000028 RSI: 0000000020000140 RDI: 000000000000000a 17:50:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r1, &(0x7f0000000040)="fd3df85f7848182f7aff5d5c77efd580889c79543b5b570b96feeb41178f5a044c2f99fb746827d6e418888ae6d0861b2440bd50942ce486"}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) mq_unlink(&(0x7f0000000280)='\x00') 17:50:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="85001000290000009c000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x80000001, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000100)) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f00000002c0)={0x0, 0x9c, 0x4, {0x9, @raw_data="c6a0d1e039c2890ffcd320a7b6cd30f34c1e3be8047887ecd0c1f305a0ea8faeff12ac094cff1a0bd91be9c8724385957f236c2d8738cd35449bc90b51ab5967ce40c637ae1475c04d704deec032600fb7732176e036dc0b69dc87c9d67f20ecf6e9cf02cb06364037bc1e7463fd97f811249c7619be6bf7a613d9c15ea189785e97538ed116eb70efa9e6969c7faa00173789721f7095e992da4d805d7d95f972b7a17348d4b367a08bdd58df89aebec8415d78c9f8824e31956bba145166487a64441d418ca357"}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="012afbe0627bb5630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:55 executing program 1 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x1) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0xea) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) r2 = syz_open_pts(r0, 0x0) r3 = dup3(r2, r0, 0x80000) ppoll(&(0x7f0000000540)=[{r3}], 0x1, 0x0, 0x0, 0x0) [ 330.525216] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 330.532489] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd18bb096d4 [ 330.532500] R13: 00000000004bf012 R14: 00000000004cff60 R15: 0000000000000005 17:50:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x4e23, @loopback}, {0x6, @broadcast}, 0x4, {0x2, 0x4e24, @local}, 'lo\x00'}) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000000000"]}, 0x208) 17:50:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x0, 0x0, &(0x7f0000000000)="015283e0627bcb63040000001d4d", 0x0, 0xb62}, 0x28) 17:50:55 executing program 5 (fault-call:2 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000100)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000240)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0xffffffffffffffff, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x0, 0x5}, 0x5, 0x10, &(0x7f0000000000), 0x10}, 0xffffffffffffff4c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:55 executing program 2: setuid(0xee01) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000140)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYRES16=r0], 0x3, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000000)=@caif=@rfm, &(0x7f0000000080)=0x80) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f00000000c0)=0xa657, 0x4) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f0000000180)) 17:50:55 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCSIG(r1, 0x40045436, 0x17) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:55 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff010000000300000000000000e9ff7961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d00000000000000000008000000000000000000000000000000001800000000000000000000000000020000000000006c6f6700000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e00"/387]}, 0x1fb) 17:50:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="85001000290000009c000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r1 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x80000001, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$BLKROGET(r2, 0x125e, &(0x7f0000000100)) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f00000002c0)={0x0, 0x9c, 0x4, {0x9, @raw_data="c6a0d1e039c2890ffcd320a7b6cd30f34c1e3be8047887ecd0c1f305a0ea8faeff12ac094cff1a0bd91be9c8724385957f236c2d8738cd35449bc90b51ab5967ce40c637ae1475c04d704deec032600fb7732176e036dc0b69dc87c9d67f20ecf6e9cf02cb06364037bc1e7463fd97f811249c7619be6bf7a613d9c15ea189785e97538ed116eb70efa9e6969c7faa00173789721f7095e992da4d805d7d95f972b7a17348d4b367a08bdd58df89aebec8415d78c9f8824e31956bba145166487a64441d418ca357"}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="012afbe0627bb5630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:55 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x28000, 0x0) r3 = fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001600)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000001700)=0xe8) r5 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001740)={0x0}, &(0x7f0000001780)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000018c0)=0xe8) r8 = getegid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002000)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002040)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000002140)=0xe8) r11 = getgid() r12 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003680)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000003780)=0xe8) getresgid(&(0x7f00000037c0), &(0x7f0000003800)=0x0, &(0x7f0000003840)) r15 = gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003880)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000003980)=0xe8) r17 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000039c0)={0x0}, &(0x7f0000003a00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003a40)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000003b40)=0xe8) lstat(&(0x7f0000003b80)='./file0\x00', &(0x7f0000003bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r21 = getpid() fstat(r1, &(0x7f0000004ec0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000004f40), &(0x7f0000004f80), &(0x7f0000004fc0)=0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000007880)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000078c0)={{{@in=@local, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}}}, &(0x7f00000079c0)=0xe8) fstat(r0, &(0x7f0000007a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r2, &(0x7f00000081c0)=[{&(0x7f0000000200)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000280)="f37e8023d337e16eae9da9c6247609ed88f574f3e4bc5ceeb7d659b44a1bd517623a62758973e33bb75331529787741d3bb4bc16f28c44d1698841e05822e2f298a92221cafef3ace915818e1dec5467aba0c7b94b7f837cb6bf9aa8c149663549b84ab6450ef6d1a21a7524b0052ce8ccc0d6c85ab582e41c102cb1c744f1eb54b017d719c07253bd9c1989ccb6f5a17416d5c2a0644aba046247401ae6623e29cc", 0xa2}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="dc01c01212804f7be0ae71406a1b4be9c3e34e5c1a770c053f06ea3fe8aadfe2352f3f7f448f468e36fc2a7176d8ba33a0dbf341164f45d4aad1a8de13e177c30b366f3d76174e868e5383549cc71e3a766da68440fe19beead8c795", 0x5c}, {&(0x7f0000001540)="133b3acc32e16001ec91b2e8a2cbb674a7d8c6324f7501cf464739740cf193e2785ef1ed85dd9695b5948d41c2b8cf18fdb2e91f22c8f562a512e5d229242a27db12f34bd0bef8dc5020947af6c7abb32904b25ae956f352fe53f703f5eab30a20fefdadc79207deaf7e8862eebcbfa4cb66fa655496c71c5106eaab82e0e909a6c9632fe21a8e7c76f5d0b15cf3a97d97b689efe5781f4b2a4bb072e8e573fe6e7b63e0dad6450b10cc585c54", 0xad}], 0x4, &(0x7f0000001900)=[@rights={0x20, 0x1, 0x1, [r0, r0, r1, r0]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x38, 0x1, 0x1, [r1, r0, r0, r1, r1, r1, r1, r1, r0]}, @rights={0x38, 0x1, 0x1, [r0, r1, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}], 0xd0, 0x4000}, {&(0x7f0000001a00)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001f80)=[{&(0x7f0000001a80)="49ee601baa962cfdbf9df031bad04872e8cf8c93b3a6b9e99b8d3dd55d6bc9d4b21c46307f6609d751d7cbcdc6b2c1f49fe398a6e0bbbc269bfbb03afd2421f76a4baa561c76e8b63f1a49207f66c7cf842558c5e4a659d44dfcca787dd0e6fcc2a5d07e33ce09023663e7987f1a74c60a7a438a492d194d89c2daaad26549aa6810ec619f2842c978f9e27646a0e9490123bc933efcbd05c76e0fbb9d15c136eeb6bb49961bc301b8b35ccc43f712ce5715b2ef4e1f63605c7d162b3a", 0xbd}, {&(0x7f0000001b40)="ada3ceb23d009d7b644856f1732d2a305198c47fa139325643393a627fd9706c11e0b88c682fa743bed4204b4d0d5b4df9bbc80c78e588e70711e1b5416255e03b41dac9223b10a23d8d6ad98fdc0803fe47081f06", 0x55}, {&(0x7f0000001bc0)="d74c4b036cf49c7b5448d17924658e5cb45201e4ae249d1849b4eb8d77b8db16c8e4ba432bb79f46d135794e3a6efc7edf6a14adede64343c05fad5068024811da6a41243373b1988d7d02a9e57920509bf9b0f47c302bcf53b6f7ced12bd2ffece96d08967dc73b591158f308d19008094866a610cccb9d41302c3e688ad3c4aa6102883fa9d0cc648fa033890ead1af871eba7712604a6ae0e02e594478eabe62cb2cb48a7d8eda49d21c3bca67cb7e1ac22d78f73a3d9f0ac59dbc63c30be6a", 0xc1}, {&(0x7f0000001cc0)="6cc7701875dfdb3f1ae4a9f06c746abc32e4556224337f26c4ea9f610a5425d4463bd10acecafebb7fee33bbe0d66fcf4484fd785f739e2cf45e353dad453db5b5631329bb77a93b671ddced1b5795f43559c1edee527a04f6f6ae8bc2cdfe334cb907089b8282fe6c81ad0a7fba1ae52ace7dcad214c961da880fc2cb7e83830f6ca48c32217b57e7940008afcb9bfcf57be699671a10b54f9f62bbddd8cf0e5f4504ddeb9ae67734db0224d6b7b633ba5871671ff1b738aec4f72b04b98364cb31c435e8eb8649b450", 0xca}, {&(0x7f0000001dc0)="f38281ee077855f1bc5585d9e2e3fb16c3e969785823c74b7f8c36b49e49c40ecec431e5bc6ee267e8286af1d6f4057abc57f43dd81e0be9dd0ef9030906a9b84d7f486b5611713b3272193bd7e9715f7c2f07d1f31b4319df7c154188ec5715672169cc580a292081b94cdae24e8f38f701aabe94d9aa1b2d26db2c92d99a860437b0e2df9465c27ff64a749a741f2655b914cda5c6d2cda6dee3339e396c60e2184c41a80700c3648efbe3f568b51b606f5c4880aeb80cadddeb9deb2b4c4f3657125f1870a2d43a4181da4556d854facf08f192f73ae23893351bddfc17", 0xdf}, {&(0x7f0000001ec0)="7d32fc5e4e92d7275e2f0ff1cb0891fbe2ea5a9e439c983ff2a7ab43d6961867704a0e758595963cef4bfc621b7d2118b5f59f9f05d2f3653bfef9327ef4c7b86699a328767d434e5e61879d35ad7cd65baeadf8c7f4bfdb303b82defe4ee16267c008765f3c161b7683d7ceb00bbad5bff23c227500dc65fb28e9f2e2e34b23a12dd59aca511cc5115dcf33d383c7326910a445aec6424575f3579a303c5ace901d626eca577509ed185d5144a289cea47752f709449dbe102e1e8ae0", 0xbd}], 0x6, &(0x7f0000002180)=[@rights={0x20, 0x1, 0x1, [r1, r0, r0]}, @cred={0x20, 0x1, 0x2, r9, r10, r11}], 0x40}, {&(0x7f00000021c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000003600)=[{&(0x7f0000002240)="b27fe58d5d3c8a2bc969bfe40c110a373905fad015d594dfdc1a7085237726b06824715866fa1a7bb66d0e541a9b77ddee9ba7a611ee23834b0411e6191d0d31db390620e3a9b4da61b50f56c4d517ac9e81141064ba823a64ab74ed63af90b32015", 0x62}, {&(0x7f00000022c0)="f889f433ade2b8d1452d99853e5e4bc25fd0c6c4eaaea48d3cc4c66b92133255613ede0be409a5cdb49bf9519de549de5279afa69442a148f918267e87ac97eead364ce75d14ec934f0c683b6d58a8656e0cf61e06099121d23afa89c4333bb7b6fae8178fea5dc497e3df146722c981630f2bba2a14abe2ef84b7913bd357840efaf139a7e9408c35ef48baf0133b53860664236dafdcc93ecdec0ad803ab10c7ea4213d758c7e9febdaa28", 0xac}, {&(0x7f0000002380)="6b4170296536c9a2fd5853b23e3ac95e5f11b989489136d1f57fbfa65e20301e35529805a602bd44ac2cfb8f4e9070e2e892c968da24590cb6220e9f28161b3fb418c492d678c2ee134107140aec13eb37c3ea922b30b305e9469aeb5164b1b1f99e9f34380944fb1f428f3c0f0ad4f587b2abcc28df67cfbc4331646571650797905f381089d9d05d334e3f", 0x8c}, {&(0x7f0000002440)="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", 0x1000}, {&(0x7f0000003440)="c48be228c3bd061fd0104cbb4a1fca084ab3b2ba5c4c6552ad692fc0a9f4d6f6caea62c7f7a4dd6c94b2c872a01c4ac5b3969b3f2f700b277a091b0498b34c02c4e7a40254ecc2a49ba277cae0432666fc81c2ec8d773b14c42ba279c6a3f7de52014b08ed5ecccb567252e4b20a14468d7a925d51f96409fcb05e5c76", 0x7d}, {&(0x7f00000034c0)="0bc871557c766efba493902a9f185acf34dfc0be195a9cc845c23bf72de546d42dd44eecb9369caa70a40a8a73b9d5ca0685add00d8910a081aec2f36ee084364cc6ae8408c9b50c0f7bff149d222e54247af223917482b831bf715d50590e9f8f65049995311d6b7c8f78b447c3fe2478f9c6d30b21ac1c2480c0b80906847fd246ca854d3e8ef7d8afa83987258f287aae6c3456a6c9a6779cb50acc6bbd286a05e6853778662f9a6140e4e7f48b678958442d7dd7290f119bdf85027f6f8c79bbb24c121cc585", 0xc8}, {&(0x7f00000035c0)}], 0x7, &(0x7f0000003c40)=[@cred={0x20, 0x1, 0x2, r12, r13, r14}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @rights={0x20, 0x1, 0x1, [r1, r1, r1, r0]}, @rights={0x20, 0x1, 0x1, [r1, r1, r0, r1]}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x28, 0x1, 0x1, [r1, r1, r0, r0, r0, r0]}, @rights={0x10}, @rights={0x20, 0x1, 0x1, [r0, r1, r1]}], 0xf8}, {&(0x7f0000003d40)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000004e80)=[{&(0x7f0000003dc0)="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", 0x1000}, {&(0x7f0000004dc0)="fc8fc193181d81b7ede84b49f276388a102c15d9d61214ef48b0c367245f16e584c24529ec46c6143e3e4ca7b290c089ff41bf4f5e70cb6cdde4bb7497f6824631a8bd9a8e6181b2457b1c0b95fa096c899be32973ff506663de863ea9d96b59940b89ea766d0df19a8ac2f9ede1d91a0445169a79e0d15d648c2955f64d93f900020d45767329f153af08d7389bb01d12311d66423c6a0e799349c937aadc4ce2f0dcf16a4ce8244481f548b2a8b14622b9e95f99d2266f92ea", 0xba}], 0x2, &(0x7f0000005000)=[@rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r1, r1, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r1, r0, r0, r1]}, @cred={0x20, 0x1, 0x2, r21, r22, r23}], 0x78, 0x20040010}, {&(0x7f0000005080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000007600)=[{&(0x7f0000005100)="bb5d1c62fe5655c9d9d8c8a0b18fff0ee5a3c57542d7a4db04e7c5656865208012872747308031450701674b8f4deb709aeede0959ef2b96f2f5feb0cd3c201906df71c0b699478151e8a1d877738ab64019dfe31842c4cdd6ac8a87b12411427d01156f4ba141c7b2a40062890c1dd093612865d951ee0c7056d6a18517d6a94df43ef8bf75a9b5c30fb672ab4e99f8ea09fc519ca295225ae37cc30d0389fd2cd692bd8cc6e2eda07e3edc01ce3cd3", 0xb0}, {&(0x7f00000051c0)="3b2ebb5b47bcb5ba685e1e3e0792e00b176e1b1249d8f6102e6e82a0dc209d30c3f8978722fd40bb27d907d155e2e83045a4739cbcaf8d8c7fdd6cecf20d6e8f63760fb08dd3d8bf816f3d566862194b6f7bd6c4e520d31c2f9af5829b00042ad3601f5d60c3be3e1d5290043caf3050745e40373a66832634f7d6a953be65740b66bf4060097f05687e12d38c1f19b559a76ba4f57199777af05dea9c2cc0db018149b2640309d68a24c06500efca2a0bf9f219d6e1c6f43b4a194970586386d7b4748d878dc6e23eaf30bfae911d616a2528b05fd8dc34ba5df9aecc2b9326e6b659030b367554318fb7e3930257929835c5159572c0475b494cac6369856a9e47763d4ffa9119c89efabc1dad3ba4fa51c9353b1819194692b3158c9a8ce00d25b3928572ca4abf3646bb3b8d3eb061e15edac38d0bb94e70a33f7b322ecb212196dee9a4d3d10e75261f95a35491494dd6a882b4426baaf4930de286c637632131cf525438e3706782adf67c6ce2b3641f6ed6aa87b99ac776038a8969918dc453e14891ef8d41165d0570579208dfa133dab19e4d27711fbaf4d6a0e1b529ff8b09216385ed3096a10da5f94922da57d7138b3dcca9881a23ce4ba4b5406ce39dcd1ebea72b5da16a995cf880aab758e6b99589f412728b9aa1599c6f26bb5950bfa254d68c01f67d12b4ab9d53dd80fddb54f4d74ecba51a6e23ade13baadbf992ec41fc47f8805b8e2a647ef5b53f893eeff3faf3a3d4bccb507fd5a17d4c3fd5a592eebb9f5d685d6281d885a082cf685695283cf60ecf3ea54489904c03768034a70acec752faa16b51c4ec57e703837e68e3afd3dcb2fa3f35588fc004a81d64386eabcac8339aa0c291dea57e337aa849656752f3085ecd94ac2fdb4bec426c1665ae93a298cbe573baae3601610f90d51d6f6bad024f13dfe7f67fee52c1ae8a5dce97af762257efec503100c37029f57fb58726193c0eaa241c83f9b438d6497ce9fb191e607d7cf4299ead1ad833a1e5db22334abe58c16d8c10769846c3158f5d90855f27c07352c9cd27fe45303ccb517d5fe01a3f75879ed5273262de5dca62728b0b1a5deed7ed349df5d074b236379212c9cbe78deb56aa2acd11cbb6d639a3d3946a5d6de140c6a6fc9ead81c6a818990c3588f5a7be3bfa85da9fcbe95accadf16341fcd622c612190cf3f5ee651813fe5d0af0bc6334ce24537d0f81ab4ecd99cfa77ad953e1893ae3367e52b53e7dddbf352da39f035811b9ed7293259e98ae43eb0c440e103926afcf78d0b41e36e214fe143edbd0ccdf4ab464a62ce592cd98f3677030435697d575f1f507c32abc58a91d264f7263d016c562d9f01d0ad310b97a8dd881a2688be25d0317b1711ca9e9e60e81edf18e6369232f26f18039bb16ebca4c2d445149e5103c007c4b7935c8a1287bc8593020a9b629fce81f6d8614889861f5ad3abd9faa06537c965957bf122e43d0d26a138e1cdd93d8fdac25c46738a3ae90e4639ac0c848c53d74ed07cc939c9a16659ff2840ec89e96acc0e12549853f39d6d9ce771ab4ffe61b1510223881fec0a5054ef03de7e573a129c289e672a3bd0c1347780325800a99e94e7d1b569f205fdf752439f112a7da40400db24421d2c1674e15af89336ed75388759c911287ba5b56d947980619d84d65c30196c2d44f5db397137909978c0ccd4cf73135eb73fb0de49cbfd0f6c55d1b3bfbcbcea5dd795f2bca2ce32568a1a465a968236de4d4a2480b97ba493d021da49545824f001e3887939bd3f4d04c9bfde2493b8005ffd342dfd4aff26ed025b5f25a7c8cc95a15296bb122025c7b3039a51b5baae510071c94026c9bf6d7d3b33bccf1ebaa9eb473f800c723bb04e631f3491946d7a778291d58ce24653560599661c3995c96dbbed68c277fb0eb3668c41eac719bb43799d98c400a017903e80f6c1ef39019b78528cff9ae3f88b6addf909c71ced8c91db1a6f81475f6562fbde1fc9bbf0c613ccd528a1edc6335e8cced3fa7ad6133376f7c3725d118505f9862a32b93ad50453e5fab0576e23e22263564e727cd6d35426247a2673387a79fd8ba6fcfa97a5f99db3daeb6fa8abfdaff24e05fcbebf25068c4926954ade973baa2491db34d73fd2ace9c5d3c175c7f66116299b482dfb4792da08dc4b40b2e259fd3557bf0c94aa2fe6c4b17ee4b0464bd4da28fbdef1a88bbf61215f5be1127bec435c86e0b3345748945e0bde23529be7f4e14c1e39aea8000dfd1f0b07d218d6a90bcb8b42a9aa3485a2ed689d55ebaf4b9064d04bbbeac9405c574cecab9cbe62f3b5f3eec56239961c08b312ce03e89061f36951900cda5d403f0ee518d2081d46998926677e46d017cc3eacc58f8623ab29170046ce836dfbd897e6d0c2715817bd84dec6f62533ae23b88e196224830e19d8d2c24d34d2e386c2494c9f370fa6e45715ac26ce18bb5b0a2fe3ef9194f44ceb451ac8217eef6083c04fcd2e647ade09b7c83d69ce6f1ca4a7a85415ca4748d940b0443a6eac3ff18f2423a61c04c4b9659bd10b9ad5a10ab3d641113cf635f8d881b98c4c96753ea17d3099bc701ba871bfead2497b77a9f263595a299d7117aa2ed8fb18b62845327b879be9e879c557f6ede514d7acfd2fab9a2936963ff9789da8d11197fe3c8e352eb844fcf30b9b6dec0080f36fe1ae92663b1f73658f34059f21a703574c7fe1dcbe927ba932e95e02488aaba34e4376ad4f7284c93b6ea349c4aa262d5594b8ff255f9167067fc2ceb992215264d9d197dc2cab815b1da2c7964cd3eca4af5ff89b362e766c65d25d312d6e5e64bb5313ac248c48cf71752d7e2d7e1e56e84fadab826b0819b06dbcb5e7b23dfd52a43a37f477ae55017b4a9a7b4375062ad1eb0d40af5b9cbf3b60aba8829e5254e5629622f2d818ef8a15f78ed3402af84f7d4e0bd49c3f968c5c94ebe54262de93bb36966b3f40aefdf90177945a0ee59c97eb356e64a0ea5708aeceea3be04b9391a1273216750ceac0f6c150186fef89a8df70e5a2c49398747d82907cbe82da09f8e130cbe4a4171d4d21d05f40f42a7ea997966428b39b4e237fb2e17a9f1bc9d1afee89e2d1815e1035a9b6bb206c5d564b4e001bd518e7cf67879ebabb80584ab5c461a2c26a8c1f15e97e3f0066800acfe29f60108fec6db255870f62a348890d3987c7fc62acba716c6d437d8d5b20e2be156f36ffcc0d95e9bcbb1c77d5d156ab7208507ef12ab1c04a24ce1515824fb1fc8d2bf7a08e38aefc032f9d067e1b6a883e5efc70338f3f44d7aee41c724d1759edb516583ea2d9dd700ed7d1023258bfd14a5ebddb745c7902b2abb22fb16474e718ec67c760843901b749a252327e37a5613e81674b0edbbb046f49bda5fbfb8c10ddf65bcc625adc3630aad5c5a6ee7b564d24c10407cf2e2bc363c6690ce94da48ef966c8998a41b44d84a83718ae0e579c8666e9a7f823f616a7b3ba29a3e1d9bf7662e7d2a6d656ca8583fc8b3778a98dea095765c42cffda38ad37b8cffd10ae6b1d1275cb2cd166a19f8e3561d365afa18361099206e13f61db04b67c61260ebb376614aab0ba2accddb5bbe9841280b46623b34f41740b9d3572bdb1f1db1f28934c042513f665f1422dd10d1a2fe39dfd522543ab5318384c9c91d6ee10bc3d9da1ed94002ab29030fe85e6db62e28475acc120c5cfac73637d4a62704f0704a58db249dbb6ecd3b6975fc986525376e30ae59a53d39246f2f18e1af6e0c1da29f9d951209076f57ca08e14db0636c5753f1c8d431ba37eb6ba51d674f7a2e210b6467aadc1e709fa21985d984b9d8060fb22a86fee4c38ba06abc99855504b5541159843b787c7def5d09ea0ccaab637b3004296600f9a06799f5fdb112dfb7c99d41446f6f9d329de03ad64142deb9ced61c6cf5740103935e25e256eb3d3213652843122bb0101b98ea95df2841ef0e11cdfdb2d0781181bc5c7ce9cfa502bfdc26e0ac1dc4652f9d460845c672e3e7cca43257a8670b134cd312d9a0c414042e924a65eaba135762469d350bd76af0a1f21119d85d372ff13f51dcb3ee01a6f598c3d3da58dca0eef52c2ef4021b665c7d717e0dc6f236893ece57e02e1bf8206e8b9e0ea00626d89cc69f3510569694eb0f014bce93293fa7bd9e16e65784f0c9c8c1afcb5b11f6a3310d3b58e566d2f592d498406bb6e968f6674a364f0f524245fa990ae6b384e412ac6e6c786541cd0aca301356ddae15cbf8eb30672aa1ddc78c70ae55fad580aa62835ef0f7468f2300a6ac03c26c75141e31d84b43677b38b0cdbe84751e3f0a5c1f51abcc93e767a47da7ecb2b6d60831d68e6f6d397f326a5b29b7d93534e714c7703b781b1ef6dd50a798e0bb9d17122b77440b447e7249c2c25fef69690a6dd4b9fb259e4e015e5b076a5ebe2958fd20bf4dcb3a4cfeb4c6a63992ee898079e7f9513ddbeaaf048dadaf077c0d12de217d37dca8adbdd8dd21e9cf465ae1cd91bf033d4c5b24bd21926acf44467dd2620fea7470d5eebb2b4fde7c88ac5eecc75e412397fd26c389e5022fb71ea8227e85b0c08b6fb000a2d3a9e1b381ce1c9fb867fd68f7807e1f083aff9434531eca110c16fb54d6113a88de5fbffcc52e65438359f3750f81c35b19fb183dd02590a46a545ef06b4270464e1d4745f9cef737e8fd6ded791d74595fef31b8c46060d4a5bd261723e021fa9649bca1e3d2dc3a0a9f7162e53263fb9051cf33e5f9f47e3ad8ba5f8e657a8245791a91df59f1e5461a27b073e64ac656bd154cc0f5aa07cc614de1612d0f6c2303485309803e0fcd5f9838ffcf2cd728f5ef6b72501fe9b92d64bb97ccc9f2dd4d4d8553d95105650381db05663fe93435a258348292a6c431d097c10e7734e9cd15e17b88a9ccff8b6681eec719627fcfbbd98811dac90437bb5ad0001c6586f124e44c9c249aeb0d3efceebdc79409331f81d9ae4abbb0876cf4968e1f262f129b5bd3892f20a7a1020b5622e0ceb11d067c9bdc14bcc77422bc36be4d1e6c109e4a4b0b7d760b3c4af0c50382dcfd38863dad430446473a40b3e812275a0ce4d4436533cdd939e78a30e253f478d8445e8799cf024364ab7d38ee55e1b9f566d279956858e4758068de6034127e45b1ee2fb010323d29ad96606141a5cf3b74fc1fa8df4755d46048b586ded4fb1fdada5084df0fae7c06decba25af8e4b15d29d6803ac05a62d44c5a98e87361d398eb64977e519510aa82f324c8299ed89e9fadc5093b8ecb6280d2f51c16e293a8f76edf9c48f7983ad86436b46d52f56d583c53700b2c06e0216b5f5eaecc6d03ff37c26e1a5b7794bbfcd5ccdfb0634f8d004f6b6e4ef9fce390b1b7208af57358192d36981a941777f0c68172be4b39ca6469623a55df5f714880bfa34f4e242e466cc9902e3796acfbf067d72cbdb0ba545a4dfb6b44b032c032081b625aa11827622f44daf0343c60411ddbd2d7974124b5fe12869d57218cbab2b1fab40ea3a39f260dc239d371d420d17b609c8cf7e7fda7481a3a979b0f7dd59a05be6c2dc18009b4ed12fa786c95a8d96a44db7bbd23611a1a4eed69c3fe0655883580900ecf74b8fa321c34dac0136bb9daed2acabe896497b0385bf5da6f8e7f5cedea60a36f1008ef1944e2ff04893ae5dcfc00ee1dab16573173d833638c9547e5d8cb8c725ac45a6a9bb93728508b19ba8852101373805ff86fc16314b614e606a8c283e1113280ca94a49e29ec0a", 0x1000}, {&(0x7f00000061c0)="d4a2d70298a6fb9965b7dfe4f18e06135376442b3f8c9bba42499c252a4172087be390647c3b75939bb9b8fbe05fdd329403a508acf3b0a4c84e512e4b74f6fcebb0924fec7cf23f928321ec8df0de14dc00cabbda", 0x55}, {&(0x7f0000006240)="584b07d11e0a5358eeae1c9c18ff83c336d8a2", 0x13}, {&(0x7f0000006280)="22caa42a01ed8f557a4a8422a430a7e992b092f54ee2edd59c2a5abf8a20b1afa363158c25a47ec6cb265719dfbf4bef07f9267728582e7a9bfb950fd291b06ac81cdadbf1c68d454698bc377f3ec9f4580d923febc5e46838cecbc0d300a814bf2d81dffdcc281d35fc15322c473df270bb58054cccbd98a6c434a1ab892324041f1fd161a9842ae1ec94898cb28fb285b46dcbbe6fdd9501", 0x99}, {&(0x7f0000006340)="b50b80b24e7a3470eacf9ad27f5fd01a2531da5ee64367c48170321fae0619a0f868922d40aacbe9feecdb10f672686898685f30edde81ff71f302a9d64056806edb24becd0f2a2149ace404f3e30514f5e037c7bb437d3f3b209a396b089318ef571f43399ac5b83f4ad3afac7fb49eafcf6b28537725f1266c3140873b7c8c3e068b4901ba13c23a29d22211fd6b789b5cf849f0c718149fab41d6e758e00acbda745992ab994d85ea9102ec6f1b668a322d3d61b01a81230c0024e1561692d2", 0xc1}, {&(0x7f0000006440)="211a8e9bf4d8d8dee0a464739a3e4584907d50e2f9181a1686f9fb1c87b57dbd837f8bccbe47ffd9cd8084470c6464114fcfdea835f959bd85d7c603170c0e7c9ce657dddbc65ff6d9e39b8e4aeff15caf4e68511c0026cc45579333a6ba79bf37b2cfda1e45ca9cbb673e41f083824db592badf5d7e4bd47fb7d67c1ead4f65d8af616311a373cc3d7adf7f6d78333013a2b10124e153df9d599ae5f8e66e3eda0eb9c16b7bad36f3ae52303d1998924cb47d561cbc86494248386c9a8f2e485be77acafad25fe1e44f89cebb897b8145ec6ba51126a5c461a3818d64294dd65dcdc8e3cf79a601ea3fa3e7dbeae4c7b2815ab5ea9dea15c62247be1402cc500806db1b6fb3617b6f6578bac2796d90e7b40fdd7ee1ad75083b64ee944ceee8e7a50a768778dee53dde13dbdcd3a485b7aaf7b325edc19bd5628f57d8bdcf2d2e29aacf6fc33f9f56420e4642e100678a2f2542a3c02f97c5a5a46f8ef304b089312e661d451e5cc95b89bf7ae4adea7a8fb81ca7dbde7061ef09e9cb14a8866dd5641c88e1a92dc11340622fad5fd519467a1fd2ee387468c63c948bed2b81aa47129bd0bfb4d23f6d73c017d245558142d23a329d9a5b3c0c4e4a99d047d93c179d7c42f8cc7cbcabb0d1d5f9c01b27dce7ecbdfc7c35223bcff8a9df484990700eb452f62a99a767b8766e9cf00819db0c04036ab3120a7d57923ffb2d1d62773a9900be4c96947ac1f78e802b1fc72df80187a0f3e8b6ebf2b7c14dc36f4afa764a065003be7374b4004b8c95dfb000baa921c94ec53d1de9dfb5502c373050f87c9eb7efae0af1c9198906fa31dd48abcedc6fe820f56cd5e0cb4018228219cb191b7b9e103c29193eaed478942eda13287e385ca556c4771175f7a13169065c7663a7b5abf1e637164e2f25f7564b7e9915e19f2f048717586e3e2afcbb712456e632e51257045587837c4adbd012992f9cf78bfa29d3a01a7a90927c07511cf17ffc3956c37a4e3fce1b1dfc6bf7f6fafb8ecd4c339227ce7e255f99cb883ff88f30c9b9b001ba3c70dd0f5beb42713296a5d5c8f2424db05ddcdacb17d39c777fb0a0a7c05cae95acd78e79d2e0cd575686088fdecde75b87bcc9860742f7f2d4e782d83740baad403dcf085cb69f8770ac156562f402182a9962f2ac79e38923c8ca3805e105c4c99a18deb88a06e21988ccb5d152afde1c55570237b8631a823deb57866e27985a38d0ffd692f649fbc8f1a74ba018ad8a9cbc5f3a38509ba05d1d9983699f54e5197d58dc60ba826425428a0e813d10d31e5d5421011bed5d5581f57212ce59396fa5b52be1b4c71616c9aab7fb73e47a872dd40cff79b775bb535455b3931bfe277a0c0bc06dc3cc5d6d9b45cc64195376a28ad2cf147fdca4bb8e6074f5567cddfa79df45a812e7c8a53180ec95462a9c5fb9a3fdde42f24a77143666036483a2325c0eea0dcf141a0cddb40ea64765f3b0cb906f5c0f4f2203c43a8e9ebd5447d8f063ee2eb4ef501da4130738648d888660786a6af17e9b45bdcd1a6b70b51ba27ccdb97de7f3d6dad5b65c7444c0f6b77a55f22407a1661f613092493d5e47751e2f2fbaebbb7625a2437925e9e61da81bf94cdcfd9aff87641cffa164391f7c6d5ff4e27264ef235bb76c4854a41150ada9d4dd583953d34c7bd89bc716cd4f3a9ccccff75d4576766247f3999a529127cef7fbcf43b52606d4d13a22b8f21c5bae2027f8efd160a918cdc508139f59e4136837d06a82095f817ce2b248796ef8d650692a607cd3bf1577cc6495a6d9b6ea049c8f44ccdbfd36d57419c275772fcc3d2d7a397d44a1e8d7807df4151e39ad2adb8dcb4e70cf58024d756282f01cc2876a579e1c6e3657615d1ce2b3e0a378a2e7bee5b80acda6ce44a9419de471a2ea9d0196536438001bcbc84d90e6b94f6a31fd97947d9a3165f1211c4e6f895a23497a8ea9f5fd2e17edd1fa28ce7c6026228fd23e4f5de2fd276626b52604d199d44da9b065ea581f18cbfe9c1229e6437d063a2f28283cbc3112efbdf00937afb7f6e10608a49f2bb6b71d6dd087f300e75235489dfde589df4ed26a5167bac540f797355d72a7ed7ec4bf75525694febbc8550d6be313b821aa2190f83544cdea9bf5ac0c17e0be8cb5d1a5cd90f9f23ec67fe27245d2e3d106d33a5b05979eccb3a50e7693f9aabaeea0ef49842e46f4a2368dd29a557bf27ea56f222af91aeea7eb39eab69cbc1ba0ec040dc2ecd60647fb59aacfab4cb8d9fadd2cc0e921b5ce878aea8aba3b156f45a056886f802c8f4b0e689a9e037f4f6a7fecf5a35d394617a47131a8d8ac5714cc1900f9b632999c916e308ccdd44218d318316b8fdb12dff0e363651a61b4efac159f6e3c8a52e9ef6e3305c490cde6a018dfe2642a71dc1404de85b101f208a63746fc5bb7585d00673936e96915ff928cffb7adeca3c95bebe1760a72c56c7a854bb396c2dbf61f9979724851b8e43be2b14b77701fb7786922505c0dc6bc723da209212524eec8f988ef7c85a38320e06a5dc9ea9b0cf558d48dc67d6b5865622afc936d1069cc144a6433cc72e1bd4bf7a4563ee4749636ea671b83061efe53359330eb592af4996b327f6f64195afde413560067c4cf19c04677b04e80d49317c486b0f99a628820602e54d7e4bdd023c59dfb660d90af50721e81746589b99a207eea05948773ca33f64d0fd905e9dc88640ed0b60bc8c592eae9b7f5f97691d4524dc0cbeabd8932a9c4a351d31eb8890c3d21a54d276e4ed08cdd5ecd59684a1361c2065aaf364377d21d407830926946d5450153fe965023ba643dce0fed26d93cbfe218b8cddf9d70997a927e57e487e36c8b5c09f2998a144f54f665c9f5c97daa4fdfa1a6df826efc83ac7b7552c118062af76c98b4a633a31153a8d46a441b1fe4a9f23d5e6c154fd6aacc1cef3d8a0545c63ebb37e2f88ce83314dff65f1e94f1df7a4aa389c5a596173497027dcbe006360c792abf35400ae6eaf6d6521d80493615eba4187e8488dbda2bb59139550710f581cb1a1df5c72d41ff69b93f31f3df2a05cb659d26e387b3b3b50f26d63f7e3e10864f963913e7c8d5b38eab0a2a61da73124bc4e49422ba60b28920d54bb57478c447180a43a85b8e38b69c892f0ee8c572cd20f75d4ac2fdc5835a7966788b570ef0cee7ea5a792a499cdf72d670838a632566d33755007b7c02eb1cafc57b1de841525f469032ed936fd9cd5bf98f0eb62958faef6dd6482e203a59bf53be2657e07476a3bbf377d0091976079230a2821dbc33359d535f8157e8e47ad08a6948d13181c95cf580b3b2198024de40b003899bddc7cae55f56667fd50c5b01cba6b14f8217d4b93db928a2baa900bffcf5b063b861eb5147c0c0ed2976a20ba2b22184d6e9eb05d7be23a1a2211c5b5ab5978cffb21225e555a89eb3c82aca92204f6bbb2536bd46e4a06850cbd8ea708ff6b4b09411cbdc2cb4f66fd9432121ebc29944b9273a7fe66283ba37d3d6d4a7191efcc714cc202b341da91adf5f5ae4f341858016e5e37bb089ee01da42bf4d5cffa8ecd337018e576c957d9e3515754ddd5ccdaee6d4cdcac2b6066d4eadc7ade4a4336448bcf9d1907f1a8368dddf4206b6c849d5215b8fe341b46e89029d29feb5efd44d5cbda64e1bc9052881c63c81f902458b7a38be16cafd339e6906b96aac1448b4da07971ea4dc2ed0d93b17d9efd42d94db28d411ceb5ad01e14d14add22f92490bffd22fcdb1169973a32953740c09bfbb8cdce0d2d368df690ec7715b80b608f5144829e6695fd7933dad237432c6f21b45743c909342746d1ce6f402d359cec0c4b0816f87d7521430c437be977e07a22e49343fa6ef2fc63a694721209352f0101fb88bcb2d55a1efc40fe62a091435da6a65108845e42bbf821a240d33ca9af2a286c86d3feac90fe496138fb5a9eb8f3a6197f7581247613932717e870e995eee9f0e6c7be513f4e0b7284d8ff28173955bc08e0349daabff3964018b469aa5b6084ab940c698f26c11e81068fe96f89d18248b4d908ca72c0fb84f02c0077c24dbc58f795186aa5918b03d46354749e1647a9e6c3c87029312c95cab75c2fb632dd12273d458c1c28b518d220a1a151948365fe2b91b905f5d88126068401274c15ba25ed1283b40483bb77636bba72dc94ec4aa10db1cd88beb3f18264982c44a49eb940d1a1f6b680bd68c9787e9666a2b6f46d448c4937c98a9e8c6c7631b72aae1b191e2e8bf40300d256a1113b1c2d9a727870a397cc3c1f850ef6add791e2e3b53d7047a2b3e3f5bcb7aae3a5af351a158b079bfc3952a245b91d59f86aa3bda1879fd0afa7deb99b906f4fbe1a9d7e243508c2c13dd7e3c19b01db5903f759fed5e2eceec85b97ae66ec24a2ea40924fbff14f5f214fdbc47698cee653395c3c16305d98488dd6636d68ed23fdbe232de2619348ffd4c1586022f19da617ffe07491cc9094ada1232ccd152dea4e23fac757282c0777a25db7ec7c06334123c88647f5712595fce9ddba1ff293fbe8e40c8d8e1a5ed5d836b503e53c6d2a67c95844bf3f6c75f18d4f34e1d9493fff6ec755b2fcd3e979e2098965a18341c4109b97872170889a269a453a343ee4613c11ba0a9591ac0e7151b7f593d972c397fbac4b85df1f688ea6c34de1909b170afc1f4ea6f2d1199298c3f5ebcca7a29f36ce03df6822ca92cfdbf1fd4c5502a0adfb366521c9d7feca91614b36d740437e53f513cf90788504e8b881ba1c8ba84181eb0e81193ed44806064d1f712480fc40ff88b06a4b26632f9c64ffc2aedd509c43f0bf6076475cf357c714e475d18f11bf9ebb74adb080776c5749aef8247e2f41c036d4b6559cc71875a285e22064468de93a887e323717764d888c05fcc140cac67cba8618ea457c6dbeecf37e0c77331f9562aa3b9b3991fb7417112b91c87df05bf240a8e96efb24b65b573cb44371dba1ecbbaa83aadafa24f93fffa244ad7cfa01aea0baab6c8649f90a4e5e956e1f295d1371dd1c3ad228b5cd64a5ad79d4349300faf34eef92862f4467dcae05f537b049e30b075a6c8e73ac1fd3b3174ba8f2c1570f461db927fa702bcecc772a78329c3eafdbdc7d68d159b8c421ebb15fdf25877ba2c04a649dc1b92889349ee286c5e68f3bbbb5822986af88984d28db62b00443cd27f708bd74367d314bebcf78fc16a69cb172548308aada51e2fd66af4638b26bd0604e93adce076b0e1a2bde832d41c17a02c644d59221a395bf39165cf4caf5fdc976e4c82c2d2ee90354431df381c7797a1bd21ad5ef9fb022f466cb0a6e8cd73813640785cd5e69029e0d256d75fe8ce572da561e93dc7f7943543a63970fb11e4b58b1c637a7c5c302f6eb8c5ada9df07232dd16dbecafcce4f183d875b248a7fc807f25a954ecd64a2620502fe51838c2859e0bcd8f9ad9deb192537c70a8ddae528437b76ad487d443295b9c398a4c9d893691e5d96218d686a3fdf6957fa5f02c7945651fa7bac0b86ddc4ab99460d58ba8cdc86730276ffc195eaa7517885d24b8bd7d9c67b55ba5f57fe035ba745c1b6e2221b3966db5a767c6a817d7e849a4d686fedf65a29def245b216aed9a8cca4bef5ff2699f335ab2db33481e8973ead5c1e3112c5619744cb014676afd8c25c218c8711fa873da9a7af6d99e8e5e81b399e7af3e7ba7a2174b81cae410d70b9885a51f2eafe75462b2348e643f7b54faba6521c5aa01c186718b0d5", 0x1000}, {&(0x7f0000007440)="1457316f27e327d991fd5d1c7384ced65a0e99e0f0c453f9f3d2f1217bdbccf0dbc10fe174548c89adf09cf2b09ce9429c2525f4f6b3cb69a5c25fe476addd6ee42367c54d7de8982e3e3f708bfd435a7d7852743f88b75f9f8710a2177985bbd911ef2dee3dc4dd1a3511b3a5c2a9029e3856bce5c67d7b9ef2465f4e195fc09449c7084e810b81d0cf4b5fdfed26ecc373ceea8ee1ea041e60792749540b9935d9ab8ea8", 0xa5}, {&(0x7f0000007500)="366900df1a552385e73646884814c2609314206fefd90b2fa9a6e5", 0x1b}, {&(0x7f0000007540)="7b8c988807d4c6e73ab005c3f4a046cdf117fe13107a85bf311673c9dfbda9c951aeddad9a7623b22b474d9afe0b3294a8e7a71a473be912a8440f71c6e0ad0fec05eb6517788c6d42e628d7291f005c2859b9ca1ad4b41442f084b80794e31f0bbfaa9abbbe94fc120c693797f5729d345fdf844f85c008ca8fa38563ecec8ae80f10de335bf65b62688a489de3227ead5750f3ebe9509220712cea371d710e", 0xa0}], 0xa, 0x0, 0x0, 0x4}, {&(0x7f00000076c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000007840)=[{&(0x7f0000007740)="34623631ea03e25b114f6a83b296a0d5b951ed28fe88030fbf7550cbc6", 0x1d}, {&(0x7f0000007780)="93e404a9c6ba56e1d1640c1b495444fdcad022a857d22e8c2ba50a5517dff9fa15992628aedd11c4bdba8abf1484f67ebb71e775ab56bb8080ac1e595bdae4968c627b0ba8f09227df2e072128689369958ef809597e7fe3b6d517d2a844f490c4494fcb7fcf06429924a526c953155b4fc923805156a12ea3d9a50fa730d0edab8d27652f9e07b45f", 0x89}], 0x2, &(0x7f0000007a80)=[@rights={0x28, 0x1, 0x1, [r1, r0, r0, r0, r1]}, @rights={0x30, 0x1, 0x1, [r0, r1, r0, r0, r1, r0, r1, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r1, r0, r0, r1, r0]}, @cred={0x20, 0x1, 0x2, r24, r25, r26}], 0xa8}, {&(0x7f0000007b40)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000008100)=[{&(0x7f0000007bc0)="ec575900b930ffcb96e3ab6bd50df33963f47c55fa1ee148044332a85610edc37ae8dc549fe14aa76430e41db91ae2cf3231150aae", 0x35}, {&(0x7f0000007c00)="2a4c156881a380073ab2763cde0a8b4735409f8388ce2e29da2baa30f56b50a2f86b6461126d0ff12646c90d90dee304a38f582a715fe170eedfadf470df9e735067064ccbe13967865d6736ca3fa22fb0fafd87d1a77a219c3fb8d8c1727462153462fc55a5090b9f99e511e2bd72eeaf712609e0dcc4cd4c77daced9da1b2beaba6592cfbb1e8859bb96d33eb64871fccd8b012b858f339292668ea11b757176294feadbb921efa411086e81c473b00fed34885aae46ed84b2665d4cdc5b2305f155e5b288b9c6e7bc116603d0edc9", 0xd0}, {&(0x7f0000007d00)="8cf53b91ec45fd368c5bb08c", 0xc}, {&(0x7f0000007d40)="2b494ff88ba091b3e8673e4ab101ba302d69c6c81ec693170fbf89cc788d3512", 0x20}, {&(0x7f0000007d80)="b46dc2f5154f496de4ec46d30da827b8eb26339eda87308ecc328ad0394f5ff8d99af467f1b53d14f914165c4e4d35c51f8958466a4393ddb2873ad7d11b84cf7cb4f84fe7dac38e96074c50622bc40755a04deb7ddc23a8b1b44e", 0x5b}, {&(0x7f0000007e00)="7d34f001d5fb80d5443a3d7e1d53a75c412b5cc6317332027aa0dbc6cc6c2f54dddef8af6d1140089e1729a69bfaf0fdffb774e1e7dc6e16e59c62379ac89dfc2fdad0943663627f121bc880a5107eddae25f441bcc1a57940223e5e710d39106783d64be01ab8161dc64b7fc8ee9ab5dd6f93facc4172c0df9c", 0x7a}, {&(0x7f0000007e80)="e3eb62e40b3dc838edbc26c5958b418dd9f3dce30d1743e3dfe561f9c6ac691b7c3af6f891a88d269236a5571e9ac600ab83cf7aa5ed3c4b500c945f2e6d0560cdfc15f72ebb21138af8db41618d97c96d7ca5246cec13fee9e346af5cf54118598ff7a445b3e2044122bfe375285aec6bbbefd49eb24be62a64f2887eea66319966caac67885ddb0062b9ba2d33f9ea8e25ef034c631adb01a6b1cbb08adf7789b7086eaf3b4eec783c40", 0xab}, {&(0x7f0000007f40)="df6a5bc559c63cc0689d4cbf34787eb69cf702013dc8e0f0dc684544a5e1243e91e894c525cdd654f130761c3a4084902a95d9727b32532e00e055a6b75cfe942c0ee23442f04348a49758f586eff8e2766a83542d85988d1c5387d845fe95e53e85796fec8d699a705aca544ac7e00bfcb7b628deb79c2f07e7f5e854e2be395d7808", 0x83}, {&(0x7f0000008000)="a6d79611d9f893f13479becbf1006982025fb32308627397301b37b577da880b33bfa76611c18536f1edefcbea98c5f51df78ca4b1d14b85fa0df7fb4987f9be6c6479761b50e149b0eeb58ffed0464a", 0x50}, {&(0x7f0000008080)="40fc79ad606d6a313a3f418d82988ebbfcb68793488760bec924dd84e8dde75781ccb6e4c5c4c4a03bc6d6ecce8d39949457bbd01d46e0beb73b76492942f0b9b7852782c30f8503ed592ec5441e813ec7e521674d92d98c17540f4359bdd82aedb14b61757d03ae7e3d35b4a68f1a607313582057", 0x75}], 0xa, 0x0, 0x0, 0x804}], 0x7, 0x0) dup3(r0, r1, 0x80000) 17:50:56 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x20000, 0x0) ioctl$EVIOCRMFF(r3, 0x40044581, &(0x7f0000000080)=0x3) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000000000b1fa9daba76ea66b96cf35d6c861cf3575cee6778f44e05ba38c4e1ffdfeb1b261c18d4d53b37937e43b9ae43c7fedf21b00b632569189b22d1cd95d02184f666fb47da7659fe84c"]}, 0x250) 17:50:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x55, 0x2) sendmsg$tipc(r0, &(0x7f0000000580)={&(0x7f0000000100)=@nameseq={0x1e, 0x1, 0x2, {0x42, 0x3}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000200)="5e3397466d7c76055cfef9697a0cabf5b58a333cd4dfa7594bd9b6bafaa51e576940efd9ec95c10a11047108e94c77be18eb0c7156cfd1e10af8d49f58a7f34b2bab7fd06c2a97f906222f4699709bf670dd4b69fe6a8bdf8ee4b3ac6684a49c685440dfb7ba95e33cf5a033b4c1789981870d5ba26f1c5e31e39537ecf5273f0d899feca47ae8cc4ebec6edcea5b310abefa1c9c8f3572e2d7bf6f5e9c28e2eb3936756f4e21523be7efbe2d4d0d2d87458ac4e92b392201dc64d27e3195b8a89fd55f3c818fddd1171", 0xca}, {&(0x7f00000004c0)="5039b63460f2ef87f2725130a0c78316c3ee9aff2a51c01eea45265cfd2ed10a57ab3a4d7a9a2dad9a04206407ea1ec5750b14d2f4c3ebdb5c2b09b4e9c520626e212f8443568a83342810c4715eb8ccd81639aa365eeeea6c3fe6dd1fb5e0a60ed033e1fadf0740dd0f07e2cbb09a2c1ea1e74b7c5d28bcd9b1a83e79bec4344475cb122f546532a387564fe949b436770c4e9339", 0x95}], 0x2, &(0x7f0000000300)="a131e6abcb26f4ff6d5b738314083ab42e", 0x11, 0x10}, 0x4000800) 17:50:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85003f0000140000001be3ff0000a5d8237d86d8f6e60000f2aaffff1b8c6ec4da330f3b6c710de46f1b7e0fc08e609fad052e662c407be85278e63f00f8493a5931fbf309e7430f68840c6c7b4f08346742e49ec4ff7dff010000cab57e02b7d583398c7325613d9e375c7878d7af9b615130e96ccdc91598e15e296c2172f75bec31e024bb5472407f9c9069ba9c0b7fb9b7a3db7477f83b27dae9ea00d3573b454fa604132dcbf3bda915f3fba5fd221d9882e77e1857ed3bc7776d1e6fcd"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x1f}, 0x7, 0x10, &(0x7f0000000000), 0xa3}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 331.090973] Unknown ioctl 1074021761 17:50:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0x54, 0x37, &(0x7f0000000200)="e4f97a75f8c29ebde160cd7f0723759ec75efed1d4bc4966659060b00d3693d703acddebc88d6e2976201caa6ab119174527f2b8b0c9ef165a3db342ac66a7ded916fd2bf595c8411064b9c61aa0dabe9448fbf8", &(0x7f0000000040)=""/55, 0x6}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r1 = getpgid(0x0) process_vm_writev(r1, &(0x7f0000000580)=[{&(0x7f0000000280)=""/138, 0x8a}, {&(0x7f00000004c0)=""/139, 0x8b}], 0x2, &(0x7f00000007c0)=[{&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/238, 0xee}], 0x2, 0x0) [ 331.128587] Unknown ioctl 1074021761 17:50:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="9e400000290000009c00e400000000009500001000000000"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:56 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x28000, 0x0) r3 = fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001600)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000001700)=0xe8) r5 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001740)={0x0}, &(0x7f0000001780)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000017c0)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000018c0)=0xe8) r8 = getegid() ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000002000)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000002040)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000002140)=0xe8) r11 = getgid() r12 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000003680)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000003780)=0xe8) getresgid(&(0x7f00000037c0), &(0x7f0000003800)=0x0, &(0x7f0000003840)) r15 = gettid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003880)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000003980)=0xe8) r17 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000039c0)={0x0}, &(0x7f0000003a00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000003a40)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000003b40)=0xe8) lstat(&(0x7f0000003b80)='./file0\x00', &(0x7f0000003bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r21 = getpid() fstat(r1, &(0x7f0000004ec0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000004f40), &(0x7f0000004f80), &(0x7f0000004fc0)=0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000007880)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000078c0)={{{@in=@local, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}}}, &(0x7f00000079c0)=0xe8) fstat(r0, &(0x7f0000007a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r2, &(0x7f00000081c0)=[{&(0x7f0000000200)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000280)="f37e8023d337e16eae9da9c6247609ed88f574f3e4bc5ceeb7d659b44a1bd517623a62758973e33bb75331529787741d3bb4bc16f28c44d1698841e05822e2f298a92221cafef3ace915818e1dec5467aba0c7b94b7f837cb6bf9aa8c149663549b84ab6450ef6d1a21a7524b0052ce8ccc0d6c85ab582e41c102cb1c744f1eb54b017d719c07253bd9c1989ccb6f5a17416d5c2a0644aba046247401ae6623e29cc", 0xa2}, {&(0x7f00000004c0)="023ead912f973da68d49043bcac53a46867507414ac0f3874f23cbc1b5765da6fa4d979a028ce5b18b213412345dfad664186a81c9ef2298696e601a258db0e00c583019045fae9b34b3767415c50970d50d2e163bc6efd8b1d1b121610aa1d374f77617fa1b80242ce58cfcbd0afc46931360caff663a271b7eb3e76a0b6ff9c80de40a1dfef27ae1597b6fe0318b81d1380eeab06680bb9993b8576d9572bd800b7ca0d437d4bab8fe3f249ec909f5b6fbbdb6f24c100da7cc00c55b3f37877eb6368fb23266216e436d79fd3a5dc79d8722b979983896b05b59e45a98970288558f50bb2439648bce72480b83799d0908a89cfb80ee19b6c20c31139c6558f2792e4685549a4b2a23b21f8427b9fb6004cf3646dcff9b3e0f1a6da0aaf98eb51a7f2c3031b5043deff7b007c7bb577da792c8d8ee751022e67659e261589648c19a6137a636fd626fafb92bab018b3e34aafc3afdc3ea8141c9323ab6cc87980d0eba0a8259970244319c7e577d298f6d9c846495a89d3af9f8b3a5ea2e43c941b179ae0411c5888ce06596657ab9e15d2ee0803537da02f8ed5f4ce89c135d34756daa8c3d4ecc111a167a6dbcf0ca8070d84475e2007d5af2bda5c29c41d725a95a5fb87187169454f63a4f24f4e36c6d0ce8667c81f685a5a8db72c4d1aad93f75ebcb30bf0ace970da1708a23475abf17929b7d5b467d661c6b2c4e7891b6f1be1d8a9dda6e1d6eacf9cde8e4dc6f30ede12d15e4b1606d6b693a6dc8f232a7eaab6b8c05c826dcdb436804af109a368f58e2f9faf62943a8c8dfe07ccad1642ee161bb2b06c45b8c2fa401bce003c6fca978c11c60a1987b3c89aa03c9ebc5da9377a45034867d93f875fc52fc9f4e597bfd0aa9bbcd05e613dbfd777726089f114a4634be6f0b2c10a0c0925b34c37a69d09d7b34e9a706f247468712117633402ed06b8d786d0325565972218b4ab0349964ee1f7e327b211b4030e841976bf4c49a0fe50956b0c8a1082f5538f0a9c09adf8c05c97cbe01a949ec01c8778b0bdbe15edb71f485d967f49609b9c3f0dc6c86c953c22504a3132d0a2ec3fa934e6656365a86a205e5742205734e6de30a2e9744a76fe2c9eb3154669a13fee220484e84271ed96aa6c7020b4f14ec2082e4013d61220b3673da6b8d05a0eaf2b4914684c868714e2c417cea85736d60aed07b71ee12f66f2994fdf4360f4a4b5043c3ec4012c01da3f6840b0899220cb69313e25f4ff31d3ef104b26c7ccc7e8a30024798b37d0daecf337b1e09efe08e865b691b35c9ed8e68360954f696fa21a0cdffeae3a3d3b1f3d285bcbd0db031031952ac57aba8b9f1ddf17f304655338e316733511bb1d39e44d09d85c5fc009d62d508ddbcfc9af7e5d27106b29eaed15f6818e62f13247b632a4a30a9f8c142b6e457c9d1416d757a51ca7e276d7c19ba53db6dd9a0725f04f88b9f9c3f093166d3904c4448c781b6f92a1da9cd9c7cb5add9fb651c190f2538d20820e7499dca4509cdc6b5dd6b98ade48e8ad7ebb3a40b0bf830aca6fefdb2e7c4b77d8e32ec8c012f84dc7b7bb90ea077318aea4caaea8f5cbeef3c1179d96466fd2c796628744cad7e2a5711be763eaf83cd774398dc093c2a368543a1154ca30b2461832af870dc5c45ec8f4cfd4c8337d1424ab2612d76c1f8929025170c1af23f73e2bc2ea0835fdf5c5cf79c708297a128d5544dd829eba31db643da91ce89c1533d37ec3539382e8cd116bbf6a625d74747d12144130acd9c5a8a410634801b6e4c4c9351bfec215b6b03753cc064e92692ae445cc5ccf798c7e79bdd152f5b07e108d9d20de9fabbb290ed39220a9004a3404cdce7fc0ce9cfb10b311bc669677c08bb7756ba66c562fc27004a932bc32bfca5b7fe52a01dd201a167a77e6644727df7ce31fdd3c0d3082c76e25706e3e4684713a4346a519d802c5d0d5a3bb9829152597126aa20907714ed62481e74c8ea4f93261825f15a1c0e8a2ad006b27980fafe14729e11f1d0a6b53796c0b6a708f360e22b88876979d170bae3e6a1bdbca07324e5ea8d8f845b265765438337cffd4061a002d5e067ff35928e4e343bb7b49dcc472a952168b0575d4d14f25584d09fb346e6fec04d35c4e686b35da2b0ec560e019836d363de379d2fa2bc3c4b3777f4929e152df0bf334a7195ed40e55a9b086d86e875b867cb236a62e938483b2beebfbd9900822e73ff1f0b2d6679482999e39704cfa22211e4b9753bc7e421a1a76adfe2288d4658a942556e790f546f8940c0159724cb208e15fa7ffec65864a8d16f32c5cb93cb132160374ab8f99457ecfcec0797ab4a06daf7b76e306a4dbe8e40ba46c84a1c0d4a91bb3e0df41c5adcf6908a07009c1402bcb956848cf22fc1189c0ea4b86a6cb424f2a3330923e5bfa70440771948a245ce334ca74bfd321422fc0769e8c12483dfaaabab1baabf8cf8139457a5afb9600591cd18c1f0c702cd6d3636b5536382ae971d4df5adfbf933764abe9ab9fcb7c8fe1003de62180793285bea70f829dca284796aecbad7d4effa0dca6041caeb996a428dbe8487ab8a3c2b50493555e5bea021257d74631c4b8eb0bc79d498d66653fe87be5c336780f18e10a95792ff28c1885b36e18dc9c54ae69ec907bc9369e71cbd6b193c80d887fd3301e150e91ddc87d798664ea28d21c3b305b6d5a32504779795e09164d6cc9e13c9c610704173c02aa8c1082454a2b66dc994b0380dbcb8e4c5f36ffaf9c8912b6ea81b7b462e374d53bdef0282eba53b1a9ac27398085aea47ad58501045846dd527a3ddfe50c49e01bc24dc34b2731b564b0942f7a795fb3f42c3e47d522fa2e1d07fbf127f12c716d5626613be3eddecece92338559f11aed7d984809df01c2f549de35986bab0760248039423adb611c75d6d60d95376ab4e5ad9aacf610c00f3d01920d422f62a8acbb141aca5dba7a68369d81325f2c530bb4a1b0cdbe6815f5a4c340803ebdecc5dcc9d54556c47468634bc650cbfd22b742cdef33aa5d113785181a9cc77597386c2684e3f64ff254cb3d35624c30386250b3c8ea4f12604d5e1d08b7dc0c02ec42868a56ec024ad7f85ac0858e1cc4f2be7067c2ffdc572d705a786cc0c544e33300f91ec5d4cfcbe16fa44f490b2fb8e5f3547b739062dbc23aae3c1537e9e9a553c18dd2fb7db019a956d802fecbf4a64967b7bbd3763959bfd36b58918991eba75075a303ff6d23b7969039eba46977b032262f74858a10e15db89a93594968088c1150a64d19a6b17a52e05aea8166bff9c8c9677354a3c170c856f216bda52ed3f2607bcb954d6aaedede3e7f28c991f77e35b2f0a283101f5611a9fc129efc065cb769f7e17234b440ce24df6d3f1f5f83ec564712329b935d0f97aa9ff6326ecbd9be79cff11bcc3368bfce01f11ff949f899a540b0a53f47ba23766a3719aec4a1ec5bfdb3c34cf133b1cf4954519f6b51718b6ada84634638ec25918f032ec1bf904820540edc444372590ce0cb70cc4ee3e9ce6dbf2821c8df7019e1c81f8fabcefdcd1e127227a56340f027021da2ca6f6c84b430e559828f0f5e49e074ce84452e89ca358b61b7a7d879317820733c8d95a71196ab1b6575baa481966a85d7c910acb391770c6d0578de4a7c60d2eea3108af98bcdb442fc2d2854b1e72b7e3e2817742e4ad07c5b2e55058a51de108d73b796755bdb503b94a59a0575d55cf47192e6187a1070ff27945aa8cb182faca3c6270a905f583e496f96814a2ae4f8dc2de83020dab7c48d483aa3288f8bd8fb8b51fe6dfba6115c89260bea570472f1dbde31d78e740d3f3b0bf7e76d2cc7d200c0f4538baf1077ac033996f62fd5d9eeb690d53f436b93686f7e36c92ed0c7cd486e9ba3c9eabac52375bf771c4148a4fb93117451f141c0cdaaa25e921c0c5bda26da4e33a85f8376b158f9b5054754ef84c663764781bddea1b364aaeb729ee442924c26fc8b1b8a3a86f6480c597716c5e5f416952ea097e601de264aa4e2d761dd8c4456ff1e221c0a33de6c533a244063d0a31ee0d371bc69930ef47781c757999371f5ed09fc55fff4e21ffaa77f2d0595b6f4950c55cc3b9549d28e927443d104a3ca489face6ba2bbe6cb65a87916d70ba32cfb01f804a1392585d8fff68f887ccce7222770e9598fb477e38e600dd3c3a154a261b1d8a200a052584ebfd97e928602fde2712549ec724b95435754511a08e8db6bb52bd735c66e80c8a49fde4d6fe0b99aace3a1077a890c8d914a2045387fcabd51cbfa810b181f95a2aeadba7d86b88ea7c7f543afe19c01f27181e0002f1a3d5161cba6b307021e952caff4fabe900c0fd7372f4e30bd69db086e5ce8ff97be6fb06d5ea31cab7364ee7bed386bf1068a765bd9d2407b2f5499972ef854726103fbed4a33ae1176b19a9e66fb26d2ac3e68afde82d7e31b752b9414b4a7f2e822cc93c8277c71c4e1a387b0b61a926a2c052136e6a8f4233eb403e1a2ca8831c0dc9a8cecee7afd64555a06ce76b1471f6bbb841ba7fc1be3a4974d2eb1387acd8ecb6267f0f04ae31dc3d77decad42b90f2d7148b980b9d560e08e850048a76f23a743b7afad05ec5d49d5fe9fe1437f58d927c2894d04cbb14a5a95436363cc35dc5f96333f2b737004825a01112b7cf63c41b028d603b21b95ee8e7037770c1d99c1c1cfeeab462a2c73e87aef4dd7c0c3c80452f26c2ce921e6ae314488f07b6a243cca05445295450c079451ce19672131722e6c65a57b349a015577cbb0b0607d9a97fd1d9df97cd2b3f18cdd7793973d9ea9fd09c217d202de1703bdc875b25e96acc5284499ee03dc665f96909231138dbeeddd2240e5f003a12310cb49e785e135d56b401679485093adaaf2631980521f91bf04a1608bf5dbaecd0db99baacb93c372947ddbb7acff51fddaccdced611267e31a3d783320ceb10a067264cb9a31e0c4f6e6aa1d330efa161211de8d0f1c57271bc468ed01faa1da472091ffac9b884494532e1742b86bd44d26c491d67ac19f394734a6d6fc62c2031ef7dc93097695dd31ae1cf08b53a99c550a0c0d561245ff9844355bc3e5a479aff68a36841b970b0a3690c667cbf06b9183e5ad4858968e72db7d8bd252a39a13e82c4a92c30f145236b121bae31f92a6f40f5f3699ef8f1eda7c02ce2fdd3e42394b45a1c79236720cccc06e23129500a4018f5315a131b3f6d6037424cf46fef0d430393152cc9e2d1d5bf4a7ae872623b9c55d642a04d845719dc2f5b1a5dfae4c2f6496425aa2075bb1c888ec36bd981e82afae399e2891905e9fe773ca6d950369d3d64886a2ed2f4db338dd0f27a94b738f551f79fac74de7bc3fbaf2ac9eca7c8a1abb7c76cb3664b341c14503a5aca6a9b66ce82ca15dc97a32386319892c81c7c5a5bcfc1eb192843f1bd231903f9513c34cf5bec0331c3932c2cc4499c1bbba5cffa2496d43d43d0665fd53d6b9138389e6485664ccd429cb982547f01a18ec74cc0693f5357e9dfece9ad65599542196762aa941c4225832f03d2c67b6df4de2e01abb91c2f7f11c069e020b3d9d380df37b5858bafd04f6148e0024e1cc9498683776bffe6b54423d37682f63039c9fd6ce00392f72d3bf585ee8a4be51c37a022480abf863299f6d443d1d4df52c6d595a2da4e572b5865162e81b2eca47d8f3d28c2c6ef6be357805fb8122c257b0f9896b93f0d071c40327f7ad8b8048fa9636f24317e09466311e0b2df0ea0d", 0x1000}, {&(0x7f00000014c0)="dc01c01212804f7be0ae71406a1b4be9c3e34e5c1a770c053f06ea3fe8aadfe2352f3f7f448f468e36fc2a7176d8ba33a0dbf341164f45d4aad1a8de13e177c30b366f3d76174e868e5383549cc71e3a766da68440fe19beead8c795", 0x5c}, {&(0x7f0000001540)="133b3acc32e16001ec91b2e8a2cbb674a7d8c6324f7501cf464739740cf193e2785ef1ed85dd9695b5948d41c2b8cf18fdb2e91f22c8f562a512e5d229242a27db12f34bd0bef8dc5020947af6c7abb32904b25ae956f352fe53f703f5eab30a20fefdadc79207deaf7e8862eebcbfa4cb66fa655496c71c5106eaab82e0e909a6c9632fe21a8e7c76f5d0b15cf3a97d97b689efe5781f4b2a4bb072e8e573fe6e7b63e0dad6450b10cc585c54", 0xad}], 0x4, &(0x7f0000001900)=[@rights={0x20, 0x1, 0x1, [r0, r0, r1, r0]}, @cred={0x20, 0x1, 0x2, r3, r4, r5}, @rights={0x38, 0x1, 0x1, [r1, r0, r0, r1, r1, r1, r1, r1, r0]}, @rights={0x38, 0x1, 0x1, [r0, r1, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}], 0xd0, 0x4000}, {&(0x7f0000001a00)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001f80)=[{&(0x7f0000001a80)="49ee601baa962cfdbf9df031bad04872e8cf8c93b3a6b9e99b8d3dd55d6bc9d4b21c46307f6609d751d7cbcdc6b2c1f49fe398a6e0bbbc269bfbb03afd2421f76a4baa561c76e8b63f1a49207f66c7cf842558c5e4a659d44dfcca787dd0e6fcc2a5d07e33ce09023663e7987f1a74c60a7a438a492d194d89c2daaad26549aa6810ec619f2842c978f9e27646a0e9490123bc933efcbd05c76e0fbb9d15c136eeb6bb49961bc301b8b35ccc43f712ce5715b2ef4e1f63605c7d162b3a", 0xbd}, {&(0x7f0000001b40)="ada3ceb23d009d7b644856f1732d2a305198c47fa139325643393a627fd9706c11e0b88c682fa743bed4204b4d0d5b4df9bbc80c78e588e70711e1b5416255e03b41dac9223b10a23d8d6ad98fdc0803fe47081f06", 0x55}, {&(0x7f0000001bc0)="d74c4b036cf49c7b5448d17924658e5cb45201e4ae249d1849b4eb8d77b8db16c8e4ba432bb79f46d135794e3a6efc7edf6a14adede64343c05fad5068024811da6a41243373b1988d7d02a9e57920509bf9b0f47c302bcf53b6f7ced12bd2ffece96d08967dc73b591158f308d19008094866a610cccb9d41302c3e688ad3c4aa6102883fa9d0cc648fa033890ead1af871eba7712604a6ae0e02e594478eabe62cb2cb48a7d8eda49d21c3bca67cb7e1ac22d78f73a3d9f0ac59dbc63c30be6a", 0xc1}, {&(0x7f0000001cc0)="6cc7701875dfdb3f1ae4a9f06c746abc32e4556224337f26c4ea9f610a5425d4463bd10acecafebb7fee33bbe0d66fcf4484fd785f739e2cf45e353dad453db5b5631329bb77a93b671ddced1b5795f43559c1edee527a04f6f6ae8bc2cdfe334cb907089b8282fe6c81ad0a7fba1ae52ace7dcad214c961da880fc2cb7e83830f6ca48c32217b57e7940008afcb9bfcf57be699671a10b54f9f62bbddd8cf0e5f4504ddeb9ae67734db0224d6b7b633ba5871671ff1b738aec4f72b04b98364cb31c435e8eb8649b450", 0xca}, {&(0x7f0000001dc0)="f38281ee077855f1bc5585d9e2e3fb16c3e969785823c74b7f8c36b49e49c40ecec431e5bc6ee267e8286af1d6f4057abc57f43dd81e0be9dd0ef9030906a9b84d7f486b5611713b3272193bd7e9715f7c2f07d1f31b4319df7c154188ec5715672169cc580a292081b94cdae24e8f38f701aabe94d9aa1b2d26db2c92d99a860437b0e2df9465c27ff64a749a741f2655b914cda5c6d2cda6dee3339e396c60e2184c41a80700c3648efbe3f568b51b606f5c4880aeb80cadddeb9deb2b4c4f3657125f1870a2d43a4181da4556d854facf08f192f73ae23893351bddfc17", 0xdf}, {&(0x7f0000001ec0)="7d32fc5e4e92d7275e2f0ff1cb0891fbe2ea5a9e439c983ff2a7ab43d6961867704a0e758595963cef4bfc621b7d2118b5f59f9f05d2f3653bfef9327ef4c7b86699a328767d434e5e61879d35ad7cd65baeadf8c7f4bfdb303b82defe4ee16267c008765f3c161b7683d7ceb00bbad5bff23c227500dc65fb28e9f2e2e34b23a12dd59aca511cc5115dcf33d383c7326910a445aec6424575f3579a303c5ace901d626eca577509ed185d5144a289cea47752f709449dbe102e1e8ae0", 0xbd}], 0x6, &(0x7f0000002180)=[@rights={0x20, 0x1, 0x1, [r1, r0, r0]}, @cred={0x20, 0x1, 0x2, r9, r10, r11}], 0x40}, {&(0x7f00000021c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000003600)=[{&(0x7f0000002240)="b27fe58d5d3c8a2bc969bfe40c110a373905fad015d594dfdc1a7085237726b06824715866fa1a7bb66d0e541a9b77ddee9ba7a611ee23834b0411e6191d0d31db390620e3a9b4da61b50f56c4d517ac9e81141064ba823a64ab74ed63af90b32015", 0x62}, {&(0x7f00000022c0)="f889f433ade2b8d1452d99853e5e4bc25fd0c6c4eaaea48d3cc4c66b92133255613ede0be409a5cdb49bf9519de549de5279afa69442a148f918267e87ac97eead364ce75d14ec934f0c683b6d58a8656e0cf61e06099121d23afa89c4333bb7b6fae8178fea5dc497e3df146722c981630f2bba2a14abe2ef84b7913bd357840efaf139a7e9408c35ef48baf0133b53860664236dafdcc93ecdec0ad803ab10c7ea4213d758c7e9febdaa28", 0xac}, {&(0x7f0000002380)="6b4170296536c9a2fd5853b23e3ac95e5f11b989489136d1f57fbfa65e20301e35529805a602bd44ac2cfb8f4e9070e2e892c968da24590cb6220e9f28161b3fb418c492d678c2ee134107140aec13eb37c3ea922b30b305e9469aeb5164b1b1f99e9f34380944fb1f428f3c0f0ad4f587b2abcc28df67cfbc4331646571650797905f381089d9d05d334e3f", 0x8c}, {&(0x7f0000002440)="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", 0x1000}, {&(0x7f0000003440)="c48be228c3bd061fd0104cbb4a1fca084ab3b2ba5c4c6552ad692fc0a9f4d6f6caea62c7f7a4dd6c94b2c872a01c4ac5b3969b3f2f700b277a091b0498b34c02c4e7a40254ecc2a49ba277cae0432666fc81c2ec8d773b14c42ba279c6a3f7de52014b08ed5ecccb567252e4b20a14468d7a925d51f96409fcb05e5c76", 0x7d}, {&(0x7f00000034c0)="0bc871557c766efba493902a9f185acf34dfc0be195a9cc845c23bf72de546d42dd44eecb9369caa70a40a8a73b9d5ca0685add00d8910a081aec2f36ee084364cc6ae8408c9b50c0f7bff149d222e54247af223917482b831bf715d50590e9f8f65049995311d6b7c8f78b447c3fe2478f9c6d30b21ac1c2480c0b80906847fd246ca854d3e8ef7d8afa83987258f287aae6c3456a6c9a6779cb50acc6bbd286a05e6853778662f9a6140e4e7f48b678958442d7dd7290f119bdf85027f6f8c79bbb24c121cc585", 0xc8}, {&(0x7f00000035c0)}], 0x7, &(0x7f0000003c40)=[@cred={0x20, 0x1, 0x2, r12, r13, r14}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @rights={0x20, 0x1, 0x1, [r1, r1, r1, r0]}, @rights={0x20, 0x1, 0x1, [r1, r1, r0, r1]}, @cred={0x20, 0x1, 0x2, r18, r19, r20}, @rights={0x28, 0x1, 0x1, [r1, r1, r0, r0, r0, r0]}, @rights={0x10}, @rights={0x20, 0x1, 0x1, [r0, r1, r1]}], 0xf8}, {&(0x7f0000003d40)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000004e80)=[{&(0x7f0000003dc0)="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", 0x1000}, {&(0x7f0000004dc0)="fc8fc193181d81b7ede84b49f276388a102c15d9d61214ef48b0c367245f16e584c24529ec46c6143e3e4ca7b290c089ff41bf4f5e70cb6cdde4bb7497f6824631a8bd9a8e6181b2457b1c0b95fa096c899be32973ff506663de863ea9d96b59940b89ea766d0df19a8ac2f9ede1d91a0445169a79e0d15d648c2955f64d93f900020d45767329f153af08d7389bb01d12311d66423c6a0e799349c937aadc4ce2f0dcf16a4ce8244481f548b2a8b14622b9e95f99d2266f92ea", 0xba}], 0x2, &(0x7f0000005000)=[@rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r1, r1, r0, r0, r0]}, @rights={0x20, 0x1, 0x1, [r1, r0, r0, r1]}, @cred={0x20, 0x1, 0x2, r21, r22, r23}], 0x78, 0x20040010}, {&(0x7f0000005080)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000007600)=[{&(0x7f0000005100)="bb5d1c62fe5655c9d9d8c8a0b18fff0ee5a3c57542d7a4db04e7c5656865208012872747308031450701674b8f4deb709aeede0959ef2b96f2f5feb0cd3c201906df71c0b699478151e8a1d877738ab64019dfe31842c4cdd6ac8a87b12411427d01156f4ba141c7b2a40062890c1dd093612865d951ee0c7056d6a18517d6a94df43ef8bf75a9b5c30fb672ab4e99f8ea09fc519ca295225ae37cc30d0389fd2cd692bd8cc6e2eda07e3edc01ce3cd3", 0xb0}, {&(0x7f00000051c0)="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", 0x1000}, {&(0x7f00000061c0)="d4a2d70298a6fb9965b7dfe4f18e06135376442b3f8c9bba42499c252a4172087be390647c3b75939bb9b8fbe05fdd329403a508acf3b0a4c84e512e4b74f6fcebb0924fec7cf23f928321ec8df0de14dc00cabbda", 0x55}, {&(0x7f0000006240)="584b07d11e0a5358eeae1c9c18ff83c336d8a2", 0x13}, {&(0x7f0000006280)="22caa42a01ed8f557a4a8422a430a7e992b092f54ee2edd59c2a5abf8a20b1afa363158c25a47ec6cb265719dfbf4bef07f9267728582e7a9bfb950fd291b06ac81cdadbf1c68d454698bc377f3ec9f4580d923febc5e46838cecbc0d300a814bf2d81dffdcc281d35fc15322c473df270bb58054cccbd98a6c434a1ab892324041f1fd161a9842ae1ec94898cb28fb285b46dcbbe6fdd9501", 0x99}, {&(0x7f0000006340)="b50b80b24e7a3470eacf9ad27f5fd01a2531da5ee64367c48170321fae0619a0f868922d40aacbe9feecdb10f672686898685f30edde81ff71f302a9d64056806edb24becd0f2a2149ace404f3e30514f5e037c7bb437d3f3b209a396b089318ef571f43399ac5b83f4ad3afac7fb49eafcf6b28537725f1266c3140873b7c8c3e068b4901ba13c23a29d22211fd6b789b5cf849f0c718149fab41d6e758e00acbda745992ab994d85ea9102ec6f1b668a322d3d61b01a81230c0024e1561692d2", 0xc1}, {&(0x7f0000006440)="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", 0x1000}, {&(0x7f0000007440)="1457316f27e327d991fd5d1c7384ced65a0e99e0f0c453f9f3d2f1217bdbccf0dbc10fe174548c89adf09cf2b09ce9429c2525f4f6b3cb69a5c25fe476addd6ee42367c54d7de8982e3e3f708bfd435a7d7852743f88b75f9f8710a2177985bbd911ef2dee3dc4dd1a3511b3a5c2a9029e3856bce5c67d7b9ef2465f4e195fc09449c7084e810b81d0cf4b5fdfed26ecc373ceea8ee1ea041e60792749540b9935d9ab8ea8", 0xa5}, {&(0x7f0000007500)="366900df1a552385e73646884814c2609314206fefd90b2fa9a6e5", 0x1b}, {&(0x7f0000007540)="7b8c988807d4c6e73ab005c3f4a046cdf117fe13107a85bf311673c9dfbda9c951aeddad9a7623b22b474d9afe0b3294a8e7a71a473be912a8440f71c6e0ad0fec05eb6517788c6d42e628d7291f005c2859b9ca1ad4b41442f084b80794e31f0bbfaa9abbbe94fc120c693797f5729d345fdf844f85c008ca8fa38563ecec8ae80f10de335bf65b62688a489de3227ead5750f3ebe9509220712cea371d710e", 0xa0}], 0xa, 0x0, 0x0, 0x4}, {&(0x7f00000076c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000007840)=[{&(0x7f0000007740)="34623631ea03e25b114f6a83b296a0d5b951ed28fe88030fbf7550cbc6", 0x1d}, {&(0x7f0000007780)="93e404a9c6ba56e1d1640c1b495444fdcad022a857d22e8c2ba50a5517dff9fa15992628aedd11c4bdba8abf1484f67ebb71e775ab56bb8080ac1e595bdae4968c627b0ba8f09227df2e072128689369958ef809597e7fe3b6d517d2a844f490c4494fcb7fcf06429924a526c953155b4fc923805156a12ea3d9a50fa730d0edab8d27652f9e07b45f", 0x89}], 0x2, &(0x7f0000007a80)=[@rights={0x28, 0x1, 0x1, [r1, r0, r0, r0, r1]}, @rights={0x30, 0x1, 0x1, [r0, r1, r0, r0, r1, r0, r1, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r1, r0, r0, r1, r0]}, @cred={0x20, 0x1, 0x2, r24, r25, r26}], 0xa8}, {&(0x7f0000007b40)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000008100)=[{&(0x7f0000007bc0)="ec575900b930ffcb96e3ab6bd50df33963f47c55fa1ee148044332a85610edc37ae8dc549fe14aa76430e41db91ae2cf3231150aae", 0x35}, {&(0x7f0000007c00)="2a4c156881a380073ab2763cde0a8b4735409f8388ce2e29da2baa30f56b50a2f86b6461126d0ff12646c90d90dee304a38f582a715fe170eedfadf470df9e735067064ccbe13967865d6736ca3fa22fb0fafd87d1a77a219c3fb8d8c1727462153462fc55a5090b9f99e511e2bd72eeaf712609e0dcc4cd4c77daced9da1b2beaba6592cfbb1e8859bb96d33eb64871fccd8b012b858f339292668ea11b757176294feadbb921efa411086e81c473b00fed34885aae46ed84b2665d4cdc5b2305f155e5b288b9c6e7bc116603d0edc9", 0xd0}, {&(0x7f0000007d00)="8cf53b91ec45fd368c5bb08c", 0xc}, {&(0x7f0000007d40)="2b494ff88ba091b3e8673e4ab101ba302d69c6c81ec693170fbf89cc788d3512", 0x20}, {&(0x7f0000007d80)="b46dc2f5154f496de4ec46d30da827b8eb26339eda87308ecc328ad0394f5ff8d99af467f1b53d14f914165c4e4d35c51f8958466a4393ddb2873ad7d11b84cf7cb4f84fe7dac38e96074c50622bc40755a04deb7ddc23a8b1b44e", 0x5b}, {&(0x7f0000007e00)="7d34f001d5fb80d5443a3d7e1d53a75c412b5cc6317332027aa0dbc6cc6c2f54dddef8af6d1140089e1729a69bfaf0fdffb774e1e7dc6e16e59c62379ac89dfc2fdad0943663627f121bc880a5107eddae25f441bcc1a57940223e5e710d39106783d64be01ab8161dc64b7fc8ee9ab5dd6f93facc4172c0df9c", 0x7a}, {&(0x7f0000007e80)="e3eb62e40b3dc838edbc26c5958b418dd9f3dce30d1743e3dfe561f9c6ac691b7c3af6f891a88d269236a5571e9ac600ab83cf7aa5ed3c4b500c945f2e6d0560cdfc15f72ebb21138af8db41618d97c96d7ca5246cec13fee9e346af5cf54118598ff7a445b3e2044122bfe375285aec6bbbefd49eb24be62a64f2887eea66319966caac67885ddb0062b9ba2d33f9ea8e25ef034c631adb01a6b1cbb08adf7789b7086eaf3b4eec783c40", 0xab}, {&(0x7f0000007f40)="df6a5bc559c63cc0689d4cbf34787eb69cf702013dc8e0f0dc684544a5e1243e91e894c525cdd654f130761c3a4084902a95d9727b32532e00e055a6b75cfe942c0ee23442f04348a49758f586eff8e2766a83542d85988d1c5387d845fe95e53e85796fec8d699a705aca544ac7e00bfcb7b628deb79c2f07e7f5e854e2be395d7808", 0x83}, {&(0x7f0000008000)="a6d79611d9f893f13479becbf1006982025fb32308627397301b37b577da880b33bfa76611c18536f1edefcbea98c5f51df78ca4b1d14b85fa0df7fb4987f9be6c6479761b50e149b0eeb58ffed0464a", 0x50}, {&(0x7f0000008080)="40fc79ad606d6a313a3f418d82988ebbfcb68793488760bec924dd84e8dde75781ccb6e4c5c4c4a03bc6d6ecce8d39949457bbd01d46e0beb73b76492942f0b9b7852782c30f8503ed592ec5441e813ec7e521674d92d98c17540f4359bdd82aedb14b61757d03ae7e3d35b4a68f1a607313582057", 0x75}], 0xa, 0x0, 0x0, 0x804}], 0x7, 0x0) dup3(r0, r1, 0x80000) 17:50:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:50:56 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000290000009c000000000000009500000000000000a05b1418ea4cb8bd8dda68aaee52d82a72b2d75a69a468d7cd4e1b4d7dd8d256f89e5d6075ce817d93d69f5a3196b09dceea7c55f005e3ea4abce8541f70ea1e56b4dc4e4e521e3d1986265d1766e7674a58a52d9974afb5962eab24b1a850bb884526bcb196d7500340b1b6cb797d5a750b03357696f3b064b71b1c0612726393fdfce7fea5b325bd710d5b1440dd068119924d8b2edbefc6c5e38a791b73543a25dc9fc0ba0a3c48bf03f50be4f9a293b03259ddb325cb7815c49784544dc280992c1d8a484d87aebfa255ddf2bee7b946fef0a3ed"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101000, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000040)=0x1d, 0x4) 17:50:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="85000095000000000000f2ffffffffffffff000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:56 executing program 1: openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x9}, 0x10}, 0x70) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x100, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r1, 0x402c5342, &(0x7f0000000200)={0xb2a, 0x101, 0x4, {0x77359400}, 0x0, 0x3}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:56 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000040)=0xff, &(0x7f0000000080)=0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:50:56 executing program 0: socket$kcm(0x29, 0x7, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000280)=ANY=[@ANYBLOB="8500000029000008004253459b650e2a9a22c017005873df59da63d91b2d7e0a647f6e494b50aa20411dd1c03b325128000031b097a601c9a29812"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$VIDIOC_G_OUTPUT(r2, 0x8004562e, &(0x7f00000004c0)) r3 = fcntl$getown(r0, 0x9) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000002c0)={[], 0xfffffffffffffbb6, 0xd94, 0x7, 0xf3, 0x0, r3}) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r4, 0x40605346, &(0x7f0000000200)={0x7, 0x0, {0xffffffffffffffff, 0x3, 0xf85, 0x3, 0x40}}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r4, 0x80045301, &(0x7f00000000c0)) write$P9_RCREATE(r4, &(0x7f0000000100)={0x18, 0x73, 0x2, {{0x80, 0x1, 0x4}, 0x5}}, 0x18) [ 331.490816] device bridge_slave_1 left promiscuous mode [ 331.497171] bridge0: port 2(bridge_slave_1) entered disabled state 17:50:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000290000009c00000000e59c1c64e649b78c585b7802784a19d892bf8a26a45f263cc48e462212de24c672ba2554ee07abd8f56215484c35030000000000000084a258b9138e2806451907"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) utimes(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x77359400}, {0x0, 0x2710}}) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000580)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4000001}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x68, r2, 0x8, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x9, @link='syz1\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000000}, 0x40080) 17:50:56 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000440)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0x40485404, &(0x7f0000000280)={{0x1, 0x0, 0x2, 0x3}, 0x0, 0x0, 'id0\x00', 'timer0\x00'}) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0xf3d8, 0x6, 0x8000, 0xa691, 0x7, 0x1, 0x3, 0xb02, 0x0}, &(0x7f0000000080)=0x20) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={r2, @in={{0x2, 0x4e22, @rand_addr=0x1}}}, &(0x7f0000000180)=0x84) [ 331.592296] device bridge_slave_0 left promiscuous mode [ 331.632333] bridge0: port 1(bridge_slave_0) entered disabled state 17:50:56 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x20000, 0x0, 0x1000000000000000, 0x0, 0x0, 0x1ff, 0x80110, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5a}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:50:56 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0xb4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r2 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f00000004c0)={'vcan0\x00', 0x0}) r4 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0xe93, 0x80000) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0xd, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x3}, [@generic={0x0, 0x7fffffff, 0x509a, 0x8, 0x7}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xbf58}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x1}, @map={0x18, 0xa, 0x1, 0x0, r2}, @alu={0x4, 0x8, 0x2, 0x0, 0x1, 0x30, 0xfffffffffffffffc}, @generic={0x3, 0x9, 0x1487, 0x1}]}, &(0x7f0000000300)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41f00, 0x1, [], r3, 0xd, r4, 0x8, &(0x7f0000000540)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000580)={0x9, 0x3, 0x1, 0x9}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x40, 0x6, 0x7, 0x3, 0x0, 0x0, 0x80a00, 0x8, 0x6, 0xaa, 0x3, 0x9, 0x50e2, 0x7, 0x4, 0x0, 0x7f, 0xaf95, 0x4, 0x471, 0x10000, 0x8, 0x7ff, 0x2412, 0x9b1f, 0xc000000000000000, 0x3, 0x8, 0x7ae, 0x6, 0x5, 0x7, 0x100, 0x7, 0x101, 0x88ef, 0x0, 0x3f, 0x2, @perf_config_ext={0x101, 0x6}, 0x12400, 0x0, 0x8, 0x7, 0x7e, 0x7fff, 0x1}, r5, 0xa, r0, 0x8) 17:50:56 executing program 2: r0 = socket(0x40000000015, 0x5, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r2 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x40, 0x5bb60e0631b43985) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000200)={0x6, &(0x7f00000001c0)=[{}, {}, {}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r2, 0x4010641c, &(0x7f0000001240)={r3, &(0x7f0000000240)=""/4096}) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x400, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x80000000}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040040) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000080)={{0x0, 0x91a7}}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000001280)=0x5) [ 331.995650] device hsr_slave_1 left promiscuous mode [ 332.025896] device hsr_slave_0 left promiscuous mode [ 332.074094] team0 (unregistering): Port device team_slave_1 removed [ 332.098368] team0 (unregistering): Port device team_slave_0 removed [ 332.123975] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 332.194736] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 332.293634] bond0 (unregistering): Released all slaves [ 334.660341] IPVS: ftp: loaded support on port[0] = 21 [ 334.983414] chnl_net:caif_netlink_parms(): no params data found [ 335.018492] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.025113] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.032259] device bridge_slave_0 entered promiscuous mode [ 335.039074] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.045967] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.053405] device bridge_slave_1 entered promiscuous mode [ 335.073809] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 335.083086] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 335.103632] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 335.111279] team0: Port device team_slave_0 added [ 335.116875] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 335.125294] team0: Port device team_slave_1 added [ 335.130970] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 335.138418] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 335.202754] device hsr_slave_0 entered promiscuous mode [ 335.240437] device hsr_slave_1 entered promiscuous mode [ 335.290932] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 335.298030] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 335.312363] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.318761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 335.325523] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.331965] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.364425] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 335.370902] 8021q: adding VLAN 0 to HW filter on device bond0 [ 335.379358] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 335.392712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 335.400935] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.407790] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.417602] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 335.424642] 8021q: adding VLAN 0 to HW filter on device team0 [ 335.433619] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 335.441397] bridge0: port 1(bridge_slave_0) entered blocking state [ 335.447779] bridge0: port 1(bridge_slave_0) entered forwarding state [ 335.462003] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 335.469700] bridge0: port 2(bridge_slave_1) entered blocking state [ 335.476149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 335.486362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 335.495209] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 335.504842] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 335.520540] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 335.530637] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 335.541742] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 335.548202] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 335.556516] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 335.565075] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 335.577822] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 335.588920] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 335.970643] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:51:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:51:01 executing program 2: clone(0x2302001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x7fffffff, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40000, 0x0) write$capi20_data(r1, &(0x7f0000000140)={{0x10, 0x80000000, 0x4, 0x81, 0x42f, 0x8}, 0xbf, "5f1997ad0b7c09e29a7e206cc0b56e8e8acc7fc91440d5f518b4432567c826bccc5df0179b000318c525d7403d9c1c697815e8803697475858fb1f6807ae0841de000b4ad35c4a69457dc1f06127073c27dc3e3ad55e57511147723c3858c38c038efde9d3db44502b08cf2b355ff933c47b65afdc799d8b631394792e472b3929af4dbef655750d5eb79155b0c3d9428f3a6f78afd34e484babb568977104ad9f9b70576b38eaef1275fe52ae273b1751bce20ad2d4d1b641598cf5a75600"}, 0xd1) tkill(r0, 0x1000000018) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0xb, 0x0, 0xca}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 17:51:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x84000, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x28, &(0x7f0000000100)}, 0x10) renameat2(r0, &(0x7f0000000240)='./file0\x00', r0, &(0x7f0000000280)='./file0\x00', 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:01 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="85000000290000ef9c000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) r1 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x9, 0x40802) ioctl$VT_WAITACTIVE(r1, 0x5607) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:01 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000)={0x9, 0x75c5}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x3, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) 17:51:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:51:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x30, r0, 0x0) r1 = userfaultfd(0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x18080, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={0x0}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000001c0)={r3, @in6={{0xa, 0x4e22, 0xfffffffffffff18a, @mcast2, 0xffff}}}, &(0x7f0000000280)=0x84) io_setup(0x9, &(0x7f00000000c0)) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x20000, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r4, 0x8942, &(0x7f0000000040)={'veth1_to_bond:\x00', 0x0}) close(r4) close(r1) 17:51:01 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x2, 0x0, [0x0, 0x0]}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) mq_getsetattr(r1, &(0x7f00000002c0)={0x100000001, 0x1, 0x100, 0x5, 0x81, 0x100, 0x3, 0x1}, &(0x7f0000000300)) fcntl$dupfd(r1, 0x406, r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x400000000001, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}}, 0xfffffffffffffe97) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) bind$inet(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f00000009c0)={0x5, &(0x7f0000000980)=[{}, {}, {}, {}, {}]}) r5 = dup(r0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/create\x00', 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x2, 0x478, [0x200004c0, 0x0, 0x0, 0x200008d8, 0x20000908], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=ANY=[@ANYBLOB="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"/1144]}, 0x4f0) 17:51:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000f) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$revoke(0x3, r2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]}, 0x381) 17:51:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:51:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x20000, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="85000000290000009c000000000022009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000100), &(0x7f0000000200)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x4, 0x800000000000b) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:51:02 executing program 2: r0 = socket$inet(0x10, 0x80802, 0x6) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="1b0000001200030207fffd946fa283080700020085000000000000", 0x1b}], 0x1}, 0x0) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e24, @remote}, 0x10) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 17:51:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd309, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000002900"/24], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) [ 337.107914] audit: type=1804 audit(1556473862.127:70): pid=10529 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir164936792/syzkaller.M5Onsc/157/memory.events" dev="sda1" ino=17042 res=1 17:51:02 executing program 1: epoll_create1(0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000280)={0x6, 0x800, 0x9, 0x1, 0x1000, 0xffffffffffffffff}) pwrite64(r0, &(0x7f00000004c0)="08eea43933bf34585546921fd2988f9c02ec6ce568c4b115f34e4381627239eff8adba257848557826f1dc2a13518bbc27a475aa61b42854c526ff8d120c50d28fc6d6cb21c3c9a02af5eddbd53f7d5616a5f6fa8e4a3d3eb8191baed4541a9aef8fbb4fa8863f57674b76e17d", 0x6d, 0x0) syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="0000008000000000d9bf606c7b009e000000000000009500c4e914c40abf20e960959712b099614eb2022681c47be797fce75926985f5034fc31cbfab975d4f451ced35dcad91c6bdeb0f7dee2a753bb887813c6bde763f63f55e8f8c1"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) 17:51:02 executing program 2: r0 = socket(0x1e, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'hwsim0\x00', 0x100}) 17:51:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="850000fe60aa2dae1000290000009c0000f8ffffffff9400000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000000)='eql\x00') r2 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x10801, 0x0) getresuid(&(0x7f0000000080), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r3, &(0x7f0000000440)={0xa0, 0x19, 0x1, {0x480, {0x14, 0x3}, 0x8, r4, r5, 0x3, 0x7, 0x77, 0xc26, 0x5, 0x3000000, 0xffffffffffffff69, 0x9, 0x1ff, 0x800, 0x1, 0x546, 0x0, 0x8, 0x8}}, 0xa0) [ 337.461206] device bridge_slave_1 left promiscuous mode [ 337.468159] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.542106] device bridge_slave_0 left promiscuous mode [ 337.561085] bridge0: port 1(bridge_slave_0) entered disabled state 17:51:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x408002, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000200)=""/79, &(0x7f0000000100)=0x4f) 17:51:02 executing program 5: fstat(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000004c0)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x8000, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e24,dfltuid=', @ANYRESHEX=r0, @ANYBLOB="2c74696d656f75743d307830303030303030304b781cdee7473f93165634f9f730303030303030302c72713d30783030303030312c75", @ANYRESDEC=r2, @ANYBLOB='L\x00']) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000300)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000680)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000780)={0x0, 0x8}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r4, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r5 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x2, 0x400) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000400)={0x0}, &(0x7f00000008c0)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000002080)={0x0}, &(0x7f00000020c0)=0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002140)={0xffffffffffffffff, r3, 0x0, 0x6, &(0x7f0000002100)='user\'\x00'}, 0x30) r9 = fcntl$getown(r4, 0x9) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000004780)=0x0) r11 = getpgrp(0x0) r12 = getpid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000047c0)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004840)={0x0, r3, 0x0, 0xa, &(0x7f0000004800)='syzkaller\x00'}, 0x30) r15 = getpgid(0xffffffffffffffff) ioctl$TIOCGSID(r3, 0x5429, &(0x7f00000057c0)=0x0) r17 = fcntl$getown(r3, 0x9) r18 = getpgid(0xffffffffffffffff) sendmmsg$unix(r5, &(0x7f0000005900)=[{&(0x7f0000000340)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000003c0)=[{&(0x7f00000007c0)="188eedc7cf15f6d370a2ab4a638f3b48193d8e678e902d28863e827c0c7b1dc7258c0a1395a947a84a6db5b839eb5f7469078d80871373b679ae71e8f67b33f50f97ec8765c2c206fce43d145c555ea6299976b99550f639b617c204080b8425d03282911130df13ff85e88d7712ba81c5ce4b6a8ab269d861e4c67bf0dda0a696e0317bfd95588cb54beee71d35b8199a2470fdf7ba1bb350451e169a17459a1edb02b4924d6eebdf5bfc5412f701c114fb9a0d8e746ce573c8deeee44b358837bb091d0bb390d67aa1d74aa732cec5347a4e7cec2cc2f80784a68cb1aa20d887fc16467aeb5cf7a8223a4de67df027", 0xf0}], 0x1, &(0x7f0000000900)=[@cred={0x20, 0x1, 0x2, r6, r0, r1}], 0x20, 0x4000000}, {&(0x7f0000000940)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001fc0)=[{&(0x7f00000009c0)="9aea6005f812fb0d89b5302970d862bc9e7fe6d013b9d7e71eb4272f02579d06097aaf427a4335eb836918a2cd39c3665282f1e29aac1d184c4b4773d06fb088a182701552112e002b8317a138d94d1ed946a4b79939bec20ba3578ce30596e28fb3456aa2417bdc0150c38f41fab247be3e9d", 0x73}, {&(0x7f0000000a40)="2664a77a370f253f5893814e4692c0d4f084bc14cf35e836dbfc02017947f5a1ad1fb3a8983b96e90e7ad72acc9cd88d1297fce121f9144ff40ab5889c30c6e1adedce6fbfb7e343b1755c3e28bda88a", 0x50}, {&(0x7f0000000ac0)="eaa508424e03c43351a47b1dc07f8ba6a83c09f9b493b913ece781313f7b8f14c54491f43156645ddcbe8ae0be90c895269e43a747283c6497bdc6801b034ff25082238701c7258eb1e398ba59142984d2c2f0a77dad0003d751613bb19783ebbfc096f2a34c55e1ecba42ff3f7725031156df71e32f96d7f42e3c4529e7653289d9af01619dd80fe005ec21ce2ff525b88e2a37e220f6", 0x97}, {&(0x7f0000000b80)="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", 0xfc}, {&(0x7f0000000c80)="e6fefe1cdbb8ab56e2ff039a9fbf764e180f15c76db8e75342332fb0fc82c60b809f709609f9db033b0b85b96a0f3b3684165e8a86fb18d6b4c16055fed713baae635cc9cb84996b91cf399537ef36a03f83407dca66d23d0dd7085c2be29a2127938a08912f09f16d5497a9f266bf5d", 0x70}, {&(0x7f0000000d00)="73604141be0205fc0731e0b40c341c1347448dad80a8d590768cbff11cd642993b3474e938ddd932a7e7f8a3f978a263781471e4e8c9e4b292b277b57b2f7beadeff5bc5bdc7585ee249655f6ca6e6d477bed3c67cf7a917a137920f712d09f0fec3efe59cb7835201a70253ec9ba7430a460dfc3cd2ef2c9564f529543c388b36757df01712440649a36ecbfa0ec16b4cda541b14c596bda17463eaa609a0581346608a6d468a7cb09aa296c7af53c0ac4b5878a7ea34d77c05de6f814e80dee8bc0d0b31e3adefb44f42036972ca4045f0b884", 0xd4}, {&(0x7f0000000e00)="22fe2e0db719a6cf318bbef13d2796c8b1598b9f3632fc3008dab0f679031521cd81a98720bf4e88b1ff7a7cc9463c6258556236083c107ffd8340ee8232afa77a32987a79c457cfe76c5d997c44e0f0eea5658847da23964af56a19f6dd3ba322858ec3b4944105579130414ff785c08e5a1372782d007c7784a5864ea57a76f5bc480e07bcabfea7a4106f46b2d69139d490da215d69bb1eb23f639128e54ff1737ad4de1dc30124b70e0dddcb9f6f97eec243f4", 0xb5}, {&(0x7f0000000ec0)="4a188b728d65324318106be7570a4487eca728b14482dd630a1b604215d6d788d8a250a60e140cb5776c179fbc0dcb3f0abae3449973a32a346fc89c90c74ef42cc7b335dca8f10414f8e98c8944b9bb55a310835a93ad5f04f736f17e9e18a5ec0c436a471f269962501802ee4e4112f87692974abb3744d2ca047093a15ebf1fbaf955800452c11bc3649e6c8d526e0a837e58c436f30ffc7909ac352828b498b3f1f6050d141a8625949b29875e6413155b3d5604b544004d6829e4db27cb0de8c13a33bc4c1c6a80c0d3d08abcd4f0d7c5e64551aa777d269dfc1a3cd8be46ec31bef0ef886707c59382f7f89f03f65227289c6e0218f6d96c1dce57c026793929f3f5a6af5101496578bf2359484c4a74513055bd90266176ca53fef118feaa7bef2e3b2cf50541ae70b342dfc8879c913543c5985eb71f6f6b8c58b40e4a50c7e0816b62d0bf9864f2f1ccffd92aa244a44cefedf84eb766b587980525072ff82b971f2a6b01795a2097873e70b9336dced78ea9a34afcf3afc99da202be43ce0b3f35f00ec0d7a974f1e1223da7dcc7058764b241766b056807de5793b3fb3b034b4aeb160d2b86c1c5dbf7594057a42e1e9bd5c57411c5cbce25b7673fc40cd5416b2582c6a9d589e93364d8cb88658a816f1fa571ccb7c80fe00ab95830c64819f4f825aa16a117c1720bc02ba385ad03d1e0760d6d4edb5c1b8feaf8616c1d06d812249e859d21b1105c18b8aa7b78ea7a673eab15bbdea5bfa0d0ccf2d0c3f6abcbb34d6e707e86fffd98bd0f1ac1a105cd66c9961cd0cd1dfdfe7ac6ff235e29158ad231f34d894f5ad8c6585da5ab20daf9be82dc58d04f3a4af2b614d2097e330509b99fbebfcc1ff2cc30e03cae7583358761bb6ff66f0f171209da7be2e343210f629cb0bc95ddadbca288687ee25f247e8974393b40d54e045a11a4ad7869c63960f88facc099ac36c47e9597f8a9f00e441c045fde81e46683c1ec4e453538168d14b31a0f38afddd25b579178b0f74dcb19682a47f28393c5dde68fd3313b68d66a2456624e153dd7898b7e0d03f59eb3c2d63fe926a4731c9a8abb17eb669ca2097763bb7fa3ff549fc221bb1c127206ae82fcd9dc6a017ae5ae353797d1bf6ce88b69629490a792d81514a12249daea6a8aba5fbd4484eece0ab1296cd52b5d1814c86c20f451a1ef9b9161410b633f4fc1a44976d312f04c534c5b71dc4324fb9b7c2997879466074427c70e59677f84f3bdb0e51e9d471f0e78db6a887635d16eb2d63797b3a43f1d417b42fa407ecd290871a428fd838209d3e0b31fbde27b65063b1900f049fe5e939b71b77ea0157f28b2e5a1dc2ef016b5c264aa696865b48c9e4e3a17d352997af7e88035093ddd51bc11f7f3acdd9b8c818770cff63f0b494c8599605aca644a4115a8a66e3f7203adf5021078dad4d56a231120257488b2374266fb184bb82691dd6078626dd89d1a22bf670c29e02e473ee3bc478f97b561b1a7f26704661d54dc099e7634f86b741cecc16ddaf20a0cc6cc5f7b012bfcc61fe8e70a9cd1db91a079437a38742f57571956bdbef573a485e091016001d101622e7e8d6837cdb3991df1fe03a15b1cf96479652afdeff37b5bc7d7fd0bf2bb49a22eb709c0144541331e93059e8cb0d5b15eb3c79e465606152c33cc5678624a6b815b292e29aeda71a19a3b4cb440850cb6051c08ddc6a07a701d5fd44c48a4b2d1bd6a9e8b39f7eb0c24d85b239cb56044f14f357dbd18f7e2d2b9fa732f69ce997b145b7eeca606fa44307b4b1f9b8af471fe78ddb4074f089efeeb339d5a2bc68f0e72cd7f5b31563c2ad466331ba9eabc0499fe5cc9f4ed8c1587e7d5ca0091c363bb59de3f8baed6b0badfa8e5446dcf4d943a4f8f45df099b8b5aba8959c44bf859ff0e01658021524015236a9305829457e8c7f73d1c4df29c30affa576df580e0b090b7f8e63f835ddaad6b63a8643b9d6e65845989da8a6c03efaca1f7527b3e9f123c55463262b76aafffcd90fcc2baea801b6d9036a7ce0bada426534d4f59ff88626a547bf571a0ef365c5bcdaf75899b8a1d959d35b7754cc81a73be4a43d0eb2008f9f4111d85316641faf1cce379f6c16d21dd938a325a336905840f90b0bfb85976b0fbc26b175767521c85e73c310b63e976a936b6651f8cd3f2d092134f6b86ef1d1e269e193e3659b6a6c4343229c49abbf1b672b46e337d3c557f91e6dcfffd2b6a6744f9ccbeac6e5ef03ce14f0f82eee2f9076441459f383398d54ff735b31e7b9e384fbc9ad29f20cec42320228bf5aa0577578965ac503bbbe8c5286f9f89258fb6526e626397d5ae28ee74733f76d739be8c555dcaadca58f24b6e22d0bed2f6e020dc6e0fd244854b65df9bd1475e5f7e8a98e7d82ccd9e4c8bfa5fe7c9abd62662c6fae31242c2fd8569f36bb47dc772021db5e9c3047d2923b87c1c983e91d46fb1417f9dbc3a364b47e7e0f7ff03d8ced394f903b2e029ba29df00267b203a070c911ccc2356e7b6d5e48d42077325b582d8c37b4aae9616a2adfd24c25e773c71d592effbad58b4c9dca44ff26a6f43cb10f3c45532fd2b1d35e9721714522815b325cc71d23caadebfd1b725dd96aec76639c1cadcdce2e74953b2692d18a2ef36b69eb0114cdd9e00d4b20aae3b937b832ae111ed4d1f55765fb5c9103993017422b0ea3918b2ba15fcb4110d6581520025c7522f8c677a2349ef30b6e1a3d1c32c184105a881904e2b6b492db16a7aa0b9082c43934dcb60bd24887382e81d9d696d83b66643c816acd965db8521b934f063f2f353b47d5033ef125875dd66c619246173e2ad7d4156a60542808011a894fadb5b4d73a08d1a42af6ab3d89c6491bcbe9c604427ba16a8f587cddf2d5fde6b2623df4a202a5f82b3a7625b11dda572f0d44a2033384a33dc38aa3f56e594dd33cb9978bdc3d1b56d779cd585c501c0a7ce28be993f137dfd4a6f86921b38355d2292f4035470cc7a90f5ed151982bfa8060ee846d0c0fce92093372fc2298730c460b8638e1ef3d9a9c77acad53ad0a5452077e4ef32506c3cc5a8c67eb0772f7b1ff4b1b740661c5506313fff6e83b78f10dc76fd112ce9381b23e871fb60b01755a0b7446da70a827c6e044c3fd9d6f066b36f5655672900cb0c4ec9eea4286c7c8eb367a0d1691c2ef4831dcbc6121be2c728bdc60a29d0e4ca3b3074e47d53be50d04dff299de6625cef207ad87f27c12d0f72d579a12df44bbf74905e5b0a285ba30f84c17e1be993da1171212e24a8483e8cdfdd4a26aa8011fba1aaef19f8029c4fd189c4b1a85b81d58250176a16e0609dbbd1b946456f6a7ec9b3a0d089529e9a658f9d38517b17aee75b8b44d967d8909777409f4678c6d895cc6d3f1cb19544f5835a605d050dc1b2243489792a9408de105e48ec938bbe998f02a3713dacce624964bf65db5bec4a224a6c25feb4826f6643b203ce9879c038609471f826c9b07b5902da0a599f0fac71fdf4f4a08cf678564515f8f12f2d50c72310bb2ace0b1f786293cd80707ad8dd401e36a4b01cb1dfce9d81f4a8e41ef59f825deb72acf7c00b74b68d6748b5e925d44e9ffcb849564e50ddfda829a61c12748c8dcc965dec231612e928e11415c24ef07150e9ea9d043ca3c7ca75641582d82698717bf135bf0310472a1f021dd1c77544f3f6d6cb4531ba0415d05eab64ddb76e7be06a3b6c1ee2d3fb3b88500015b10cb5425b166a187fdaf61a0e7f6b8ffa9138124a1ea3fb58556b4b86a1b75f50e9e077d2bc05a0b4eaa19ee6f0cd0136ed66bd4b88fa1d71598c7e415e2a620a7dc04b6094d345f7f69421a745dc612952244feaf639a019e81a38693f6e7cb7c8e6c6999ced390acd83263f70d1b55882be7fcf211dc0dfcd2cffd396e79af4ab5c1e785c3d0a5a4b31e8aa53fd35d0eee5163807e600dd80632b9cad067bf95afd9e962fdc2e5d2889c8f9cd3fc58c920ca3c2cbd3bc55293d82ff9782c6e3e2e334c05eb83064dcd7cd0a809150025812225206cbf9bfc19391877ff84a01e35f7ca5c21a8a3e40bb0f9d56db2298c2441c93bd2ea221db7eee4f856d92ec2a44f4819830b8dd56645a9793785cb9c09177c17600fef2914c18493228b3cd8670165d71c8240c53f7153a9f99bafc9fba693c83646122896df2b65006ae62d3a8377792ce6a88f022401e12e87d01a5e34fe898e64f5da6def0adec1e443ab9e99b90893db166f27de7a6a85b1f11fbbe6921faf9f247cc7fa75bc9e9fb4a6161cfde180db14b9d66bb0276072547c30da68337c11966469654321679fbea525e4b5aea0ab49856419c8c301ffea1c30a78f8980ae688fc373539f6c13366188984fa08e0cbae84578d4a23a73ef0b2ee02ac22f185b0d457b0ab4a9fc7f5b274c30121a44ded67a5b187260255357390573cb036d117a68971f8c32b2ac1947b8d72e10e0b9fca04250a62f9f91fb9c0a2e1a5ae42a20638786f59e169ce0aaa7b14c5b2a3c5bd06b02ecb0b4e4c3e02624b1c74d86b3773fa330c670efeef95913581b51f65385acb9e1b2ebe1ddeb41372e4b0b03e842cab911f289a89b6e73e6553b0652a54c0ec6f187b19d673cc34ba33859507d13d03885e08ab09f2739125269baddde96b669728cb20e9b01ead57d8367f0ad81ba81a2dd912a2070e6d3a577db80ffa683e990f77a24e0fa24842938b249db38faadbfaacd7c78889a415e5d214b30c2377a60bab1ab6259759a617c9c098da842b2432be9ce94dd0665ee92d4cd1e1bc0104a8806fb5dac9accbe72282cd5193425f8da2fbb03211278619de93f9a16e823e3889b7bdce383e58459e6335dc4c04bc8c29dddb02ed80009ad5121f7ad342f901aae4c1e02cfc82e0bf7264594e8d3026160c32acbaa72465a6b319274610500e2fffd1430c294f6423d6fae426a9500bad1be861d235aba39d8e06a2dfc33e097be15a1b2da8b46551a3f7766c0a1e97cc48a0478929a5835791e8fee778a32118044bc45cb0148a88bd374adb21b69ed72df492e7963f2543be6f2d1939bb03aadab78557f70620a6da5eedea152ab854b25c38ab32d27f45f1161b9a3553371abed286f2aa9e0fd819e133b37e409007f67b17f47571b4c9145dff9686a22b57055ff7f4549e1f0393936735ef187da46bc213252397d69cbad90eed1f727e8c44bebbab09bf91ff679030d6a878006befcf4653334639114ce88d6a962764cb1a8fca0599a3f11f86e7762a7f8d98c89f9735a42d1d272dacda0a0bd6b4327c4b7fc303f7575a36be5aa3983fd37b38f0944cd07f0a5d70c3a0fe0a300c4904cdd5a903b4db59e53f943e1b4e1c207349ec0496426e67091760fd279ad62ae61987a2a9d4451a5cc3c85cf91a840b3017f4e1569231caa9eef591157a3de55df40ba8a55a7aefd681429cd8aa58e39d34919fc3bc4bb686d02e1fda5a2da6d12a25286c656657144cc3531e22935be323b1461718d139bdb6034c994ba60bb0f1a69ac44c4ea733d3ed79a7b0b37b3efa0d6e652eab1cd8128efba5cfff8f20f37a645c67b722fa396e68b9c81a1f5554cc485fc0ef91a6b373b3a87cb4241b211467a0f94a0ff9a9266db88ec8e501b56760316383d03ef067a4772e280d077e7960e26f153faafbfd6d4c6a63562d2c7e91ea8a1136ee2f5fc826d6775c32f6bfcd8b29c5a8c1a69fed02c7bd3526e0cfc22a044eb16c05b968811450c6043429180119232dd96d70af8b", 0x1000}, {&(0x7f0000001ec0)="3618c5424ace3aebce76ea0e6d4929b30b015a010aa5f655a0a4d21c3b6685eb014655dede51fd177edc23225f17b4d4c5f84fbe4878229d5a7d479b2af9f1f9ef7172ae5212e9bde8fd4babcbc243ac602ee80df62ba259f7f500de6e50ea7d39a4838d3004719166a30106b362b35e56f58064666b4f51f637007910d08753427d2b25972ee7fc141054089e0d0035de28dabef3fed0c8ab87e72731e80dbb1a963909dd11ad142457a8bcf35aba20eb61ac5bb4cf838664d1589d938faccc79ca929e837a45b1fa830aeb8dbfe9ef9aece8299ba91b119e7e6036719fd7e34c023d1200d162d6f5a9330a", 0xec}], 0x9, &(0x7f0000002180)=[@rights={0x30, 0x1, 0x1, [r3, r3, r4, r4, r3, r3, r4, r4]}, @rights={0x20, 0x1, 0x1, [r4, r4, r3]}, @rights={0x20, 0x1, 0x1, [r4, r4, r3]}, @cred={0x20, 0x1, 0x2, r7, r0, r1}, @cred={0x20, 0x1, 0x2, r8, r0, r1}], 0xb0, 0x4000}, {&(0x7f0000002240)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000003380)=[{&(0x7f00000022c0)="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", 0x1000}, {&(0x7f00000032c0)="b2790b7ce3e20b6afe002175969c79f2c1f9633faf55649f4fc8a2354acaddb1d52b5805f8089d0cc3d5b861c9a7c661b8bf922773dfea81efa232a218d2bc4d1fff59f1", 0x44}, {&(0x7f0000003340)="279b695b0233006bfe0d1f44d18855a9893a600a4d86eefd1c5df5753ad7687599931c8a193994474e4d0e3891ed1325431155c593db10b0daabba", 0x3b}], 0x3, &(0x7f00000033c0)=[@cred={0x20, 0x1, 0x2, r9, r0, r1}], 0x20}, {&(0x7f0000003400)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004700)=[{&(0x7f0000003480)="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", 0x1000}, {&(0x7f0000004480)="6952f0cef71fb89d4f9b68d535846b073af0bb7e876b70f2833b9594f217b867e83d0b7d14895cf1c7f4dde73502a030cc9d7ebcc3de246c6935ee1761bb80ad6d076d9f2d8552c692a8486a0c49e9030a276556c6d22f0a1b8fb165075ca294137bd22fb75abfdfa475ed73166bf5faa640d20f955b2e62f8db40d481289d62d64e1469e766b47f09c9712e35bf56d1e8e250ea062114704722f692a0204eea6e6dadcf147d5fe0149f8190e4751d767294264d5e7d392289f05204527d6cab56fa4024a8d7347774b0d336c5668a9251eef18c15f1100426063b72017432d75f4702f078fdbe", 0xe7}, {&(0x7f0000004580)="8b0d98eda6", 0x5}, {&(0x7f00000045c0)="54ecfafb8be93ce418c85b676f001ec9ec0049a5c23b42d46c535dc329ac68c55667c0aff049be3abd360d383c718b91e8ad6a2b6580acf31feeb437cdda5c3fd34afbc1ae0b996fa07f400b946b9bfc3899eae5fe672abb5c2236cc088e1e43f12facf1a36bbf40c4282f7bd60308aa7d72e285c1c6a8e035cd55bcca335774888a7193fc75a61fbf748bc25702a292dbfe6b2f8e1e11bbab0ecd", 0x9b}, {&(0x7f0000004680)="e59d69a27ca3de4c536b5a376c24b2c646e9c040cb74fd1614976e13f2b8938e246e3d6e04d7d442db2ae961c6ce12f870ffe3ba9945fe5d4f998edb8bb4775880d44d3932f4508314d9d1e83a", 0x4d}], 0x5, &(0x7f0000004880)=[@cred={0x20, 0x1, 0x2, r10, r0, r1}, @cred={0x20, 0x1, 0x2, r11, r0, r1}, @rights={0x20, 0x1, 0x1, [r3, r3, r4]}, @rights={0x30, 0x1, 0x1, [r4, r3, r3, r3, r3, r3, r3]}, @cred={0x20, 0x1, 0x2, r12, r2, r1}, @cred={0x20, 0x1, 0x2, r13, r2, r1}, @cred={0x20, 0x1, 0x2, r14, r0, r1}], 0xf0, 0x8800}, {&(0x7f0000004980)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000004d40)=[{&(0x7f0000004a00)="b779b7c99dffcdbcc9b939430f7915c7a7f739906d100329164ea6943d349fe7745a4d850706a890b3be64ee6ffe32890fc9df48d28f3be8ff09f29f5a2975023f65efaaa8802d6050949f357f97fbd3bbbd9946cd5b67023be5779d6fcc680ce6b11405d29e5bee92841744865690f81578bb7b2138dfdbf763486d3e3c700c7e456fb478f22427b49d0f3412e6d1156ec3d8e71092683eb03c961dcd9cf412ea65d2b991645298cc1d363876d2983fad4d2dc35f2332e90b0ea2db70932f43d32537", 0xc3}, {&(0x7f0000004b00)="5fb2e880f244aded5ec3d91e320a0447010b988e20d8ba3884dbf8c6b3b02208d9d2dd44b14682e988", 0x29}, {&(0x7f0000004b40)="b1bac405e358592f676b1f220cd3c127f9db93523239c8a41c92810f89c5395d98773d29c224be6c4c14", 0x2a}, {&(0x7f0000004b80)="a4e5b9b2e49f3b880577fceb1036bad87e34c8c5a8bc742b5a57faa8242e3b7330a024604e5bc447cf772377300e5e0049451b90d90c6f4f3f59c19483ef18dcf9310b5628225910df5abcb9c4d6a2c1b890fa8be5ee0c80317030091055fbf512b567b7aa96bb4c7960eaee5d65e19cc15ca75e0b6cbbcc4631c2cf48b1ac7f05bf618ce1d2a622f7bb0d86bbada60b31771d01abaef66485c11f1777d75ee3e9f4eefd642e0743", 0xa8}, {&(0x7f0000004c40)="5c664dbe3d11adfc8f9158ad65cd26c8a5de1b3773e5b7a966690cd3f71fd8c95b73270ae8a8d94503ba3f90288e44be54c430d14d17be4052c8b4719f66694df2906ffd748418c4656e02786056ed39070f2e95dd0e89a3e29f6cb556b5495e8c9ab31e0b449c39b984f16989ae73cd4e28a85e8942", 0x76}, {&(0x7f0000004cc0)="9b0f3eca521746a6e8aa4136f34a46ea5dc4ca59947781191626d722b7c2fce42dd8d92b18f99304a3fc05df84f16a9bc4392582262e0150f7f975893613dd7f93ec979d34efd51e790f888505db95b0893ad2a34c83538a4886dbe3db274c52068c991c1d", 0x65}], 0x6, 0x0, 0x0, 0x840}, {&(0x7f0000004dc0)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000004f40)=[{&(0x7f0000004e40)="b3f2e38b22d44a09e5f609d9649ecd6756f862b069", 0x15}, {&(0x7f0000004e80)="e33b9932e49aa3becabc571cb1", 0xd}, {&(0x7f0000004ec0)="d4196a36fcb8c5ec4ce1a98f9177fb7511a75c6ee6290f1c1dd20dabfe951e9228f5ab7bf6ca96c810fb64ec04b2ebe75bab740b2863249f4048a94fe59198622a48d6df7eb4fc8d58b72dbcaee7e76ec0ee44693647d337fa040a50eadb8dcb3c67f32513d111302ac46ca0e42aa0f29624827fb1c60ab615f81b44", 0x7c}], 0x3, &(0x7f0000004f80)=[@cred={0x20, 0x1, 0x2, r15, r0, r1}], 0x20, 0x8004}, {&(0x7f0000004fc0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000005240)=[{&(0x7f0000005040)="25293ce30c4e82a21a6ffb8498a7862529f6b7255e75dbd975de6f54e767bca6b1461982cab34d19021a96f7809849ce43ec6e7111e0ca3a562713eab99ac3790c5f195a00daea874425888f4a7b3f7f2663b5271dc351c306dc3a7eae6445f20c433571631d1d6cccb4e32a94cf1b4d94ef0f57ac8b8317ea15c3f3cd2879b205e9615132ba2e1d4521d072762162b1ee4539e13e3ffe2f51117cbe99ec707210609325babade8d98b89fdd5e51bbe0d3490e0a2a6bb659", 0xb8}, {&(0x7f0000005100)="e944a25f47e804bf68989c40580071750f21c37f3b2dbc80b224f6104df15b3fa2423003be2700f7fbe1d7ad50474811e05b652be945fff62841a589709ec77142bae53b14e2e7", 0x47}, {&(0x7f0000005180)="7bd26a093bd580a48eea76036b1499a8d7a816199c8911aa70ca3de825dae5fe38a1f4d308e31351ec4740971ce2ddbbf0367448046a8ef0f6217fe1216c015ea87eff2a2b458cfa411fc854a110a395d37e360a97afd015255f1ba773b6bcb4b7df6e9ed8d4895e5ae580b565eb90af9cc57c49ff5ed9b1a9830d302012e3a1b6707a20c47961c0347f7114b55380ee3f9d6ab778", 0x95}], 0x3, 0x0, 0x0, 0x1}, {&(0x7f0000005280)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000005740)=[{&(0x7f0000005300)="8638511b9ff10b2130cc85e9079ec9ec7a6e8eed7f47a329bc94ab05fc1b117f0cb35aacd508725480f7ebcd0b9ad833c104c7e57ca1124b86205823d1daf49fcf89baebe3aedfe34f979c94b17f58b3935f2ff395ead2b60de1f063c3db4354ea0fff8183cb8e158711f7ec88ed9b8a5ba3e391478c92499fdcca4eadaf24375a0e26", 0x83}, {&(0x7f00000053c0)="fd3c98368b7918b02932f6950d7e3b6b1ddd7c1b30976216f140c2eadf7ebaa6a909759a742dc22492417dfa45f290851cf2177599a6051c48789c4a88115e9815328f90554d0e2cbbf11a0197c6cfe7b543fdb6c896e0f6df71fb78c6fa9f9124c46cf1c6a133ae32fb84ae8bd02e10545bd8c6e18f3f0850e656b41382be321504b77e1af4d506bc99c9794594511154283e9c993acc313399", 0x9a}, {&(0x7f0000005480)="7efdd6", 0x3}, {&(0x7f00000054c0)="d37ec0c8efe93af8bfb8430e263b2c839d3d0d9d7e11fa9572f20d1e5edf5149b6716a9f9074e00f42991b7f096999c1dc3054348edeaa6f73337801a0143d6c666216abac1fe6b332f80441ec642a55e0116861980e5f0996d09f12fab08959edce268e4ff2553a1835264a3e7bd4eae97dd38bf90b8f5edfda0c7564adc267edb9f709a5d0d77cd7cdc7e32e3c24dcdfa4b00343c8202cf4feb0072a2ef49b2d8e352f17c6b843d932aeec43", 0xad}, {&(0x7f0000005580)="84635e30217da8385b98b3a8ada2a57971fecc006ee7d6927a5ae866a1efcc436b1cf2e7c0a8741b4d032de1d2a527d90fd1793f101e7645715b86387be6cce4261cf2c95e64177e492faa80e1c1f1eebbe69899a5e3dd1c15f92390e178aba027f443392ab01eb969d46e978f147ac9ed55b613089445e7b37bfc0460c49a646151f979d414fa19615e390c8a2a996547c637f3fd7b5919fd60b2c0a5cad0d2176c5e32bd2c2b990edfce0db340e42241ae1d033acbcf64d17c4d41244537a9b2119f0083efc2def50318d52921ca6b867e2f", 0xd3}, {&(0x7f0000005680)="9eee8dd270f6471abaa458517cd24df9bbe77b5851927244c436d3cc2c9d9fcd23c40f86453d9974ced0657c3be5544e20c6692c7648e9802f835efd7c0e5a54733d46d9d41fc68a1fc1a90961e2f2aea9c172f9148f10aa6566b799de167901256f604094b3fec4bc9c73b5d6958789bac0cd82ba1f4dad755d3a732a1e844f7f18160ffe923625bea8b651c68f7817de55e30f99b5b4a6e59c67c927f16c2634cc453a027eebeaed41ab7d94", 0xad}], 0x6, &(0x7f0000005800)=[@rights={0x30, 0x1, 0x1, [r3, r4, r3, r3, r3, r4, r4]}, @cred={0x20, 0x1, 0x2, r16, r0, r1}, @cred={0x20, 0x1, 0x2, r17, r2, r1}, @rights={0x28, 0x1, 0x1, [r4, r3, r3, r4, r4]}, @rights={0x18, 0x1, 0x1, [r4, r4]}, @cred={0x20, 0x1, 0x2, r18, r0, r1}], 0xd0, 0x880}], 0x8, 0x4000000) 17:51:02 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r2 = dup(r0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000020c0), &(0x7f0000002100)=0x4) r3 = request_key(&(0x7f0000000800)='logon\x00', &(0x7f0000000840)={'syz', 0x1}, &(0x7f0000000880)='\x00', 0xfffffffffffffffb) r4 = add_key$keyring(&(0x7f0000000900)='keyring\x00', &(0x7f00000008c0)={'syz', 0x0}, 0x0, 0x0, r3) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f00000007c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000780)={&(0x7f0000000540)={0x204, r5, 0x300, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xa0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x100, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa0df}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x49e0}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa92c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xddc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'rose0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x73c}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xcaad}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x11e}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}]}, 0x204}, 0x1, 0x0, 0x0, 0x8000}, 0x40040c1) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, r4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 337.742801] audit: type=1804 audit(1556473862.767:71): pid=10529 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir164936792/syzkaller.M5Onsc/157/memory.events" dev="sda1" ino=17042 res=1 17:51:02 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe604, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 337.858660] device hsr_slave_1 left promiscuous mode [ 337.898426] device hsr_slave_0 left promiscuous mode 17:51:02 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x7, 0x200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:03 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0x9, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x386) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xfffffffffffff51b, 0x80) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f0000000100)) [ 337.979137] team0 (unregistering): Port device team_slave_1 removed 17:51:03 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) write$smack_current(0xffffffffffffff9c, &(0x7f0000000040)='em1\x00', 0x4) [ 338.036628] team0 (unregistering): Port device team_slave_0 removed [ 338.066283] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 338.154816] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 338.364828] bond0 (unregistering): Released all slaves [ 341.320381] IPVS: ftp: loaded support on port[0] = 21 [ 341.648683] chnl_net:caif_netlink_parms(): no params data found [ 341.686689] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.693409] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.700661] device bridge_slave_0 entered promiscuous mode [ 341.707401] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.713887] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.721427] device bridge_slave_1 entered promiscuous mode [ 341.738982] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 341.748529] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 341.767892] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 341.776100] team0: Port device team_slave_0 added [ 341.781984] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 341.789189] team0: Port device team_slave_1 added [ 341.794628] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 341.802162] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 341.864149] device hsr_slave_0 entered promiscuous mode [ 341.900552] device hsr_slave_1 entered promiscuous mode [ 341.940817] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 341.947910] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 341.961473] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.967854] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.974529] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.980952] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.011975] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 342.018084] 8021q: adding VLAN 0 to HW filter on device bond0 [ 342.027312] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 342.036388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 342.044298] bridge0: port 1(bridge_slave_0) entered disabled state [ 342.051345] bridge0: port 2(bridge_slave_1) entered disabled state [ 342.061858] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 342.068002] 8021q: adding VLAN 0 to HW filter on device team0 [ 342.077135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 342.084926] bridge0: port 1(bridge_slave_0) entered blocking state [ 342.091310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 342.101352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 342.108915] bridge0: port 2(bridge_slave_1) entered blocking state [ 342.115316] bridge0: port 2(bridge_slave_1) entered forwarding state [ 342.132186] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 342.139841] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 342.156549] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 342.167144] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 342.177748] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 342.185118] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 342.192875] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 342.200967] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 342.208483] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 342.220722] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 342.231018] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 342.630591] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:51:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:51:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="85000000290000009c00000000"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x19, 0x147, &(0x7f0000000280)="01520adc5e2270ad27726a4e3783e0627bcb630f9c79551d4d", 0x0, 0x2}, 0xfffffffffffffdfe) 17:51:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0xe, 0xfcc6, &(0x7f0000000100)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm-monitor\x00', 0xc0, 0x0) sendto$ax25(r1, &(0x7f00000004c0)="4c44ad433a9911928a4efbd497677bd16ddd19598978aaf79d701555467f0a973bc94abd604cd38af4d2d6b42d4a1a0aa46263d0839a835598cd83a32c54253429d7a4ad81503bb3b6be999b", 0xffffffffffffff7b, 0x0, &(0x7f0000000540)={{0x3, @null, 0x2}, [@null, @null, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000300)={0x4, {0x0, 0x1ff, 0x8, 0xfffffffffffffffc}}) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x8df8}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000240)={r3, 0x7ff}, &(0x7f0000000280)=0x8) setsockopt$RXRPC_SECURITY_KEYRING(r2, 0x110, 0x2, &(0x7f00000005c0)='syzkaller\x00', 0xa) 17:51:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000000000"]}, 0x208) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000000)={0x0, 0x6000000000000000}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000080)={r3, 0xfff}, &(0x7f0000000280)=0x8) 17:51:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe604, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) r3 = open(&(0x7f0000000280)='./file0\x00', 0x40, 0x40) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f00000002c0)={0x916, 0x0, 0x10000, 0x6}) ioctl$DRM_IOCTL_SG_FREE(r3, 0x40106439, &(0x7f0000000380)={0x100000000, r4}) r5 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x9, 0x10d000) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r5, 0x5386, &(0x7f0000000080)) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x3, 0x80002) 17:51:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x80, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x5, 0x5, 0x3ff}}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000290000009c0000000000000095000000000000006009c2076273649423b5f54e8c7e08c206b28782e7cf3decf51914b88ab0da172bd6cd67ba79420be60ad44a2f4feaf77f41c6e3abd22afe2630083ecfdddfe61218982879b4a761c7cb711f66"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz1\x00', {0x8, 0x6, 0xffffffffffff8000, 0x2}, 0x42, [0x0, 0x3, 0x4, 0x7f, 0x8, 0x6, 0xf51, 0x8, 0x1000, 0x5, 0x0, 0x10000, 0x9, 0x4, 0x401, 0xff, 0x2, 0x8, 0x1, 0x1, 0x37a2, 0x10001, 0x8, 0x7, 0x80000001, 0x36c, 0xffffffff, 0x100000001, 0x7, 0x1, 0xff, 0x4, 0x10001, 0x4, 0x1, 0x2, 0x12, 0x8, 0x1, 0x9, 0x1, 0x12ea, 0xb0, 0xfffffffffffffff7, 0x8, 0x3, 0x1, 0x6, 0x3, 0x4, 0x1, 0x401, 0x5, 0x7f, 0x6, 0x7fff, 0x8001, 0x100000000, 0x9, 0x7fff, 0x1f, 0x1, 0x20, 0xcf44], [0x0, 0x401, 0xfffffffffffffff8, 0xd435, 0xffffffffffffb79c, 0x0, 0x1f, 0xacd, 0x3, 0x9, 0x7f, 0x1ce, 0x7f, 0x4, 0x4, 0x0, 0x2, 0x1ff, 0x401, 0x0, 0x9, 0x3, 0x0, 0x7, 0x4, 0x4, 0x80000001, 0x1f, 0x3995, 0x2, 0x3, 0x101, 0x1ff, 0x1, 0x1059, 0x9, 0x8, 0x1ff, 0x9, 0x25d1, 0x5, 0x3, 0x200, 0x7, 0x67, 0x3, 0x80, 0x9, 0x7, 0xfa, 0x9, 0x5, 0x8, 0x10001, 0x3, 0x3f, 0x4, 0x7fffffff, 0x81, 0x9bbb, 0xff, 0x1, 0xc74, 0xa2c], [0xfffffffffffffffa, 0x2, 0x9, 0x2, 0x9, 0xff, 0xfffffffffffffffd, 0x3, 0x1, 0xffffffffffff333a, 0x5, 0x2, 0x6, 0x1, 0x63f8b661, 0xfffffffffffffff8, 0x6dc, 0xe86, 0x9e3c, 0x4, 0x4, 0x698, 0x40, 0x97, 0x80000001, 0x6, 0x8, 0xffffffff, 0x6, 0xffffffffffff6b9a, 0xfffffffffffffffd, 0x7, 0x80000000, 0x1, 0x4, 0x9, 0x8, 0x7, 0x51c5, 0x80, 0xae0e, 0x8, 0x5, 0x1, 0x3ff, 0x0, 0x6000000000000000, 0xb39, 0xed7, 0x7, 0x1, 0x7fff, 0x0, 0x1, 0x3, 0x9, 0x7fcc, 0x800, 0x28, 0x7c28, 0x7, 0x6, 0x9, 0x5], [0xc8ea, 0x0, 0x9, 0x33e, 0x3, 0x4, 0x20, 0x7, 0x3f, 0x400, 0x3cf, 0x6, 0x5, 0xfff, 0x5d3, 0x4, 0x3, 0x9, 0xffffffffffffff80, 0x1800000000000, 0x0, 0x7f, 0xcf, 0x2, 0x3, 0x3, 0x35c, 0x471, 0x2, 0x0, 0x8, 0xb29, 0xa6a, 0x6, 0x2, 0x1, 0x7, 0x40, 0x3, 0x1, 0x100000000000, 0x3, 0x6, 0x8bd, 0x3fe00, 0x1c, 0x6, 0x9, 0x4, 0xd1, 0x9, 0x8, 0x93, 0x1, 0x7, 0x9, 0x700000000000000, 0x81, 0x0, 0x9, 0x5, 0x7ff, 0x90c, 0x6]}, 0x45c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:51:08 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)={0x2, 0x0, [0x0, 0x0]}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/qat_adf_ctl\x00', 0x400000, 0x0) mq_getsetattr(r1, &(0x7f00000002c0)={0x100000001, 0x1, 0x100, 0x5, 0x81, 0x100, 0x3, 0x1}, &(0x7f0000000300)) fcntl$dupfd(r1, 0x406, r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x400000000001, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}}, 0xfffffffffffffe97) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) bind$inet(0xffffffffffffffff, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0x80284504, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f00000009c0)={0x5, &(0x7f0000000980)=[{}, {}, {}, {}, {}]}) r5 = dup(r0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/create\x00', 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00', 0x19, 0x2, 0x478, [0x200004c0, 0x0, 0x0, 0x200008d8, 0x20000908], 0x0, &(0x7f0000000040), &(0x7f00000004c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff02000000170000004400000092f662637366300000000000000000000000767863616e310000000000000000000076657468315f746f5f626f6e640000007465616d5f736c6176655f3000000000ffffffffffff00ffff0000ffffffffffffffff0000ff00000000a0000000a0000000d0000000636f6e6e6c6162656c00000000000000000000000000000000000000000000000800000000000000000002000000000072656469726563740000000000000000000000000000000000000000000000000800000000000000ffffffff0000000003000000080000006007687773696d300000000000000000000079616d300000000000000000000000006c6f000000000000000000000000000062637368300000000000000000000000aaaaaaaaaabbffff0000000000000000000000ffff00ff000000a8020000e002000018030000627066000000000000000000000000000000000000000000000000000000000010020000000000000b00000004007a591004000062dc8ad763040000080006ff070000000500ff9504000000000009ff06000000060001000004000008000009000000088001ffdc0100000003000101a8000000ffff03060008000009000500090000000000012700000000070080090100000002000100010000000000090309000000ff00036b0100000035090094210000000900ff010300000000002300060000000200080206000000090003ff0200000003001b050200000007008f05050000000100ff0136f4ffff01f0668108000000010004430400000006008a03ffff0000946c0102810000000000057f02000000c2eafc03e100000004001f7503000000df0007830100000083a10100080000000008018000000000810001050400000003000601080000000200ff0203000000020001adffff000004000800000000000200010040000000000401000900000003000580080000001c7a0381090000000500000b00000100b1080903680000002e1b098157000000ffff04000900000003000300090000000100016c0000000006000301ff0f0000f7ff0407040000001cf30680090000008000020505000000000001080800000008000172da000000010008017f0000002000071406000000000096000609000005000102ff0f000000000905fdffffff010001000fef00000200ff010100000001009101040000000200060056000000000000000900000000000000736e61740000000000000000000000000000000000000000000000000000000010000000000000000000000000000000fdffffff000000006172707265706c7900000000000000000000000000000000000000000000000010000000000000000000000000000000ffffffff00000000000000000000000000c824dc8ad1c35aa81b1a7e618b513200000000000000000000000000000000000000000000000000000002000000ffffffff00"/1144]}, 0x4f0) 17:51:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000280)={{0x2, 0x4e23, @empty}, {0x1}, 0xc, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'vlan0\x00'}) socket$inet(0x2, 0x3, 0x800000000000b) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r2, 0x4020565a, &(0x7f0000000040)={0x0, 0x49}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"]}, 0x310) 17:51:08 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x620800, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)={0x68, r1, 0x800, 0x70bd25, 0x25dfdbfc, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0xd6b6, @media='ib\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x8051}, 0x80) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x1, &(0x7f0000000580)=ANY=[@ANYRESDEC=r0], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f00000005c0)=""/207, 0x0, 0x0, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x8000000000000003}}, 0x48) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x444240, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r3, 0x4058534c, &(0x7f0000000200)={0x58, 0x4, 0x8, 0x4, 0x5, 0x3}) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) r2 = syz_open_dev$vbi(&(0x7f00000006c0)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet_mreqsrc(r2, 0x0, 0x2f, &(0x7f0000000700)={@local, @loopback, @broadcast}, &(0x7f0000000740)=0xc) ioprio_set$pid(0x1, r1, 0x100) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm-control\x00', 0x8000, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x1020, &(0x7f00000005c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [{@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@fowner_eq={'fowner', 0x3d, r4}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, '/dev/dlm-monitor\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}}) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$sock_TIOCOUTQ(r5, 0x5411, &(0x7f0000000200)) bind(r5, &(0x7f0000000240)=@in={0x2, 0x4e20, @remote}, 0x80) 17:51:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="8500000000000798b5950004140007ea6f0000000000000000004bc47860a8a8f34029f35e193fa3daee"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x2c0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40206417, &(0x7f0000000100)={0x0, 0x3ff, 0x3, 0xfffffffffffffeff, 0x4}) 17:51:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008914, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) [ 343.741632] audit: type=1804 audit(1556473868.757:72): pid=10657 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir574053634/syzkaller.1Igrrc/44/memory.events" dev="sda1" ino=17055 res=1 17:51:08 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:51:08 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000100)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:08 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x100, 0x0) getsockopt$inet_dccp_buf(r1, 0x21, 0xc2, &(0x7f00000004c0)=""/4096, &(0x7f0000000100)=0x1000) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000200)) 17:51:08 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="8580020000000000000030a41da0873933998bab0bdd7801a367f1f9f59bb98af1b0688a42c93807758f94fa1495971ec0fc091049f83c2686304e3bf95d183be37b4862af9a3c349bb954"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000290000009c000000000000009a0000000000b0003cfd064f17b816c04c11e0e1d8b5ec37def3b9a2e1c11f59c6a586d5df269163dc24f078d973063694"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:09 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f0000000040)='nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0xc) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]}, 0x2d7) [ 344.051196] device bridge_slave_1 left promiscuous mode [ 344.080676] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.151281] device bridge_slave_0 left promiscuous mode [ 344.165900] bridge0: port 1(bridge_slave_0) entered disabled state 17:51:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000100)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:09 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x800000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2000, 0x0) getsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)=""/53, &(0x7f0000000100)=0x35) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x101000, 0x0) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x739) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="03000000290000009c0000ffffffffffffffff1d54b29c001fd10759ffc47c29e62acc0fba0c9930981649b99906cd2e35023b35617a79d4151fcf057e0f471df8a33e3dfcf2fa808194d99fa22b89148bd09ec296828e8593967e3d7324a13501c4b5b24d7a0474c529fa5c68e7d73d61e82b0e02b29f958a236d7b9586"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x9, 0x4a000) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) [ 344.454527] device hsr_slave_1 left promiscuous mode [ 344.507189] device hsr_slave_0 left promiscuous mode 17:51:09 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:09 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x40, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x4e24, 0x0, @loopback, 0xe5}, {0xa, 0x4e22, 0x2, @mcast1, 0x2}, 0x331, [0x29, 0x100, 0x100000001, 0xfffffffffffff70d, 0x5, 0x7, 0x7fff, 0x3]}, 0x5c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 344.603321] team0 (unregistering): Port device team_slave_1 removed [ 344.693193] team0 (unregistering): Port device team_slave_0 removed [ 344.745864] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 344.817447] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 344.953804] bond0 (unregistering): Released all slaves [ 347.580318] IPVS: ftp: loaded support on port[0] = 21 [ 347.962116] chnl_net:caif_netlink_parms(): no params data found [ 347.996878] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.003446] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.010702] device bridge_slave_0 entered promiscuous mode [ 348.017352] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.024057] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.031471] device bridge_slave_1 entered promiscuous mode [ 348.048605] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 348.057812] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 348.076931] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 348.084556] team0: Port device team_slave_0 added [ 348.089936] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 348.097181] team0: Port device team_slave_1 added [ 348.102450] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 348.109710] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 348.174140] device hsr_slave_0 entered promiscuous mode [ 348.210472] device hsr_slave_1 entered promiscuous mode [ 348.260777] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 348.267689] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 348.281323] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.287700] bridge0: port 2(bridge_slave_1) entered forwarding state [ 348.294399] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.300782] bridge0: port 1(bridge_slave_0) entered forwarding state [ 348.330755] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 348.336868] 8021q: adding VLAN 0 to HW filter on device bond0 [ 348.345824] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 348.354455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 348.362147] bridge0: port 1(bridge_slave_0) entered disabled state [ 348.368767] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.378826] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 348.385262] 8021q: adding VLAN 0 to HW filter on device team0 [ 348.394482] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 348.402264] bridge0: port 1(bridge_slave_0) entered blocking state [ 348.408797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 348.418337] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 348.426527] bridge0: port 2(bridge_slave_1) entered blocking state [ 348.432922] bridge0: port 2(bridge_slave_1) entered forwarding state [ 348.449312] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 348.457254] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 348.474165] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 348.484914] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 348.495477] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 348.502372] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 348.509953] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 348.517657] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 348.526354] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 348.538772] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 348.553814] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 348.950808] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:51:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:51:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x80, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x5, 0x5, 0x3ff}}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000290000009c0000000000000095000000000000006009c2076273649423b5f54e8c7e08c206b28782e7cf3decf51914b88ab0da172bd6cd67ba79420be60ad44a2f4feaf77f41c6e3abd22afe2630083ecfdddfe61218982879b4a761c7cb711f66"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) write$uinput_user_dev(r0, &(0x7f00000004c0)={'syz1\x00', {0x8, 0x6, 0xffffffffffff8000, 0x2}, 0x42, [0x0, 0x3, 0x4, 0x7f, 0x8, 0x6, 0xf51, 0x8, 0x1000, 0x5, 0x0, 0x10000, 0x9, 0x4, 0x401, 0xff, 0x2, 0x8, 0x1, 0x1, 0x37a2, 0x10001, 0x8, 0x7, 0x80000001, 0x36c, 0xffffffff, 0x100000001, 0x7, 0x1, 0xff, 0x4, 0x10001, 0x4, 0x1, 0x2, 0x12, 0x8, 0x1, 0x9, 0x1, 0x12ea, 0xb0, 0xfffffffffffffff7, 0x8, 0x3, 0x1, 0x6, 0x3, 0x4, 0x1, 0x401, 0x5, 0x7f, 0x6, 0x7fff, 0x8001, 0x100000000, 0x9, 0x7fff, 0x1f, 0x1, 0x20, 0xcf44], [0x0, 0x401, 0xfffffffffffffff8, 0xd435, 0xffffffffffffb79c, 0x0, 0x1f, 0xacd, 0x3, 0x9, 0x7f, 0x1ce, 0x7f, 0x4, 0x4, 0x0, 0x2, 0x1ff, 0x401, 0x0, 0x9, 0x3, 0x0, 0x7, 0x4, 0x4, 0x80000001, 0x1f, 0x3995, 0x2, 0x3, 0x101, 0x1ff, 0x1, 0x1059, 0x9, 0x8, 0x1ff, 0x9, 0x25d1, 0x5, 0x3, 0x200, 0x7, 0x67, 0x3, 0x80, 0x9, 0x7, 0xfa, 0x9, 0x5, 0x8, 0x10001, 0x3, 0x3f, 0x4, 0x7fffffff, 0x81, 0x9bbb, 0xff, 0x1, 0xc74, 0xa2c], [0xfffffffffffffffa, 0x2, 0x9, 0x2, 0x9, 0xff, 0xfffffffffffffffd, 0x3, 0x1, 0xffffffffffff333a, 0x5, 0x2, 0x6, 0x1, 0x63f8b661, 0xfffffffffffffff8, 0x6dc, 0xe86, 0x9e3c, 0x4, 0x4, 0x698, 0x40, 0x97, 0x80000001, 0x6, 0x8, 0xffffffff, 0x6, 0xffffffffffff6b9a, 0xfffffffffffffffd, 0x7, 0x80000000, 0x1, 0x4, 0x9, 0x8, 0x7, 0x51c5, 0x80, 0xae0e, 0x8, 0x5, 0x1, 0x3ff, 0x0, 0x6000000000000000, 0xb39, 0xed7, 0x7, 0x1, 0x7fff, 0x0, 0x1, 0x3, 0x9, 0x7fcc, 0x800, 0x28, 0x7c28, 0x7, 0x6, 0x9, 0x5], [0xc8ea, 0x0, 0x9, 0x33e, 0x3, 0x4, 0x20, 0x7, 0x3f, 0x400, 0x3cf, 0x6, 0x5, 0xfff, 0x5d3, 0x4, 0x3, 0x9, 0xffffffffffffff80, 0x1800000000000, 0x0, 0x7f, 0xcf, 0x2, 0x3, 0x3, 0x35c, 0x471, 0x2, 0x0, 0x8, 0xb29, 0xa6a, 0x6, 0x2, 0x1, 0x7, 0x40, 0x3, 0x1, 0x100000000000, 0x3, 0x6, 0x8bd, 0x3fe00, 0x1c, 0x6, 0x9, 0x4, 0xd1, 0x9, 0x8, 0x93, 0x1, 0x7, 0x9, 0x700000000000000, 0x81, 0x0, 0x9, 0x5, 0x7ff, 0x90c, 0x6]}, 0x45c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="850000000000009500000000000000000000000000000000d669e59763e72cf31779eb12b19f7777ab98baad98e4ab8d09cb66e97919de4986e5cda508d063d82bc0c93a8af9fa55c604a2105fdbc3f2193d8823b1f76209c8dff738ab99d7f438368bf432aeb9057c0d6ccdfdcb0e0652fe3304b46f6fdb00b2aa"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r0, &(0x7f0000000200)="d3dbb23bd45c6fb0846037a5bdd39240d41e9827233ba71aaca3b59850cbb594b6120764c3eea48dee2a14f82b21d2473ac328fe5bd84297b3e8324ef163a1308813a9fc8e916b94660720f069018124a137e1d6a047fdc2521a7e06aa488137a535b743d886468dd4634e9467f312b617d5ca95f7f66c43e0e061278ce1e2957d041e26b8ae901ff8f8fe4462806aff4b9bae1afd20e7f984245225ca10341155e2e3528fada1954b", &(0x7f00000004c0)=""/132}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="850000000000000000e505944af26a841a661388d0c6ac4ae32f27acf88d3809"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000200)="76c9f0169e04", 0x6, 0xfffffffffffffffb) r2 = add_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="738549e7bc9634904747723799e154b561", 0x11, 0xfffffffffffffffd) keyctl$reject(0x13, r1, 0x4, 0x4, r2) 17:51:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x4, 0x800000000000b) r2 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x448800) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000040)=""/46) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:51:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/checkreqprot\x00', 0x20080, 0x0) write$vnet(r1, &(0x7f0000000580)={0x1, {&(0x7f0000000240)=""/137, 0x89, &(0x7f00000004c0)=""/154, 0x2, 0x5}}, 0x68) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) sched_setscheduler(0x0, 0x0, &(0x7f0000000100)=0xffff) 17:51:14 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x480000, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000001700)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000017c0)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x6000200}, 0xc, &(0x7f0000001780)={&(0x7f0000001740)={0x28, r1, 0x12, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r0, 0x0, 0xa8, 0x1000, &(0x7f0000000200)="f22e3dc6530daa6f19603cc86edadbf14bc577f160ccd93db85902fa05b9e041b819dc87efb448213d32e6f8e3e611514561e74e85ed3cb4d9ed7a922a57c1e97748055975d2190f7eb7aac5ac40e855343e0f798f5a69c7631d65f74e953eac3e551128094e3648293d3e96a9f21beb6afe531ed00c789790516c7c4697d95533bc3b11f0a03f6f916c7791d5af37f1c9900a870f348dd857dc7c6b316045480ce44cc8c78b21e4", &(0x7f00000004c0)=""/4096, 0x6}, 0x28) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000001680)=0x14) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="8577dc76101370000000290000009c001e00000002040000000000026e7d70e30971f3043d3483f91b5117ba35cf165f0006000e32547af80a8b22dbbcc7eab320be"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0x285, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000001800)={0x0, 0x4, 0xffffffff, 0x4d2d7e03, 0x80000000, 0x4}, &(0x7f0000001840)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001900)={r3, 0x74, &(0x7f0000001880)=[@in6={0xa, 0x4e24, 0x81, @ipv4={[], [], @multicast1}, 0x4}, @in6={0xa, 0x4e20, 0x10000, @mcast2, 0x4}, @in6={0xa, 0x4e24, 0xffffffff, @mcast1, 0x1f}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e20, @rand_addr=0x9}]}, &(0x7f0000001940)=0x10) write$UHID_CREATE2(r0, &(0x7f00000014c0)={0xb, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x7a, 0xf1a, 0x2, 0x5, 0x2, 0x7e45, "0962c36310c65309c8d840ec1630d703ccecebf4b842aa421b92bee58bf5ccfe74d260d825363305a8ce27cb76f8cb6b4fef48f2598e88b9a6409c955c1fb4088f372a2d28b7a01f987eb8cb75b80a120977913fb88ba26808e6037f36df57e395afeb0f012c15d70a97c1e018d352268f02f8fec4e451a00e4f"}, 0x192) 17:51:14 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x845060e0}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x0, 0x70bd2a, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000804}, 0x4) 17:51:14 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:51:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="850000000000000000e505944af26a841a661388d0c6ac4ae32f27acf88d3809"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000200)="76c9f0169e04", 0x6, 0xfffffffffffffffb) r2 = add_key(&(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x1}, &(0x7f00000002c0)="738549e7bc9634904747723799e154b561", 0x11, 0xfffffffffffffffd) keyctl$reject(0x13, r1, 0x4, 0x4, r2) 17:51:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8001, 0x74000) ioctl$SIOCAX25NOUID(r2, 0x89e3, &(0x7f0000000040)) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:51:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r1 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000100)=0x4) 17:51:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x40, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x4e24, 0x0, @loopback, 0xe5}, {0xa, 0x4e22, 0x2, @mcast1, 0x2}, 0x331, [0x29, 0x100, 0x100000001, 0xfffffffffffff70d, 0x5, 0x7, 0x7fff, 0x3]}, 0x5c) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000000000"]}, 0x208) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80000000, 0x400) ioctl$CAPI_NCCI_OPENCOUNT(r2, 0x80044326, &(0x7f0000000040)=0x1ff) 17:51:15 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x164, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) 17:51:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0xffffffffffffff24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, &(0x7f0000000280)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLCREATE(r1, &(0x7f00000002c0)={0x18, 0xf, 0x1, {{0x0, 0x2, 0x1}, 0x5}}, 0x18) ioctl$TIOCMIWAIT(r3, 0x545c, 0x0) write$P9_RWRITE(r3, &(0x7f0000000100)={0xb, 0x77, 0x2, 0x80000000}, 0xb) ioctl$TCSETXF(r3, 0x5434, &(0x7f0000000200)={0xffffffffffffff00, 0x8000, [0x6, 0x7, 0x4, 0x5], 0x3}) 17:51:15 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$read(0xb, r1, &(0x7f0000001580)=""/4096, 0xbb6) write$P9_RREAD(r0, &(0x7f0000000200)={0xc6, 0x75, 0x1, {0xbb, "39771124272fa2685b0abe5d80e18027827b5cd3cbbb4e0fe75d8bb65391fe7af963f645d89f5ad9c307a9e4fe58d38a1fcca0a29e2c23a50a51374d03d0517590692de99f684db712fff7d6524b3213af2890368cb694a5d89042e3eb68f00e2b87c2c7b21decf94e16c5f28b7e76e3e28bf0e000cc27261929447ded58f8c562eb298d74b91eb710ddf1e89c6cd1b34cd13db04d06a5e13f4ee81545bcda84a5c0b6e9e46a2b1a30c13fbce252dceea1e66cb1e9d85da127c1ff"}}, 0xc6) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001540)='/selinux/avc/hash_stats\x00', 0x0, 0x0) get_thread_area(&(0x7f0000000100)={0xfffffffffffffff8, 0x20001000, 0xffffffffffffffff, 0x4, 0x16, 0x8, 0x0, 0x1c8, 0xfff, 0xff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000000000fa69c000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0xff, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040)={0xfffffffffffffffe}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r3 = syz_open_dev$cec(&(0x7f0000001500)='/dev/cec#\x00', 0x3, 0x2) ioctl$NBD_SET_SIZE(r3, 0xab02, 0x3) 17:51:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x1f, 0x0, &(0x7f0000000040)="015283e0627bcb630f000000004d002b6faa98d643f6bd494f5e8421dfc34c", 0x0, 0xb62}, 0x28) 17:51:15 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:51:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0xffffffffffffff24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, &(0x7f0000000280)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLCREATE(r1, &(0x7f00000002c0)={0x18, 0xf, 0x1, {{0x0, 0x2, 0x1}, 0x5}}, 0x18) ioctl$TIOCMIWAIT(r3, 0x545c, 0x0) write$P9_RWRITE(r3, &(0x7f0000000100)={0xb, 0x77, 0x2, 0x80000000}, 0xb) ioctl$TCSETXF(r3, 0x5434, &(0x7f0000000200)={0xffffffffffffff00, 0x8000, [0x6, 0x7, 0x4, 0x5], 0x3}) 17:51:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f12a08841a201d941") socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x101001, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x0, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[]}, 0x78) 17:51:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="85000900290000009c000000000000009500000000000080"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r0, 0x0, 0x80, 0x0, &(0x7f0000000240)="015283e0628e137e0c8f8ca34ca5aba9bc88594968d1593b9a931776fefddcc7ece2d7127df6471fd72cb50fc6589af31d7fb8cdeacc8eab8d68c8bc82f6853132779f69747b5a064f79e28872c6e5260b5e0419239ed99984701e4dd6f622f526065ce7722119683af6c9c5ae4686d371a5aaf81bf6d97d0bc193601399262c", 0x0, 0xfffffffffffffff9}, 0x28) 17:51:15 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="a80000203aa11243be250b9290b03f8719af71f03349009c000000000000009500000051fce24d"], &(0x7f0000000080)='GPL\x00', 0x1, 0x58, &(0x7f0000000340)=""/207, 0x41f00, 0x0, [], 0x0, 0x0, r1, 0x8, &(0x7f0000000040)={0x8000000000000000}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="850000000000009500000000000000000000000000000000efc40cdc9d25bf40fa07baee5c4cc0"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getpid() ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") ioctl(r0, 0x7, &(0x7f0000000000)="fb759a165370496e5b2d04f25b019c2db4fc07a9825799718de731b71f96ed9e1a3d142c3d06f42fa86d48f3ba587ce7f84d00805a99602aeda6d82b10a1ab7366dc608d5b694d1b709140928ae39d80ac27e7ee5491c46fa2257c4f633bd501718f3e0e37329d7f0f852193b34d09e0888f0d104ffdd3bf729614e1c427dd37387e4b7797b7e0833f733c8b9e402f351736d710fe048b78d2824ade241c9b7dbc0fcddeeda5baf61ee1ad20f78186669fe6d63a3c5dadec7d143bdd2c6b") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000000000"]}, 0x208) 17:51:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x1f, 0x0, &(0x7f0000000040)="015283e0627bcb630f000000004d002b6faa98d643f6bd494f5e8421dfc34c", 0x0, 0xb62}, 0x28) [ 350.451557] device bridge_slave_1 left promiscuous mode [ 350.457294] bridge0: port 2(bridge_slave_1) entered disabled state 17:51:15 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="b5da0000290000009c00000000000000950000000000000092e7209a17948b820e5015f4f87f8a0023ce51760ded1214eb15d86bb2589158c0c79b31dc3f00555b1c65bfed01cc1a4eff5f20e89437307de2e443d3de16bca58c8e270c9cb65ac1aa1634b729bcbcb2b3d79d33c8dc172435ead375730098574c3f8bdf4335496cdfe554140f6cfd23cc18fddd76f0ba617354bfe050ebda7e9e51ac509686305228ce889c"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x24000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @window={0x3, 0x8000, 0x83c2}, @timestamp, @timestamp], 0x4) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000100)={{0xa766, 0xfffffffffffffff9, 0x5, 0x7, 0x7, 0x8e}, 0xffffffffffffffff}) 17:51:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="85000010290000009c000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 350.561550] device bridge_slave_0 left promiscuous mode [ 350.578389] bridge0: port 1(bridge_slave_0) entered disabled state 17:51:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x0, &(0x7f0000000200)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x1}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) prctl$PR_SVE_SET_VL(0x32, 0x27c60) 17:51:15 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x1f, 0x0, &(0x7f0000000040)="015283e0627bcb630f000000004d002b6faa98d643f6bd494f5e8421dfc34c", 0x0, 0xb62}, 0x28) [ 350.855811] device hsr_slave_1 left promiscuous mode [ 350.894499] device hsr_slave_0 left promiscuous mode [ 350.925217] team0 (unregistering): Port device team_slave_1 removed [ 350.949396] team0 (unregistering): Port device team_slave_0 removed [ 350.966663] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 351.005094] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 351.142918] bond0 (unregistering): Released all slaves [ 353.850225] IPVS: ftp: loaded support on port[0] = 21 [ 354.189769] chnl_net:caif_netlink_parms(): no params data found [ 354.230486] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.237183] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.245189] device bridge_slave_0 entered promiscuous mode [ 354.252658] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.259631] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.267168] device bridge_slave_1 entered promiscuous mode [ 354.287667] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 354.297231] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 354.317547] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 354.325037] team0: Port device team_slave_0 added [ 354.330908] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 354.338438] team0: Port device team_slave_1 added [ 354.343991] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 354.351498] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 354.432832] device hsr_slave_0 entered promiscuous mode [ 354.500733] device hsr_slave_1 entered promiscuous mode [ 354.540934] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 354.548589] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 354.563708] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.570498] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.577986] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.584945] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.618382] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 354.625511] 8021q: adding VLAN 0 to HW filter on device bond0 [ 354.635218] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 354.645394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 354.653113] bridge0: port 1(bridge_slave_0) entered disabled state [ 354.659838] bridge0: port 2(bridge_slave_1) entered disabled state [ 354.670699] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 354.676980] 8021q: adding VLAN 0 to HW filter on device team0 [ 354.686378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 354.695445] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.702316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.712271] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 354.721500] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.727910] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.744894] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 354.753300] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 354.764303] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 354.781376] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 354.792105] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 354.803289] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 354.809777] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 354.817636] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 354.825609] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 354.840934] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 354.852308] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 355.170773] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:51:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:51:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="00000000000020000f9c79551d4d", 0x0, 0xb62}, 0x28) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$VIDIOC_S_EDID(r1, 0xc0285629, &(0x7f0000000200)={0x0, 0x4, 0x36c, [], &(0x7f0000000100)=0x9}) 17:51:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xaa09, 0x40000) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x40, 0x30}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000240)={r2, 0x401, 0x7, 0xfd}, 0x10) 17:51:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x10004, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0xffffffffffffbfff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) pipe2(&(0x7f0000000040), 0x80000) 17:51:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="b5da0000290000009c00000000000000950000000000000092e7209a17948b820e5015f4f87f8a0023ce51760ded1214eb15d86bb2589158c0c79b31dc3f00555b1c65bfed01cc1a4eff5f20e89437307de2e443d3de16bca58c8e270c9cb65ac1aa1634b729bcbcb2b3d79d33c8dc172435ead375730098574c3f8bdf4335496cdfe554140f6cfd23cc18fddd76f0ba617354bfe050ebda7e9e51ac509686305228ce889c"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x24000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000000c0)=[@sack_perm, @window={0x3, 0x8000, 0x83c2}, @timestamp, @timestamp], 0x4) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000100)={{0xa766, 0xfffffffffffffff9, 0x5, 0x7, 0x7, 0x8e}, 0xffffffffffffffff}) 17:51:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:51:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'bridge_slave_0\x00', 0x4}, 0x18) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:51:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$P9_RREADDIR(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="8ba12a9f94b19b000000000000000000"], 0x10) 17:51:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:51:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000280)=0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0xcf, &(0x7f00000004c0)=""/207, 0x0, 0x2, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000200), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7fff}, 0x10}, 0xffffffffffffff08) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000300)={0x6, 0x9, 0x6, 0x10, 0xb, 0x5, 0x7fffffff, 0x5d}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0xffffffffffffff72, 0xa1ea748ba7ffde0d, &(0x7f0000000100)="015283e0627bcb56a14ec77d2290630f9c79551d4d", 0x0, 0xb60}, 0xa) 17:51:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400000, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x200) 17:51:21 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-serpent-sse2\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$FOU_CMD_ADD(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0) recvmsg$kcm(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000480)=""/143, 0x8f}], 0x1}, 0x0) 17:51:21 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000240)={0x0, @in={{0x2, 0x4e24, @local}}, 0x1, 0x20, 0x8001, 0x49, 0x1}, &(0x7f0000000300)=0x98) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000004c0)={r1, 0x8}, 0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$packet(r0, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000540)=0x14) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="85000000290000009c00000000949f1dad139e105e04ce1eae535d0000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x80, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f0000000100), 0x4) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000000c0)=0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f00000005c0)={[], 0xfffffffffffffffe, 0x0, 0xfffffffffffffff9, 0x7d4, 0x3fa, r5}) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000000680)={0x6, 0x0, [{0x9a9ae33, 0x3, 0x0, 0x0, @msi={0x400, 0x9baf, 0x2}}, {0x4, 0x7, 0x0, 0x0, @irqchip={0x0, 0x100}}, {0x3, 0x3, 0x0, 0x0, @sint={0x91c1, 0x9}}, {0xa465, 0x3, 0x0, 0x0, @sint={0x9, 0x9}}, {0xffffffff, 0x0, 0x0, 0x0, @irqchip={0x7fffffff, 0x6}}, {0x80000000, 0x4, 0x0, 0x0, @adapter={0x8000, 0x5, 0x200, 0x7, 0x5}}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) 17:51:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="8500000040e901bacddc00000818118fbe5fe999b7a000b37b158bc4af5dc75dbb6c1addce372d66f516d03c2514a41e7cc6e50b7fcfde7e39bc31c3f4"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x204000, 0x0) 17:51:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x4, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000000000"]}, 0x208) 17:51:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="000018000000000000053190825dafc8b138172e9bf50ef1c1f7454088b06c05d7d5a73902b2c59eb74a3284645523fca12fb79b82d5b3aee215631ec360724af766e5f92438eab5c603f0"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:21 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:51:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x393, &(0x7f0000000100)="015283e0627bcb630f9c79551d4d", 0x0, 0x20}, 0x28) 17:51:21 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4) open(&(0x7f0000000040)='./file0\x00', 0x101100, 0x100) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:21 executing program 2: socket$nl_xfrm(0x10, 0x3, 0x6) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) sigaltstack(&(0x7f0000ff9000/0x4000)=nil, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000040)) write$P9_RVERSION(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="1300000065ffffff0000000600396932070000000000000064a8ab15018d81d5c28531303e005cbbf77fb5bd254b0440ba4f61e5a5a3b7ea59a4565de4161fd5ed5925694d43338d186cd02c2e0bfff5e1a018b96cf5f619d7"], 0x59) r2 = perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r2, 0xc0f85403, &(0x7f0000000300)={{0x2, 0x3, 0x0, 0x3}, 0x3f, 0x3, 'id0\x00', 'timer0\x00', 0x0, 0x0, 0x842f, 0xbc, 0x81}) sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 17:51:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000040)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x5) 17:51:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x100, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r2, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10002010}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x80, r3, 0x324, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x80}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'yam0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1e}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x15}}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x24000040) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000600)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000005c0)={&(0x7f0000000440)={0x164, r3, 0x600, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x10000000000}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1f}]}, @IPVS_CMD_ATTR_SERVICE={0x74, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3f, 0xa}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x1}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@loopback}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x71}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5c}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_DEST={0x64, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @local}}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffffffff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x400}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x164}, 0x1, 0x0, 0x0, 0x20044801}, 0x800) [ 356.760993] device bridge_slave_1 left promiscuous mode [ 356.766576] bridge0: port 2(bridge_slave_1) entered disabled state 17:51:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x101000, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x2, 0x1) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="850000060000004c5e4e000002000000001fc24ddfbe78dfda2200d241"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/dsp\x00', 0x80400, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000100)={0x0, 0x8000}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000240)={0x0, 0x4, 0x4, 0x101, 0x6, 0x3, 0x9, 0x5, {0x0, @in6={{0xa, 0x4e23, 0x80000001, @dev={0xfe, 0x80, [], 0x2}, 0x80000000}}, 0x80000000, 0x30aa, 0x50, 0x4, 0xffffffff}}, &(0x7f0000000300)=0xb0) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000004c0)={r3, 0x4, 0x6, 0x8a, 0x800, 0x800, 0x2, 0x0, {r4, @in={{0x2, 0x4e22, @broadcast}}, 0x4, 0x0, 0x80000000, 0x3, 0x9}}, &(0x7f00000000c0)=0xb0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:21 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x0, 0xe, 0x7e, &(0x7f0000000200)="015283e0627bd1630f9c79551d4d1ffbd9c0b89b996581d2d166bcfe6527791c7a49c023fe88d026210df756d5fceca902bbc46ceafe3b3d42ae5ed7349c46968d656948e1c1479b55ba760e755fa3e8323c55c0e4f0c701483cef8cfd1fb3b4c140eefa68622d4fde84559e66b17af59bc9e831793901ddaaa14bb4247896a4f714d121ef91fb686893eeeb6260b7a5b5a2297e48483bfad78937457aa8cd5507e400"/178, 0x0, 0x1000200}, 0x28) [ 356.852171] device bridge_slave_0 left promiscuous mode [ 356.858103] bridge0: port 1(bridge_slave_0) entered disabled state 17:51:22 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r2 = dup3(r0, r0, 0x80000) ioctl$KDENABIO(r2, 0x4b36) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="8560935dcd160000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vcs\x00', 0x2000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000680)=0xe8) getgroups(0x1, &(0x7f00000006c0)=[0x0]) write$FUSE_CREATE_OPEN(r1, &(0x7f0000000700)={0xa0, 0x0, 0x3, {{0x1, 0x3, 0xfc, 0x4, 0xccc, 0x2, {0x5, 0x0, 0x400, 0x0, 0x5, 0x34270118, 0x6, 0x0, 0x3f, 0x0, 0x7, r2, r3, 0x97, 0x2}}, {0x0, 0x2}}}, 0xa0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000200)={0x118, r4, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x20}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@remote}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xc0000000000000}, @IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x9, 0x8}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x663e}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xa957}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6a01}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xf8a}]}, 0x118}, 0x1, 0x0, 0x0, 0x4004001}, 0x20000000) 17:51:22 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x200401, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000100)={0x28, 0x2, 0x0, {0x3, 0x5}}, 0x28) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getgid() bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) [ 357.427102] device hsr_slave_1 left promiscuous mode [ 357.509076] device hsr_slave_0 left promiscuous mode [ 357.576940] team0 (unregistering): Port device team_slave_1 removed [ 357.641798] team0 (unregistering): Port device team_slave_0 removed [ 357.691903] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 357.775639] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 357.904117] bond0 (unregistering): Released all slaves [ 360.440423] IPVS: ftp: loaded support on port[0] = 21 [ 360.825512] chnl_net:caif_netlink_parms(): no params data found [ 360.865229] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.871942] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.879019] device bridge_slave_0 entered promiscuous mode [ 360.886222] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.892765] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.901173] device bridge_slave_1 entered promiscuous mode [ 360.918560] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 360.929147] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 360.949671] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 360.957671] team0: Port device team_slave_0 added [ 360.963441] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 360.971006] team0: Port device team_slave_1 added [ 360.976453] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 360.984164] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 361.044666] device hsr_slave_0 entered promiscuous mode [ 361.090567] device hsr_slave_1 entered promiscuous mode [ 361.130673] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 361.137831] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 361.152150] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.158640] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.165475] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.172247] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.205939] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 361.212711] 8021q: adding VLAN 0 to HW filter on device bond0 [ 361.221754] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 361.231526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 361.238821] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.246136] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.257031] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 361.263587] 8021q: adding VLAN 0 to HW filter on device team0 [ 361.273200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 361.281487] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.287861] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.300781] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 361.308861] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.315284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.332509] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 361.341048] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 361.348700] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 361.358674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 361.371542] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 361.383225] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 361.389299] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 361.404668] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 361.415103] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 361.810623] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:51:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:51:27 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 17:51:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40000, 0x40) sendto$isdn(r0, &(0x7f0000000100)={0x9, 0x6, "1c5cc6698d59fdb5599a10ebfffeeb0f6eb84a79d9524e70c34f54133ca5d36db24903b02aeb99fd3a44"}, 0x32, 0x20000000, &(0x7f0000000200)={0x22, 0xfff, 0x0, 0x4, 0x3}, 0x6) r1 = semget$private(0x0, 0x0, 0x119) semtimedop(r1, &(0x7f0000000240)=[{0x0, 0x1}, {0x0, 0xda, 0x1000}, {0x5, 0xffffffffffffff00, 0x800}, {0x0, 0x2}, {0x0, 0x1b, 0x1800}, {0x2, 0x1000, 0x1000}], 0x6, &(0x7f0000000280)={0x0, 0x989680}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000140)={r2}) dup3(r0, r2, 0x0) 17:51:27 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="85000000290000009c000000000000009500f1174dc60000"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000040)={0x6e, 0x5, 0x6, 0x7ff, 0x6, 0x6}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SIOCX25SCALLUSERDATA(r2, 0x89e5, &(0x7f0000000380)={0x1a, "24a8bf624c10b3f0383194f81de4bc8c8d34c95f4dcd4dac8481680111c564a1bf148f976bb6852e0a0a5305dd673d2d4b3ea0900d388ab6e5b08171c7feaf6d84a0bedb0596eab98cd370afc072fb8029b213f6af908b7b60b548c689b52481459af9b62437dfd500cfc1f5ca8382fb556ee26ee4afbf2b4eeff03f9e47381e"}) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:51:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_G_CTRL(r1, 0xc008561b, &(0x7f00000000c0)={0x1501ad2b, 0x7f}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000300)) mount$overlay(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='overlay\x00', 0x10, &(0x7f0000000240)={[{@xino_on='xino=on'}, {@nfs_export_on='nfs_export=on'}, {@metacopy_on='metacopy=on'}, {@xino_auto='xino=auto'}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x36, 0x30, 0x36, 0x7f, 0x33, 0x38, 0x35], 0x2d, [0x30, 0x3a, 0x35, 0x7d], 0x2d, [0x37, 0x73, 0x33, 0x77], 0x2d, [0x65, 0x32, 0x0, 0x37], 0x2d, [0x65, 0x7f, 0x61, 0x38, 0x76, 0x7f, 0x30, 0x77]}}}]}) 17:51:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f00000003c0)='./file0\x00', 0x200, 0x182) write$UHID_DESTROY(r1, &(0x7f0000000400), 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000001c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x196, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961075df31416db02300000010000000000000000000000000000000069705f76070030000000000000000000697036746e6c30000000000000000000b8aaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e00"/406]}, 0x20e) syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0x50c6, 0x802) timerfd_create(0x8, 0x800) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x20400, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r3, 0x4038564f, &(0x7f00000002c0)={{0x3, @name="ee69924674d1ab135c22f2c242915b37c577e12056cfd340ebea51bfb4ff9326"}, 0x8, 0xffff, 0x7}) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f0000000000)={'broute\x00'}, &(0x7f0000000080)=0x78) socket$vsock_stream(0x28, 0x1, 0x0) 17:51:27 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x7d) fcntl$setstatus(r0, 0x4, 0x0) 17:51:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x100000001, 0x100) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000100)={0x80, 0x400, 0x0, 0x2, 0x2, 0x1}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x41000, 0x1, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0xffffffffffffffff, 0x1000, 0x1010, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:51:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000002900005188641c9c009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:27 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000100)={0x5, 0x100000000, 0x80}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 362.801180] audit: type=1400 audit(1556473887.817:73): avc: denied { wake_alarm } for pid=11009 comm="syz-executor.3" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 17:51:27 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x111000, 0x0) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x208) inotify_rm_watch(r0, r1) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x10}}}, 0x0, 0x4, 0x0, "4d99271b7399f89b649cb856a1f66b48a2196cfa4138666c1b5b49808201ba765ecd9c5767e4e937276762417b6a006c8dd1b981fdbb7582c645ef49de5e5db0f5da3febc791aaa5f275a63f2c580991"}, 0xd8) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:27 executing program 2: getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 17:51:27 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000004240)='./file0\x00', 0x880, 0x8) r2 = gettid() stat(&(0x7f0000004c00)='./file0\x00', &(0x7f0000004c40)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000004cc0)=0x0, &(0x7f0000004d00), &(0x7f0000004d40)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004dc0)={0x0, r0, 0x0, 0x7, &(0x7f0000004d80)='vmnet0\x00', 0xffffffffffffffff}, 0x30) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000004e00)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000004f00)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004f40)={0x0, 0x0, 0x0}, &(0x7f0000004f80)=0xc) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000004fc0)=0x0) fstat(r0, &(0x7f0000005000)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000005080)={0x0, 0x0, 0x0}, &(0x7f00000050c0)=0xc) r11 = fcntl$getown(r0, 0x9) r12 = getuid() r13 = getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000005100)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005140)={{{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@dev}}, &(0x7f0000005240)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000005280)={0x0, 0x0, 0x0}, &(0x7f00000052c0)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000005300)={0x0}, &(0x7f0000005340)=0xc) stat(&(0x7f0000005380)='./file0\x00', &(0x7f00000053c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000005440)=[0xee01, 0xee01, 0xffffffffffffffff, 0x0, 0xee00]) sendmsg$netlink(r1, &(0x7f00000055c0)={&(0x7f0000004280)=@proc={0x10, 0x0, 0x25dfdbff, 0x2000000}, 0xc, &(0x7f0000004bc0)=[{&(0x7f00000042c0)={0x664, 0x1a, 0x420, 0x70bd2c, 0x25dfdbfe, "", [@generic="7cd8320950f87fe084e16242a3d80805ba775eb43a74cf6c03ec416a17c6177f2a64f1b7762bc30fe50751102ea80fefb07245a4317ebdce0b07347d2b042896d521f6c59ee34d3a2f717ac7322cf51d05cf94b6b00170e371de88b263cb66985a5aed5b9e45fa8b114006d945812c2c9635b7feaef6744bbfb9469c3ac601b0040fdbbd29832502a3dc528c720ef69670f844f1d2246d2e02912292f86d96e860f0ee473cccb001100fee0510436217c26f84197c987f5ea628ac3997cc22b138129c4f56d807ed7040c37e98e519ad027bccea", @generic="401dc7438a13f1d0964dce285edf137547575ad214a0358f65093257ec5cdfea8bdd4bc83483fa253dd806d27e0ad2c363d1aeec4f2119a08db7b264a5c44c8942ed746c4c1f98bc36a246ececfdd7b2352f951c7b6b1c5d638b549f52db468c8f26d2f10335248f0e88e6f6a8f37a722da5e9caa96fe5803ff0476f486235696943e08cb853256a13765b0c9ed6009d665eed77", @generic="68107d9d5de3ad26a90f09ad7b9fbefc1d2851b2b8e55e062121583dcf9d0e88a7aada7777364a511f00bd805843669026775c53641d6c5b9e26914502ce7612b5af346227fbe1c4ee63bd8eebf231234ebdeec98c4472a64598fc45f95c94c2709f30282674c1137c4249d94b4fa3ca807f44406017cbda8bbd995ef682844f56596778d9e26454ed900adb90ec5a5c31955bc8b13b122075273818f785e97ce8bf01d50e3bc3a9eef0eaaa7364b584176b2fb74400ffc1a9ede1ccb88e96bb8c8a28c5ea24bb26da5b136bb7da2e80942295d57756b267f3", @generic="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", @nested={0x23c, 0xa, [@generic="369cf3d0e26b315f5d31e462cdae10878e827f202bb1071cdc44a370b07cc9160ccb230363b7f242c84c92cd6b77c10e1ec5dc9c366e1ac3aa0ef8e4e813c1301a9bff5c61075df3cfd8dc74b4923e4b63d7497a16f33529e023750fc53b19a04b8301ce2ffef09bafda6f24885390e116bc429dfd7b03743f02ed28ac67056aebeaea5aac2062262d9186a098ab8a26415c084a4220dff0bcca404eec26422fa117e8d39f77dfcb4d8410be44dca69e8eda5f9ad2518a6702a5ca6b187050a1da9d78128c8ceb12c47e7b61bd912454d41929", @typed={0x50, 0x7e, @binary="f812e6798f0de1377cfdccd7ca4f765a47126d4a24519c25aba7da1bd5c0b9523133871e25c1780d46d3dbb4425440670728d4f4abc32ce8d9f01adc45f0e538dce9d4317c736acb9f"}, @typed={0x10, 0x5c, @str='wlan1em1\x00'}, @generic="d6bb92559b7d35f921ef07ed4949443f308dba5f6a74980e31a35a3d6a6999599eb806314efd67b2540e3312b6d93f9a208d3217fa5a8161714c73522e81f7dafff9fa989aa388835d943c5609b4089995619801", @typed={0xb0, 0x21, @binary="f51a5f2236ef94ee43178a31d6fd1b8126da480c1f293c5cc72c675a0be8014e27fbb057b04ff1c67acde963b4cab82344aeb4d48dd636917c2b9d1cd5f4bd5e7014646e0785cc5f3bc61e7bbe447d657dc4365a6b2e480acd8fae2d7d9d395b6638bbc7ff8c7a4ea653b1a058169b97f5528b090e1246e29c74246271eee70399273559204935fc6674c813113a6842260b66c2835c41fd9fc8daa418f4ab5f8dd30d96cec964165dda7c"}]}, @nested={0xd8, 0x19, [@generic="aea32ad6d68845590829dd867a7c33a0108cde130e8b9dc79a7ebb6c6717b9dc80e7d37fc03b2f921de30ad009fb2d0625a565d4036594f7cd8aa76a71bca6b868641f9303571ab4c2017e7e75593255afda7eda09115e9983d18e13b4753af8c58c92a1240c26fca49be90d4738c988dfc9fb9758fc84b129962039ab40300782bc6ae7dfb73ff82531d6613b9241227b67854a3c381beaeff7b4fd1991ac0ebc4310619b9d343930bd122281ad5ee922b6624ea45c6987df77f600a3a62a082805ed84f2e27d9e3cc0bea47a5fb3217f1486"]}]}, 0x664}, {&(0x7f0000004940)={0x260, 0x19, 0x304, 0x70bd25, 0x25dfdbfb, "", [@nested={0x104, 0x40, [@generic="37ae3aaf76a219d1000399b00a8160403d3ef86f1b381ca964f99b5c6a448da251284cd4b8c7edffa67a0c8b63f34851ecea58f4529f1fd5f9d085cdb632c587c506bcddab34f049ee924ca4453ac00d39dbb2895427814ca15ef4f38e38dedfcdca63e17ed818737bf8f2228a95450273a2ab1a9bc6b3dae56696c5291c2441924bea51156fe9877d7b8b28901ad145e3b98ae050a73de96c4891bb936e6376a61c44f46939b507e310054e19ebecae80f0264674e75eb71f5b1378c9314bbd0926168a116e36a6aa908290cfa64f946ca4d51269a14fab05c14cf1944b7ab1f0", @generic="315ca6abbb71c0e6849178b7a4d8d0350bad6ed9b99f7e3b2cd5dd03a0"]}, @typed={0xc0, 0x8d, @binary="e6a349f4582fdd02ec4fcfb8b569f55525b91993a722dab31dd18d2604acfd21d1b58b8dc39fb89c14e8ca025542cd85724ee650894e8bb233996b93ca3586a3936384fc299d22e0384bd55ad70edee37bd352f0e0e0e77fdd602ab0c6a6a988d17908b51180de5642f48d64b53a1576ae8ef1adfedff38a7e9a5b01e26d0349a19633185248b7f14f2619d57e7e4b06339201d678fe4c1daa7353fe589e2e490f3a08c895cc55f6c2cf724b14a166e29462ce6027a7467cb8e799"}, @typed={0xc, 0x3b, @u64=0x5}, @typed={0x80, 0x0, @binary="e6809bef613ff948598ea42bf32352d0debbd36c97d1676e95c196aa6974e49d2325c6601ce096a74ba313e95c915dad833cedc3c6ac897e8219e250a0b1e646ef1f6057e2ef7042b13554a5b614c9347846c8a2ef39cec0ea27b02f12abc4a1d02bcdb6488c3f451e240f479fef22097c9344db385b46ba8255"}]}, 0x260}], 0x2, &(0x7f0000005480)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x18, 0x1, 0x1, [0xffffffffffffff9c]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r17, r18, r19}], 0x128, 0x4}, 0x4000) r20 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r21 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r21, 0x800442d3, &(0x7f0000000100)={0x8001, 0x100, 0x8000, @random="80c6e36cd97a", 'bridge_slave_0\x00'}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r20, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:27 executing program 3: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000080), 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) connect$bt_sco(r0, &(0x7f0000000280)={0x1f, {0x0, 0x5, 0x101, 0x6, 0x9, 0x4}}, 0x8) ioctl(r1, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000040), 0x4) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) 17:51:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmget(0x3, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:51:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x12000, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="85000000290000009c000000000095000000000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000040)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socket$nl_netfilter(0x10, 0x3, 0xc) 17:51:28 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000400)="3ec0793786a19fcb328ca1f0f7b0a163e3a083", 0x13}], 0x1}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000000c0)="96a13ab205ba0467", 0x8}], 0x1}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x11f}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="00038aa174036ed7e09593dd86dd20"], 0xf) 17:51:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x1, 0x2) ioctl$RTC_AIE_OFF(r1, 0x7002) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r2 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e000000000000000000"]}, 0x208) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x2, 0x0) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r3, 0x110, 0x4, &(0x7f0000000080)=0x8487, 0x4) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x2000, 0x0) 17:51:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000290000009c00010000000000950000000000000046063608000000000000009319105030cd48078fdbb509d2f629283b818111e113bc7ea3dc8343175ecaa0ffd6e19bd90c38cfd8b5baf0c0f36091259b6b8149b184668156863484d0855700393de071deee71a2f445c39d55d1fb73807de1dd35ec205332fd9bb4527f601b558970333c178eb99314bf1657d04305e58fd0f42045218f5b4b14dbceda3073563016dfb52f5b51c0f8f3ea92a58f2abb79132ff623e7372dbeb07651156e41867b7d01f84613843fb7764a25766394ea4e92e3ebc4e91c3effb9d60ee6278f2b36015002e6fa345f621fd4000000000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x400000) write$FUSE_INTERRUPT(r1, &(0x7f00000000c0)={0x10, 0xfffffffffffffff5, 0x3}, 0x10) prctl$PR_CAPBSET_READ(0x17, 0x1) sendto$rxrpc(r1, &(0x7f00000004c0)="a5dcfa3d86a46d5ef7b23bcb07d1c7e4438276ea045e2fd19018451839c91930e241f7308d53c94f6ea3b370967b884f327aa38c03643529c57d0e8f0bcc687e5de5eda17190e9b033efb4a57b30d4ad35c07b0d0f55a049ee037781199a3a238885e1c8a36870ecc8a238a586466316f88e3a77f2aa4512", 0x78, 0x0, &(0x7f0000000100)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e21, 0x4, @local, 0x100000001}}, 0x24) 17:51:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="85000000290000009c0000000000000095f8ff00000044e1"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000200)=""/207, 0x0, 0x0, [], 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 363.284389] device nr0 entered promiscuous mode 17:51:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000290000009c000000000000009500000000000000fe2d425660b731b95b258d12642881d431563f5bf45290c10e4c52a4db63ea4cb81719a23a55b8fca3c6bac915b5c2d234ed5b9ccf00cef4d69a446adc075a2933837179a850be85da0deb7a7210801538f3f3b7ac5f288afae779e9d1d2e59626c07897df35f1a85d9c0bb11e6dd7c23a17c49e89465fe482226e1ed94e33962c55317ca1380cfc875be2ba9101650f8edd2a5fe265f2bc8f80e626"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1, 0x10, &(0x7f0000000000)={0x3}, 0x10}, 0x70) geteuid() bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xfffffffffffffe2f, 0x0, &(0x7f0000000640)="0152831d58000000000000000000696f8f24de72601275eb03a3a2ee788b0900000020486e5ddd432a98a4440eec02b3ea789ea5ab688347741b84bed9a5d606c375ee09b108db01f10800000000000000954df0139b84dcdb63d077511b9fccfaa7b9d446acd3356ee3db1cc0", 0x0, 0xb62}, 0x96ce54761f93c02a) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f00000000c0)={0x19b, 0x4, 0x8}) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3ff, 0x202) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000100)={0xc, 0xffffffffffffffe9, 0xfa00, {&(0x7f00000004c0)}}, 0x10) 17:51:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008915, &(0x7f0000000180)="0adc1f123c123f319bd070") socket$inet(0x2, 0x3, 0x800000000000b) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='net\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2a20008}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x14, r2, 0x300, 0x70bd25, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000003cc0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x0, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000081c0)=ANY=[]}, 0x78) 17:51:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000)={0x3f}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:28 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x100, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000004c0)={0x150, r1, 0x802, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x977f}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x1b}}]}, @IPVS_CMD_ATTR_DAEMON={0x7c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7ff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bcsh0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_to_hsr\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1a}}]}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3f}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x1d}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10, 0x5}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}]}, 0x150}, 0x1, 0x0, 0x0, 0x80}, 0x40) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r2, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 363.470956] device bridge_slave_1 left promiscuous mode [ 363.483104] bridge0: port 2(bridge_slave_1) entered disabled state [ 363.562454] device bridge_slave_0 left promiscuous mode [ 363.578252] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.822857] device hsr_slave_1 left promiscuous mode [ 363.864526] device hsr_slave_0 left promiscuous mode [ 363.925597] team0 (unregistering): Port device team_slave_1 removed [ 363.958505] team0 (unregistering): Port device team_slave_0 removed [ 364.000206] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 364.045674] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 364.138273] bond0 (unregistering): Released all slaves [ 366.750242] IPVS: ftp: loaded support on port[0] = 21 [ 367.074541] chnl_net:caif_netlink_parms(): no params data found [ 367.109761] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.116243] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.124165] device bridge_slave_0 entered promiscuous mode [ 367.131735] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.138124] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.145147] device bridge_slave_1 entered promiscuous mode [ 367.164457] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 367.173985] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 367.190871] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 367.197988] team0: Port device team_slave_0 added [ 367.203540] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 367.210689] team0: Port device team_slave_1 added [ 367.215871] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 367.223300] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 367.283044] device hsr_slave_0 entered promiscuous mode [ 367.320413] device hsr_slave_1 entered promiscuous mode [ 367.360739] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 367.367703] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 367.382552] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.388906] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.395554] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.401933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.432056] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 367.438145] 8021q: adding VLAN 0 to HW filter on device bond0 [ 367.446232] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 367.454723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 367.463011] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.469631] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.480374] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 367.486443] 8021q: adding VLAN 0 to HW filter on device team0 [ 367.494955] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 367.502670] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.509022] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.518553] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 367.526817] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.533226] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.551169] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 367.558861] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 367.567218] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 367.579736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 367.591861] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 367.600791] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 367.606915] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 367.621671] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 367.632233] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 368.060797] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready 17:51:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmget(0xffffffffffffffff, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:51:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_targets\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x0, 0x1, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="85810b946ebda5cbee000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:34 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000400)="3ec0793786a19fcb328ca1f0f7b0a163e3a083", 0x13}], 0x1}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x6, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f00000000c0)="96a13ab205ba0467", 0x8}], 0x1}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x11f}) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="00038aa174036ed7e09593dd86dd20"], 0xf) 17:51:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x6, 0x800000000000b) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000827500000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff01000000030000000000000000007961023000000100000000000000000064756d6d79300000000000000000000069705f76746930000000000000000000697036746e6c30000000000000000000aaaaaaaaaabb0000000000000180c20000000000000000000000b0000000b0000000000100006d61726b5f6d000000000000000000000000000000000000000000000000000018000000000000000000000000000000000000000000000000020000000000006c6f670000000000000000000000000000000000000000000000000000000000280000000000000000f6369f8825cdf9100d4b429182416d1ca44ea545ed633d0f08a7d875af8e0000000000000000007950"]}, 0x20a) 17:51:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0xa7e, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xe}, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000002900e5afdbfce83cb50d579348b2f855bc00301e47dc77146d4ec72392b9df2f688900af00000000000000950000000000000016516000c47d8984629ce26121cd9b78a196caf5ef802b3f7183d00ccc"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000200)="020a987166788bc7adbf83185748a46289021efb9e93cf45cc381ed214bd30dd9826f7c1637ecf1d70179c30ba9ae4c3e71c1db3b857b4ae09e1b1b8d343c6893ad81111e594aa42985169282d0d65f5b1a39871a2c00795010e06fc04caf942cffa655df63ce5708465208a44777fe4b2ce2555b117c4d4192f7dfd805c65487bd4ed8b3a63e9debed7d67e286dffebc6c8a7039a286453e742122480843fb2def73d02df931bd669086098bebf60443c7d5cbebb0e0e87daf17a8e54003cf70afb43fed896a4b517541d6269d13a9680a092c797e1f1cf6d4d78d227784bbc4c60fdabdc7ac5eb5a7b6f4d3d16e6c3248c48b3da9effde9eb6dda86ac77212") [ 369.027014] device nr0 entered promiscuous mode 17:51:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000290000009c000000000000009500000000000000dace673e8a65a8f69faf389960a5e69fcfd7cda6259c791c877c7e0880a7a8f1de903e01c01cfd8d7551d8e9fb35be7eac67245e6c15a7b1d41eca9ad3529536cea2905c"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:34 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/llc\x00') ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000200)=""/225) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="85000000290000009c000000000000005e27f69c60340f403ffd56f83e56a69500000000000000ddf3292b74b7db9739a7a95328eea4d3e9edf9f6bafbb4"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_ima(0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="fae14fc4d53cbd8702"], 0x1, 0x0) flock(0xffffffffffffffff, 0x80000005) recvmmsg(0xffffffffffffffff, &(0x7f0000004640)=[{{0x0, 0x0, &(0x7f0000004200)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000280)=0x800, 0x4) r2 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) write$FUSE_ENTRY(r2, &(0x7f0000000380)={0x90, 0x0, 0x5, {0x0, 0x3, 0x5, 0x20, 0x0, 0x5b81, {0x4, 0x9, 0x0, 0x9, 0xb0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}}}, 0x90) r3 = open$dir(&(0x7f0000000180)='./file0\x00', 0x1000000000004202, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) semget$private(0x0, 0x3, 0x82) sendfile(r2, r3, 0x0, 0x7fffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r3, r3, &(0x7f0000000140)=0x8800, 0x8800000) writev(0xffffffffffffffff, &(0x7f00000023c0), 0x1000000000000252) ioctl$KVM_GET_DIRTY_LOG(r2, 0x4010ae42, &(0x7f0000000000)={0x101ff, 0x0, &(0x7f0000ffc000/0x3000)=nil}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x80000) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:34 executing program 2: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f00000000c0)) msgget$private(0x0, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffd000/0x3000)=nil) wait4(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000400)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x700, 0x0, 0x0, 0x100032, 0x0) 17:51:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmget(0xffffffffffffffff, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:51:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x208) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40000, 0x0) bind$nfc_llcp(r2, &(0x7f0000000040)={0x27, 0x1, 0x0, 0x5, 0x2, 0x8, "cebd5b9afd69fb9319bd4e8f89c4bb25445679181a3fa202e3dae2155a9e5e74f33de3ea64fe6420f3ff759bab65a724e9f1f4638fc9a2b4532a134e9bc085", 0x17}, 0x60) 17:51:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(r0, &(0x7f0000000080)="7cb777b75315920435cbdc306161de596548de4d25b1aec6fac476d4d6345c9dc7bbb6d1a36846292f4220761528a93e23641a865b6a7174d24b876bc51d526ef9cc568734571efbc2261022cff6", 0x4e, 0x40000, &(0x7f0000000100)={0x2, 0x4e24, @remote}, 0x10) socket$inet(0x2, 0x3, 0x800000000000b) pipe(&(0x7f0000000000)={0xffffffffffffffff}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$sock_inet_SIOCRTMSG(r0, 0x890d, &(0x7f0000000200)={0x0, {0x2, 0x4e20, @broadcast}, {0x2, 0x4e20, @empty}, {0x2, 0x4e24, @multicast1}, 0x0, 0x0, 0x0, 0x0, 0x2926, &(0x7f00000001c0)='ip6gre0\x00', 0x10000, 0x1, 0x5682}) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000000140)={0xf800, 0x4000}) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x218) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000300)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x190, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]}, 0x29d) 17:51:34 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000200)="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") r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) umount2(&(0x7f0000000040)='./file0\x00', 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) shmget(0xffffffffffffffff, 0x1000, 0x54001004, &(0x7f0000ffe000/0x1000)=nil) r0 = shmget$private(0x0, 0x1000, 0x240, &(0x7f0000ffe000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) openat$zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0x400200, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/fuse\x00', 0x2, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4004}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) umount2(&(0x7f0000000600)='./file0\x00', 0x0) fchdir(0xffffffffffffffff) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKROSET(r2, 0x80140912, 0x0) 17:51:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000010afeb24b493dad40000000000950000000000000092c558d1a8547e332bd07a96e6a5d28bc6882708b0a48981dbb700188325a8d8b13d896d0f5155d4e36a9220c9ee5e84055e5f77ec7babd1f52a0d349599c20a5957728c51219f51326aa336d0757bde30fbd646b1daa07d"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 369.561519] device bridge_slave_1 left promiscuous mode [ 369.569627] bridge0: port 2(bridge_slave_1) entered disabled state 17:51:34 executing program 0: times(&(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="85000000290000009c000020000000009100000000000000a12c8dfaffdab71d6b3507e099e004b8e237ccdc3e7003f4187d5160b7700da4fe7dbeff9dbde76ca6347c1e4d2a"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 369.671636] device bridge_slave_0 left promiscuous mode [ 369.678483] bridge0: port 1(bridge_slave_0) entered disabled state 17:51:34 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) lgetxattr(&(0x7f0000000440)='./file0\x00', &(0x7f0000000240)=@random={'user.', '-keyring.vboxnet1}\x00'}, &(0x7f0000000540)=""/82, 0xfffffe4c) bind$rose(r0, &(0x7f0000000100)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000300)={0x0, 0x4, 0x0, 0x4, 0x1, 0x400, 0x1, 0xfe1e, 0xd860, 0x8, 0x800}, 0x3b0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0xe, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="85a0d021e6728787cd000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207, 0x4, 0x0, [], 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x4}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r2 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000040)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f00000005c0)={{0xffff, 0x1d5}, 'port1\x00', 0x9, 0x10000, 0x100000001, 0x200, 0x1cea, 0x2, 0x6, 0x0, 0x1, 0x7ff}) 17:51:34 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x2, 0xfff, 0x1}, {{0x77359400}, 0x5, 0x20, 0xffffffff80000000}, {{}, 0x11, 0xe30, 0x4}], 0x48) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000200)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001700)={{{@in6=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000001800)=0x2a6) stat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x6, 0x4, &(0x7f0000001680)=[{&(0x7f00000004c0)="56816f8c7b56aa43b0487e349babbb2a21debe4a45589961eed7f7c9f838c0f959d650e51bf9921f7dfad82032b908bcd9e94c37d7a714025ba05ff0e1fb06f8a9f9baffed53e47c1ea65d8f94e4af6052c73676154ece9450a4300e6c3d952976dd01f45ab1ec367c5c2adaf3c45a8c5f46f373ef1d93476a1a670509d2791a06e5d37592b59caf2d67199d803869715dc63a267895c1c7c5edc375672fb584946a4cc8171ba167fc5a7a21abc32c044f970caff62e8b19ac0f503da1fe2c8e5b2f31b670719399c339621ff4ae9f2089f352eb4583aa79084bf1f7e3b9b004c47db754719e1cac3b0419b739d49189dc84f88f8a06ecda7b9499b8512ac220083ea911f0413b3a9ab29ab739b4f30b29627f32658868bbd83312ef2f57e958509b835408f642bae2cc3ba990e519e6a25372d7a155ad6855f8922feb0c16c258e023b4add5eebd1812eced86110e2f0ecc54c83cd425e9d0b99cc43cd203da35246ee9640eba5f17fd17a902bfc064b5e70bf0d56e53e51d2e6f9c66a51f329001d0aa7456f458cb26c9d8a8310421b967072bb255fefbcad8885079ab1c4dccb61a2d56cd3d97867d500280cfb7690eb32d0b02de41dc70a3be2985bd65bedfc04c96d41a9528c86a157f2282cb71dec555dd4ef8466a3d93db0949e715fcb43a2e597a87e6edfa151154c3f4e51b6487bb09589ff3e16bce397fbb3ebbcd3698db31f69c46b482af63b519022d4dbc5f1a38849395fc808a9b5ce4976090ecac2617313db9def161a2abe6f3c5ff80dbf6904a7ee671521823981c45547b3df7216b7774d57fe133f39c2101bfddec840c3d8f84e6ab53316dda6993cd65b17e58d01fe617d5324eee3870f8fc25b9f46fb341fd70a9360ec60fe2c3b91a3b05cc27ea688dd1e0f54ea1556f61f81bdc39a75289584ff92a17abd3af2aae1a7467f57e97d21ca128671d34290c6e15022d307c25618d3bb68bbd3f16f92d470fa787bdef14bd389a7db1eee049c404d3343cb46862ff432f701e529c9dd157b23be792eba774d256315b41b25972c2ee60a7ef3c4eabdabd8a798479797985b050d225fa07f03be6f0e543e8420a654348d26081b6f2c4d3ed05b34590897ded158ba9182d5836e3a9900b84b8ea833f976b9adbb6c12ae359866597f7897c3830672e662a21766bcf5c6dadce30003686ab72644f51147beb44c7e322c71b9595fd7ecbbe815dede8a68e5c9ef6c730b1bd5987a2f009443e1e8f5a504dc03c4877aa83b8527571b857f5fcaa5c6daddc6e7c97d0e2c972253aad6c31bad93f90e77d40467162e5179dbde2de397a6f3da3c9a481a2d63eeda4ef3804419383eb913e3684788b53608e7dff7aae1552007cf610d431eca737e3560d12d9c6d57da992a8c02d260d08185056bd57385edded3c90e6724c5ba7aa075e002529dd1cb7742dd3d4292bbf0b493ce3872cb3bc52b066d67793f91076a2a8a621cbb2d91dedf5a97e5dd9520f877fb76f4ed2ca6483f0826aec11ecf27720806c24b29912f381c8b0d63b371c7b4ab35b1138428906224796f0b0eb8b9a287b05c9db677c48b819d10077300446f430de2736cd1a9014c73e0cf94acd3eefec8ba2ed48e2fb13669451acf02511555ad129b7cd92f690f50a6a980ad59c4977e7538f1954e25217b216bc0f463c6c4a1e3ee57d206c64ec9aa2d0c081308a4790b7d2405c8ae07ab3f1c4775e9deb5ebd3602372d8faee0ba87526243513619b6b3e279eae483e1b5273a498d53b7062eb5007cd032ebf8b9583db8dbc87b05d8cb9f535c850ead889ab478dcd413cd1527560d98ddd6ba0e8bb4e8ff21426a2b96d43b7941c4240f1211aafe56ec6dabf4ffee8d854ff5edaecef8a5ac24510f2189b95c4f2b6455c11d6d2ea5d092435a8559884e412da36e61b5bc96f4c3390c610a68840e13827de0952f73dc32e04811aec7fdfeabdda5ee7de44ad77daecb3dc27732be6dfe22b6895551f6d970ca3a59e2beb1d49077aa3255bc09dfd709591efcf921b26b763af477826b7a781dd93b8bb931a42b2d0101d62a5e3465b4d4e2fceb2ae649878b774fddcf810fc0699099e32cd083f72fe206b8ee391efa7e79e2b14801552c40a9583ffc9287649050f682b566ab284c74f7f98571df6e46e8fa10795c5b9f70da76bda7b5804708431d0106b183c688596714d955609812e84ccf614f4662eb4365fe9cf07f7d9750318a16f610b749f5010c69c5348072a98036467d1bfab6e749fc697b8a6eff77f5ed369db1b168c8748da5f5bc20773dceb6211656cf2d6cfef9797bf0ecc9b3bbcf5a85a67c8d5738d81afefe92222e9bbda77d09b7f8fe04640146cc8096a24567b528590f0ea90175d263fe23634c4c648762abccafc7ae9f7064f00f4be3251e40b8a31b62c58f9ffd71445485558344d203a4a35d0648ca5a3c5b9c82ef7310b369f243d258b53eca5a24fc084b8cac49c0222fe755f45c12bf62d6c7117073a6536ced361546a2b7e3e5167de533489a677c673792b16443a3b0c5eb66545efc13ff2c5ff10b0005376d528865cdfd7bb9a3483de7f65372978c62d03f78fbaf1cd798c42e959b1852a461f78235b56ccb1d4b00d748b812977b34fd42db6b2f00d559b392afc501424729c25bfc049abe386529449d885aba1d122e101aa57130a10bb72d8d4163a412c42843f580f36a98b7268bad2445c5f3fe80b0b4eab2942cd7b09daa29b511675639f3f270cb0bea777d3d4ed10815bd837dec9b8e912ad00c816b5da263a971511ab4673331c33584b191396cd2deb956024d5382efb0a9922042511f480808985ef922317db18ba8cd27aaac183a255f56eb093d81d937cd623d12fd3be9c9bbf4c30b912512c9a6e2ad98b11d2f00be51099e64ecc5947e690dbc0f98a95885a7e7527f44469b8aa3aeceda8214f8d6e32148facefeb1d22b449fe48c91910bdcb2f0c0fc054917411d6e912ea0b635b1ee04eb1b17f369c0f7d1cd2af206c11df85354c88ba045332950567a818a506cdf5c02b51e85c0bf915976deba532ffb7adf7bf4b7928d4e1d2b2932e222aa1559cd0b760421e1ad289816ea794666a701e6fb67cd8fe2bef99914a53f7f67ce2fe0280d7dbc5240f2caf3c7c43635c04ba2bda4e7f9fe788064d71e54953b05d583c2b8d840c3dbe96a536ad070dc849d0afb00f867a19025a6536615899e3ba460d75ad7c19a51ce9d7c0f165e88aca35090a02da6e69510dc82622cf9159f19e24c4ac92e2c6b714d962261848613d54d71689169f285b1d7174bf446da751bf806e8378a6de259ed9935a61101216fce92baf12e99281fa1b2a4ee68591c4c25971368f27f2d88c0257413b7341ae4369f52987f2afc715b1571dbb7f22871565068c7b7ff363f2a558ee7d412b53adcd8bc5866c2a7b5e5cc0d6a1d236f73768f98cc4f57bce3b9447bd7431a2c4b0f39d7944f21b9f5e0aaae65ae44a9826d16fc3d2642756ebe9a56ed6941c2ca337be746e2e697dd7a24aee4d76445daf113ee45f2b12b06c2c77c3118bd7efa55762c5090664f880eaf195ecff08c3988bc902ccf173e3b4f5c64ce6bc2912d152ce3454e3fd7a0a0a592cd99db754731e1bb713a2752f2b3402bd47d13c9064c140f7f4ddfbea4dd1f74dcb787d367583c2111248a34d6d12020538da5d3974d75b873e057948c0505d45a0568ec2bad506cf2be91d63a1ddc9c6daa5c1d27de4ba9dd0fd42dc63add5575d1093eb8492365e616e837b980f4bfc9605fd97bf09b9703525aae0519ac6a86bdb734fe34abd76d2b9207479a715e9f75f9d660347295e1e391752a74e7e4320cf50831362b50cafe0f198ac20b9db427cb3cfdd735a19c825a6cc5c4391ce03ed6201fcde9996c06a277f05458df0214d3df2556e6ca80d340ce572ff4aa9edb2e174b06cc7a4d323d8ee79ef8295fc476f17335f0891f0f8e11d84ff49be3353af1715523a99f978f31a294676ac80259271704d5c9b56fb2a8b7cad194c10f83e84cc805ed4f4228c928f848f0e4b93c25dd62583588b3b5afdb293735a9f2c849346fa84c790e32253209151b32e3b10b3cbc4e7d12d953a1b3bc7f089683497600732814d8097a467a5c5d3fd9fbe5de8b2ab2b5ced99b9a0fd0cce905a3d57ad181d8d3217035b49b9e4f527b87de270390ee9c050654b2a8fa3f60c6f89146fbf747db876111193550e8fa9c6726da3fd088c3cff5fa80759f33e654a64f3c934d3ffd589bb999961a5220f0f2f310fdf88a42002fae575cbd62c2fc26834655b5efb21ad89024889babcbedb807792685dd61ca6fec336f924c5dd7a46df95f89312db06284fcd073a5e20524f70525ed3c698c852f6dabc7434c422d4734182bf31bbb679bb96a7f4603ad7f8d7e3ec3f5567db691b1d7d811a6bfd54576ad9af284059ff1f1fe378d06a16c83f55e6152ed9bb9e5d2c6d89be2b50d59f93c1e78bfb73a2b4655f3e85386a94c4fc21483a862b8c81f239ad139f761ce4d37c84bc3da580d716c2ff12076aa776dc747394cb37905c1baa173aa58e4740ad453fce15a96dc8ecf8597ad0b2215b92547a124ea5c8ed75413a55dcca5a5df2362356fdab82db401695efc47b380cb2d2fe5434fb34abfb34285d9dda827f244a8cff76e9236f6f2ce1b0138f6fce47ac84ad095ac4eba986f80ddd7e3c038b051d6a85fd98976f57b2f0185a2e16ad0942acdb00bce49c1098f8620db4517d20f86a96f2ffd20c204a64561150d6c8bfef674effc36f2e85f29e4dedb97d9840b3e4389bb45794fd001716a36c7b8ab9e24119493b1ca40f3d3703bdb5ef54b820bf2842aea88662d4264e50e3470fe12e72d2f6ae2e3102787a9620a929818c802d3eb8a81f0186b8bb6f23486acaf8ffdd3779008e99ba3659b123ff4acdc6f93b35ae59f38cbcfbca58e0aefb1c622d10ebaae38904b4e8e2d305598152d4e5c792e65a20934b1527f58b2833009d618034875523d84ce5364a01d2e524c060207b48467e65e03950160bccf2a823344d4fec245dff0312fe2f9ca3cf8dbc2a4d131a7c6830b806a1c44febdff093915a59e5a5afe16296183a7d5df74b8109182696aa464641429807914eb420f5c5287d81e865add24c7a36be55c62217ab0114c7f20be8e932a179de655bd5e626c08b275eeb50b9c2ed815d82f2642dccbd4741890813de5d5d99533e084e288eb9877b497954fa97a85912c434d9cf12ea395ca234d62562a3429f088d05b0d1f808a7d3b59c829124b8b38aa3446a11402736981062128aa07079634520d2f5d2e6c40b7651066b171b3e7042ccf3ee28848e6f48d8333a214d67ca55b2ab1f6be31f685c6a305ea49e027ffbaf8549af35c56e7be6d76eec90f178af5998653b580b9462188d1adeee5d4c6a47e7f149f6bdb51146588de3a050f83613f7ce68e2ec07f1a96b0de37c1e9dee1623ea9ef5ecb0e5b687426a93728a00ca39d54e136b32958a7e9ed0728a0062feadf54c1190f147928f925ff9967c9d62b6b4a46bd9a3ab82d0f7102fa5e1f050f340bcce23bece4303a9eb37af74200bb6caa7be04261518acd6cf6b4da4ab39369315bc775d4599af6efdb9a9e99ce4c92651da0cbbd0cac8c3b0910c0c90ddc9a50a93bcff68b2ac99b7c8153f156d26ab3a8962433c1faf599e5e2658c80d51921e25956c91e9353ca9680e858023eb76c11f32bc905b40bdd051f6915bd242c84e249b3e69d322ebbdd7d66", 0x1000, 0x800}, {&(0x7f00000014c0)="8262d211010803c467652c39ae9a20f111f044773bf8d4868dc74f8dce4da36b9c63f3b50e909e24b1b09cf615f4d1c9b3cbe92f37ea451ae7b77b42f265b108", 0x40, 0x7}, {&(0x7f0000001500)="7aec13a5a408669d9a885b3dea4dc3f8ca88632fb452835fef04ab58db1fc9d560a499cf3d7cee841e4539982cb601b75e283e25daa9263c3a020e92be4588596bfb114def13e585a7c665b44de50a9f1c5a10e6f009794ecfb17e62995ac0f601bb48fda3", 0x65, 0x401}, {&(0x7f0000001580)="ef657e287048a2031e2a85012858a2b154b07a33329d3f27c126a671a7d0ce2e18c3e96f08c0b19996f1ec18c80dd85cc3c435f4f46c5a01db17782c5cdf3f06f5a73971cb44ac0f5f850dafc744794716289a19505ff89b7a046b61ab0cd918983d56d196c25ba6ee52850278a2b62a22fd0055cca9d8d6b54231eecf05088c8b35fa4f62a65a280b79986cb9b6320f5ee900133c516e9e494c7075091885e8de515b1372665b25c2adbf2259092bcf228a9d490777ce1f2dd573548c8a93e02f4d379f21805e6b3c6d9fb5f518cfeea0df98c166e8143975", 0xd9, 0x7574}], 0x4000, &(0x7f0000001900)={[{@rodir='rodir'}], [{@hash='hash'}, {@subj_type={'subj_type', 0x3d, 'syzkaller\x00'}}, {@audit='audit'}, {@uid_gt={'uid>', r1}}, {@dont_measure='dont_measure'}, {@smackfsdef={'smackfsdef'}}, {@euid_gt={'euid>', r2}}]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f0000001980)=ANY=[@ANYBLOB="0800000000000000950000000000000000004a870eb7e972fb5c9282875a89fa6c920000000000"], &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r3, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 369.734304] EXT4-fs (sda1): re-mounted. Opts: 17:51:34 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 369.861507] EXT4-fs (sda1): re-mounted. Opts: 17:51:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x80040) ioctl$SIOCNRDECOBS(r1, 0x89e2) 17:51:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xffffffffffffff60, &(0x7f0000000340)=""/207, 0x0, 0xfffffffffffffffe, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x6}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x400000000}, 0x10}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) 17:51:35 executing program 2: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f00000000c0)) msgget$private(0x0, 0x0) prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffd000/0x3000)=nil) wait4(0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000002600)='./file0\x00', &(0x7f0000000400)='bpf\x00', 0x2001001, &(0x7f0000002640)=ANY=[]) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x700, 0x0, 0x0, 0x100032, 0x0) [ 369.952432] device hsr_slave_1 left promiscuous mode [ 369.999673] device hsr_slave_0 left promiscuous mode 17:51:35 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x3, &(0x7f00000000c0)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x29, 0xffffff9c}}, &(0x7f0000000080)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000340)=""/207}, 0x48) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x2, 0x801) readlinkat(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)=""/242, 0xf2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="015283e0627bcb630f9c79551d4d", 0x0, 0xb62}, 0x28) [ 370.054282] team0 (unregistering): Port device team_slave_1 removed [ 370.105691] team0 (unregistering): Port device team_slave_0 removed [ 370.187407] EXT4-fs (sda1): re-mounted. Opts: [ 370.205507] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 370.212947] ------------[ cut here ]------------ [ 370.217973] WARNING: CPU: 0 PID: 3145 at kernel/bpf/core.c:537 bpf_jit_free+0x23a/0x310 [ 370.226157] Kernel panic - not syncing: panic_on_warn set ... [ 370.226157] [ 370.233522] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 370.240183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.249559] Workqueue: events bpf_prog_free_deferred [ 370.254688] Call Trace: [ 370.257280] dump_stack+0x138/0x19c [ 370.260983] panic+0x1f2/0x438 [ 370.264184] ? add_taint.cold+0x16/0x16 [ 370.268265] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 370.275373] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 370.280293] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 370.287153] Oops: 0000 [#1] PREEMPT SMP KASAN [ 370.291746] Modules linked in: [ 370.294939] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 370.301593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.310950] Workqueue: events bpf_prog_free_deferred [ 370.316046] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 370.322105] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 370.327564] RSP: 0018:ffff88809bc87810 EFLAGS: 00010806 [ 370.332921] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 370.340223] RDX: 0000000000000000 RSI: ffffffff869d1e40 RDI: ffffc900018e9002 [ 370.347486] RBP: ffff88809bc87850 R08: 0000000000000000 R09: ffff88809bcaef70 [ 370.354922] R10: ffff88809bcaef50 R11: ffff88809bcae680 R12: ffff88805a677118 [ 370.362185] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 370.369448] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 370.377673] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 370.383546] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 370.390814] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 370.398078] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 370.405356] Call Trace: [ 370.407960] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 370.415065] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 370.419980] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 370.426826] Oops: 0000 [#2] PREEMPT SMP KASAN [ 370.431312] Modules linked in: [ 370.434540] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 370.441193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.450554] Workqueue: events bpf_prog_free_deferred [ 370.455649] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 370.461702] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 370.467144] RSP: 0018:ffff88809bc87368 EFLAGS: 00010806 [ 370.472503] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 370.479762] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 370.487039] RBP: ffff88809bc873a8 R08: 0000000000000000 R09: 0000000000000001 [ 370.494300] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 370.501575] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 370.508842] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 370.517061] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 370.522939] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 370.530203] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 370.543812] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 370.551077] Call Trace: [ 370.553677] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 370.560791] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 370.565708] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 370.572552] Oops: 0000 [#3] PREEMPT SMP KASAN [ 370.577041] Modules linked in: [ 370.580235] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 370.588406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.597787] Workqueue: events bpf_prog_free_deferred [ 370.602889] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 370.608947] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 370.614388] RSP: 0018:ffff88809bc86eb8 EFLAGS: 00010806 [ 370.619745] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 370.627012] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 370.634281] RBP: ffff88809bc86ef8 R08: 0000000000000000 R09: 0000000000000001 [ 370.641547] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 370.648809] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 370.656079] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 370.664301] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 370.670184] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 370.677452] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 370.684715] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 370.691996] Call Trace: [ 370.694598] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 370.701708] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 370.706631] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 370.713479] Oops: 0000 [#4] PREEMPT SMP KASAN [ 370.718668] Modules linked in: [ 370.721861] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 370.728522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.737882] Workqueue: events bpf_prog_free_deferred [ 370.742983] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 370.749120] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 370.754582] RSP: 0018:ffff88809bc86a08 EFLAGS: 00010806 [ 370.759940] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 370.767217] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 370.774480] RBP: ffff88809bc86a48 R08: 0000000000000000 R09: 0000000000000001 [ 370.781740] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 370.789022] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 370.796284] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 370.804500] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 370.810373] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 370.817657] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 370.824922] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 370.832184] Call Trace: [ 370.834810] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 370.841919] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 370.846844] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 370.853804] Oops: 0000 [#5] PREEMPT SMP KASAN [ 370.858289] Modules linked in: [ 370.861497] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 370.868155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 370.877520] Workqueue: events bpf_prog_free_deferred [ 370.882619] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 370.888673] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 370.894113] RSP: 0018:ffff88809bc86558 EFLAGS: 00010806 [ 370.899487] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 370.906753] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 370.914018] RBP: ffff88809bc86598 R08: 0000000000000000 R09: 0000000000000001 [ 370.921283] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 370.928550] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 370.935819] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 370.944041] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 370.950028] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 370.957316] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 370.964635] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 370.971899] Call Trace: [ 370.974508] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 370.981617] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 370.986564] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 370.993416] Oops: 0000 [#6] PREEMPT SMP KASAN [ 370.997902] Modules linked in: [ 371.001092] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 371.007745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.017107] Workqueue: events bpf_prog_free_deferred [ 371.022207] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 371.028270] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 371.033711] RSP: 0018:ffff88809bc860a8 EFLAGS: 00010806 [ 371.039066] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 371.046337] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 371.053608] RBP: ffff88809bc860e8 R08: 0000000000000000 R09: 0000000000000001 [ 371.060876] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 371.068165] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 371.075448] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 371.083666] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 371.089557] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 371.096827] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 371.104089] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 371.111361] Call Trace: [ 371.113977] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 371.121086] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 371.126002] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 371.132868] Oops: 0000 [#7] PREEMPT SMP KASAN [ 371.137362] Modules linked in: [ 371.140551] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 371.147206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.156568] Workqueue: events bpf_prog_free_deferred [ 371.161668] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 371.167721] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 371.173159] RSP: 0018:ffff88809bc85bf8 EFLAGS: 00010806 [ 371.178518] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 371.185970] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 371.193236] RBP: ffff88809bc85c38 R08: 0000000000000000 R09: 0000000000000001 [ 371.200499] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 371.207769] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 371.215035] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 371.223259] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 371.229222] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 371.236485] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 371.243747] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 371.251006] Call Trace: [ 371.253610] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 371.260719] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 371.265640] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 371.272491] Oops: 0000 [#8] PREEMPT SMP KASAN [ 371.276974] Modules linked in: [ 371.280185] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 371.286842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.296204] Workqueue: events bpf_prog_free_deferred [ 371.301300] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 371.307373] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 371.312811] RSP: 0018:ffff88809bc85748 EFLAGS: 00010806 [ 371.318165] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 371.325431] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 371.332703] RBP: ffff88809bc85788 R08: 0000000000000000 R09: 0000000000000001 [ 371.339968] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 371.347232] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 371.354519] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 371.362747] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 371.368622] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 371.375907] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 371.383171] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 371.390448] Call Trace: [ 371.393051] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 371.400159] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 371.405077] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 371.411931] Oops: 0000 [#9] PREEMPT SMP KASAN [ 371.416506] Modules linked in: [ 371.419694] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 371.426358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.435719] Workqueue: events bpf_prog_free_deferred [ 371.440836] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 371.446891] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 371.452363] RSP: 0018:ffff88809bc85298 EFLAGS: 00010806 [ 371.457745] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 371.465007] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 371.472275] RBP: ffff88809bc852d8 R08: 0000000000000000 R09: 0000000000000001 [ 371.479536] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 371.486805] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 371.494071] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 371.502291] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 371.508163] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 371.515431] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 371.522695] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 371.531403] Call Trace: [ 371.534004] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 371.541142] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 371.546065] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 371.552922] Oops: 0000 [#10] PREEMPT SMP KASAN [ 371.557513] Modules linked in: [ 371.560704] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 371.567367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.576731] Workqueue: events bpf_prog_free_deferred [ 371.581837] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 371.588528] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 371.593990] RSP: 0018:ffff88809bc84de8 EFLAGS: 00010806 [ 371.599361] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 371.606631] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 371.613904] RBP: ffff88809bc84e28 R08: 0000000000000000 R09: 0000000000000001 [ 371.621171] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 371.628438] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 371.635732] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 371.643963] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 371.649842] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 371.657111] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 371.664382] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 371.680340] Call Trace: [ 371.682954] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 371.690073] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 371.694994] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 371.701935] Oops: 0000 [#11] PREEMPT SMP KASAN [ 371.706512] Modules linked in: [ 371.709705] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 371.716392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.725752] Workqueue: events bpf_prog_free_deferred [ 371.730859] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 371.736929] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 371.742390] RSP: 0018:ffff88809bc84938 EFLAGS: 00010806 [ 371.747750] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 371.755027] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 371.762314] RBP: ffff88809bc84978 R08: 0000000000000000 R09: 0000000000000001 [ 371.769617] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 371.776889] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 371.784163] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 371.792396] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 371.798275] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 371.805546] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 371.812812] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 371.820082] Call Trace: [ 371.822686] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 371.829806] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 371.834736] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 371.841590] Oops: 0000 [#12] PREEMPT SMP KASAN [ 371.846163] Modules linked in: [ 371.849368] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 371.856025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 371.865403] Workqueue: events bpf_prog_free_deferred [ 371.870510] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 371.876567] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 371.882013] RSP: 0018:ffff88809bc84488 EFLAGS: 00010806 [ 371.887381] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 371.894649] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 371.901941] RBP: ffff88809bc844c8 R08: 0000000000000000 R09: 0000000000000001 [ 371.909212] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 371.916481] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 371.923767] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 371.932010] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 371.937973] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 371.945241] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 371.952509] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 371.959777] Call Trace: [ 371.962383] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 371.969505] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 371.974429] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 371.981279] Oops: 0000 [#13] PREEMPT SMP KASAN [ 371.985850] Modules linked in: [ 371.989044] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 371.995701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.005087] Workqueue: events bpf_prog_free_deferred [ 372.010201] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 372.016257] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 372.021698] RSP: 0018:ffff88809bc83fd8 EFLAGS: 00010806 [ 372.027058] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 372.034323] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 372.041690] RBP: ffff88809bc84018 R08: 0000000000000000 R09: 0000000000000001 [ 372.048957] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 372.056244] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 372.063515] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 372.071741] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 372.077619] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 372.084887] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 372.092176] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 372.099468] Call Trace: [ 372.102071] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 372.109184] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 372.114111] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 372.120967] Oops: 0000 [#14] PREEMPT SMP KASAN [ 372.125636] Modules linked in: [ 372.128840] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 372.135492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.144865] Workqueue: events bpf_prog_free_deferred [ 372.150318] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 372.156520] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 372.161983] RSP: 0018:ffff88809bc83b28 EFLAGS: 00010806 [ 372.167409] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 372.174723] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 372.181992] RBP: ffff88809bc83b68 R08: 0000000000000000 R09: 0000000000000001 [ 372.189263] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 372.196604] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 372.203884] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 372.212115] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 372.217993] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 372.225286] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 372.232549] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 372.239832] Call Trace: [ 372.242436] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 372.249543] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 372.254467] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 372.261319] Oops: 0000 [#15] PREEMPT SMP KASAN [ 372.265902] Modules linked in: [ 372.269110] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 372.276115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.285503] Workqueue: events bpf_prog_free_deferred [ 372.290611] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 372.296673] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 372.302121] RSP: 0018:ffff88809bc83678 EFLAGS: 00010806 [ 372.307477] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 372.314757] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 372.322031] RBP: ffff88809bc836b8 R08: 0000000000000000 R09: 0000000000000001 [ 372.329296] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 372.336564] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 372.344005] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 372.352226] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 372.358100] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 372.365390] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 372.372655] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 372.379922] Call Trace: [ 372.382525] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 372.389633] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 372.394553] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 372.401404] Oops: 0000 [#16] PREEMPT SMP KASAN [ 372.406066] Modules linked in: [ 372.409254] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 372.415911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.425287] Workqueue: events bpf_prog_free_deferred [ 372.430479] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 372.436754] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 372.442195] RSP: 0018:ffff88809bc831c8 EFLAGS: 00010806 [ 372.447555] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 372.454824] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 372.462094] RBP: ffff88809bc83208 R08: 0000000000000000 R09: 0000000000000001 [ 372.469394] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 372.476717] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 372.484001] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 372.492222] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 372.498110] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 372.505382] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 372.512651] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 372.519920] Call Trace: [ 372.522609] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 372.529745] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 372.542665] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 372.549525] Oops: 0000 [#17] PREEMPT SMP KASAN [ 372.554098] Modules linked in: [ 372.557291] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 372.563958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.573364] Workqueue: events bpf_prog_free_deferred [ 372.578478] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 372.584551] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 372.591529] RSP: 0018:ffff88809bc82d18 EFLAGS: 00010806 [ 372.596902] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 372.604184] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 372.611453] RBP: ffff88809bc82d58 R08: 0000000000000000 R09: 0000000000000001 [ 372.618727] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 372.625999] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 372.633292] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 372.641536] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 372.647436] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 372.654708] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 372.661978] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 372.669248] Call Trace: [ 372.671855] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 372.678974] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 372.683899] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 372.690760] Oops: 0000 [#18] PREEMPT SMP KASAN [ 372.695349] Modules linked in: [ 372.698568] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 372.705227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.714592] Workqueue: events bpf_prog_free_deferred [ 372.721097] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 372.727157] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 372.732597] RSP: 0018:ffff88809bc82868 EFLAGS: 00010806 [ 372.737956] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 372.745220] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 372.752482] RBP: ffff88809bc828a8 R08: 0000000000000000 R09: 0000000000000001 [ 372.759747] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 372.767014] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 372.774302] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 372.782535] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 372.788412] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 372.795684] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 372.802955] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 372.810225] Call Trace: [ 372.812824] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 372.819931] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 372.824853] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 372.831700] Oops: 0000 [#19] PREEMPT SMP KASAN [ 372.836268] Modules linked in: [ 372.839454] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 372.846129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.855488] Workqueue: events bpf_prog_free_deferred [ 372.860593] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 372.866661] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 372.872120] RSP: 0018:ffff88809bc823b8 EFLAGS: 00010806 [ 372.877496] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 372.884762] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 372.892026] RBP: ffff88809bc823f8 R08: 0000000000000000 R09: 0000000000000001 [ 372.899292] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 372.906562] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 372.913828] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 372.922131] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 372.928003] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 372.935271] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 372.942539] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 372.949802] Call Trace: [ 372.952420] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 372.959530] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 372.964451] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 372.971298] Oops: 0000 [#20] PREEMPT SMP KASAN [ 372.975870] Modules linked in: [ 372.979063] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 372.985723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 372.995092] Workqueue: events bpf_prog_free_deferred [ 373.000206] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 373.006266] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 373.011707] RSP: 0018:ffff88809bc81f08 EFLAGS: 00010806 [ 373.017063] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 373.024347] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 373.031618] RBP: ffff88809bc81f48 R08: 0000000000000000 R09: 0000000000000001 [ 373.038889] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 373.046156] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 373.053425] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 373.061647] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 373.067546] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 373.074818] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 373.082083] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 373.089354] Call Trace: [ 373.091954] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 373.099068] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 373.104010] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 373.110867] Oops: 0000 [#21] PREEMPT SMP KASAN [ 373.115440] Modules linked in: [ 373.118632] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 373.125297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.134679] Workqueue: events bpf_prog_free_deferred [ 373.139782] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 373.145844] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 373.151291] RSP: 0018:ffff88809bc81a58 EFLAGS: 00010806 [ 373.156690] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 373.163971] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 373.171236] RBP: ffff88809bc81a98 R08: 0000000000000000 R09: 0000000000000001 [ 373.178506] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 373.185781] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 373.193045] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 373.201262] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 373.207135] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 373.214404] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 373.221665] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 373.228925] Call Trace: [ 373.231524] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 373.238633] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 373.243563] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 373.250415] Oops: 0000 [#22] PREEMPT SMP KASAN [ 373.254986] Modules linked in: [ 373.258175] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 373.264831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.274192] Workqueue: events bpf_prog_free_deferred [ 373.279289] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 373.285436] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 373.290872] RSP: 0018:ffff88809bc815a8 EFLAGS: 00010806 [ 373.296226] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 373.303490] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 373.310755] RBP: ffff88809bc815e8 R08: 0000000000000000 R09: 0000000000000001 [ 373.318021] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 373.325305] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 373.332588] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 373.340810] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 373.346689] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 373.353959] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 373.361223] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 373.368514] Call Trace: [ 373.371135] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 373.378264] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 373.383183] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 373.390031] Oops: 0000 [#23] PREEMPT SMP KASAN [ 373.394608] Modules linked in: [ 373.397800] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 373.404456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.413838] Workqueue: events bpf_prog_free_deferred [ 373.418942] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 373.425006] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 373.430451] RSP: 0018:ffff88809bc810f8 EFLAGS: 00010806 [ 373.435811] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 373.443077] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 373.450362] RBP: ffff88809bc81138 R08: 0000000000000000 R09: 0000000000000001 [ 373.457626] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 373.464892] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 373.472165] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 373.480393] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 373.486266] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 373.493531] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 373.500795] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 373.508088] Call Trace: [ 373.510692] BUG: unable to handle kernel paging request at fffffbfff4003000 [ 373.517803] IP: bpf_prog_kallsyms_find+0x155/0x280 [ 373.522725] PGD 21ffed067 P4D 21ffed067 PUD 21ffec067 PMD 9c7d2067 PTE 0 [ 373.529578] Oops: 0000 [#24] PREEMPT SMP KASAN [ 373.534238] Modules linked in: [ 373.537431] CPU: 0 PID: 3145 Comm: kworker/0:2 Not tainted 4.14.114 #4 [ 373.544093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 373.553460] Workqueue: events bpf_prog_free_deferred [ 373.558565] task: ffff88809bcae680 task.stack: ffff88809bc80000 [ 373.564713] RIP: 0010:bpf_prog_kallsyms_find+0x155/0x280 [ 373.570150] RSP: 0018:ffff88809bc80c48 EFLAGS: 00010806 [ 373.575510] RAX: 1ffffffff4003000 RBX: ffffffffa0018000 RCX: 0000000000000002 [ 373.582780] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc900018e9002 [ 373.590053] RBP: ffff88809bc80c88 R08: 0000000000000000 R09: 0000000000000001 [ 373.597420] R10: 0000000000000000 R11: ffff88809bcae680 R12: ffff88805a677118 [ 373.604689] R13: dffffc0000000000 R14: ffff88805a677118 R15: ffffffffffffffff [ 373.611965] FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 373.620379] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 373.626256] CR2: fffffbfff4003000 CR3: 0000000096d9a000 CR4: 00000000001406f0 [ 373.633641] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 373.647598] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 373.654867] Call Trace: [ 373.657469] BUG: unable to handle kernel paging request at fffffbfff4003000