[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 105.029103] audit: type=1800 audit(1551826944.071:25): pid=11346 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 105.048580] audit: type=1800 audit(1551826944.071:26): pid=11346 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 105.068035] audit: type=1800 audit(1551826944.101:27): pid=11346 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.24' (ECDSA) to the list of known hosts. 2019/03/05 23:02:40 fuzzer started 2019/03/05 23:02:46 dialing manager at 10.128.0.26:38547 2019/03/05 23:02:46 syscalls: 1 2019/03/05 23:02:46 code coverage: enabled 2019/03/05 23:02:46 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/03/05 23:02:46 extra coverage: extra coverage is not supported by the kernel 2019/03/05 23:02:46 setuid sandbox: enabled 2019/03/05 23:02:46 namespace sandbox: enabled 2019/03/05 23:02:46 Android sandbox: /sys/fs/selinux/policy does not exist 2019/03/05 23:02:46 fault injection: enabled 2019/03/05 23:02:46 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/03/05 23:02:46 net packet injection: enabled 2019/03/05 23:02:46 net device setup: enabled 23:05:37 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) syzkaller login: [ 299.446462] IPVS: ftp: loaded support on port[0] = 21 [ 299.622816] chnl_net:caif_netlink_parms(): no params data found [ 299.716583] bridge0: port 1(bridge_slave_0) entered blocking state [ 299.723561] bridge0: port 1(bridge_slave_0) entered disabled state [ 299.732377] device bridge_slave_0 entered promiscuous mode [ 299.743111] bridge0: port 2(bridge_slave_1) entered blocking state [ 299.749627] bridge0: port 2(bridge_slave_1) entered disabled state [ 299.758299] device bridge_slave_1 entered promiscuous mode [ 299.795759] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 299.807376] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 299.841963] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 299.850785] team0: Port device team_slave_0 added [ 299.858257] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 299.867103] team0: Port device team_slave_1 added [ 299.875031] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 299.883741] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 300.047917] device hsr_slave_0 entered promiscuous mode [ 300.202714] device hsr_slave_1 entered promiscuous mode [ 300.443435] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 300.451243] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 300.484759] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.491349] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.498716] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.505316] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.602764] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 300.608957] 8021q: adding VLAN 0 to HW filter on device bond0 [ 300.625170] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 300.640339] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 300.651988] bridge0: port 1(bridge_slave_0) entered disabled state [ 300.662383] bridge0: port 2(bridge_slave_1) entered disabled state [ 300.676755] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 300.696547] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 300.702783] 8021q: adding VLAN 0 to HW filter on device team0 [ 300.720471] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 300.728327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 300.738154] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 300.746930] bridge0: port 1(bridge_slave_0) entered blocking state [ 300.753566] bridge0: port 1(bridge_slave_0) entered forwarding state [ 300.775831] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 300.783775] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 300.794529] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 300.803603] bridge0: port 2(bridge_slave_1) entered blocking state [ 300.810145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 300.831449] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 300.839333] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 300.859297] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 300.866412] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 300.886162] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 300.893244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 300.903337] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 300.919713] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 300.927759] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 300.936256] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 300.946182] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 300.965216] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 300.978854] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 300.987097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 300.995780] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 301.004436] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 301.013886] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 301.029397] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 301.035603] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 301.066790] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 301.093496] 8021q: adding VLAN 0 to HW filter on device batadv0 23:05:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:40 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 303.167142] IPVS: ftp: loaded support on port[0] = 21 [ 303.345648] chnl_net:caif_netlink_parms(): no params data found [ 303.425800] bridge0: port 1(bridge_slave_0) entered blocking state [ 303.432497] bridge0: port 1(bridge_slave_0) entered disabled state [ 303.440990] device bridge_slave_0 entered promiscuous mode [ 303.452229] bridge0: port 2(bridge_slave_1) entered blocking state [ 303.458756] bridge0: port 2(bridge_slave_1) entered disabled state [ 303.468853] device bridge_slave_1 entered promiscuous mode 23:05:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 303.518759] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 303.548540] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 303.583721] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 303.592649] team0: Port device team_slave_0 added [ 303.624028] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 303.633090] team0: Port device team_slave_1 added [ 303.654324] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 303.672273] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 303.858265] device hsr_slave_0 entered promiscuous mode [ 304.013516] device hsr_slave_1 entered promiscuous mode [ 304.173308] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 304.181005] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 304.214771] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.221355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.228646] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.235248] bridge0: port 1(bridge_slave_0) entered forwarding state [ 304.337705] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 304.344591] 8021q: adding VLAN 0 to HW filter on device bond0 [ 304.354366] bridge0: port 1(bridge_slave_0) entered disabled state [ 304.363428] bridge0: port 2(bridge_slave_1) entered disabled state [ 304.378169] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 304.398710] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 304.414490] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 304.433589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 304.441543] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 304.457974] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 304.464802] 8021q: adding VLAN 0 to HW filter on device team0 [ 304.496806] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 304.504609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 304.514893] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 304.523309] bridge0: port 1(bridge_slave_0) entered blocking state [ 304.529820] bridge0: port 1(bridge_slave_0) entered forwarding state 23:05:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 304.557285] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 304.565416] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 304.574478] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 304.582833] bridge0: port 2(bridge_slave_1) entered blocking state [ 304.589334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 304.605673] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 304.612865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 304.638879] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 304.646044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 23:05:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 304.679309] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 304.686458] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 304.696204] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 304.717444] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 304.727626] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 304.736275] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 304.745310] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 304.767373] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 304.802459] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 304.811198] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 304.826848] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 304.843052] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 23:05:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 304.851813] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 304.873830] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 304.879984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 304.947810] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 304.989357] 8021q: adding VLAN 0 to HW filter on device batadv0 23:05:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:44 executing program 1: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000bc9000/0x4000)=nil) socket$l2tp(0x18, 0x1, 0x1) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r1, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) lstat(0x0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000000300)) fchownat(0xffffffffffffffff, 0x0, r2, 0x0, 0x900) write$binfmt_misc(r1, &(0x7f0000000440)={'syz1'}, 0x1200e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r4) 23:05:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 305.444882] hrtimer: interrupt took 36670 ns 23:05:44 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:44 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000001c0)={0x13, 0x10, 0xfa00, {&(0x7f00000009c0), r6}}, 0x18) sendmsg$kcm(r3, &(0x7f0000001900)={&(0x7f0000000700)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001840), 0x1, 0x0, 0xfd81}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) close(r3) 23:05:44 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:44 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:45 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:45 executing program 0: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:45 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000001c0)={0x13, 0x10, 0xfa00, {&(0x7f00000009c0), r6}}, 0x18) sendmsg$kcm(r3, &(0x7f0000001900)={&(0x7f0000000700)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001840), 0x1, 0x0, 0xfd81}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) close(r3) 23:05:45 executing program 0: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:45 executing program 0: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:46 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000001c0)={0x13, 0x10, 0xfa00, {&(0x7f00000009c0), r6}}, 0x18) sendmsg$kcm(r3, &(0x7f0000001900)={&(0x7f0000000700)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001840), 0x1, 0x0, 0xfd81}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) close(r3) 23:05:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:47 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000001c0)={0x13, 0x10, 0xfa00, {&(0x7f00000009c0), r6}}, 0x18) sendmsg$kcm(r3, &(0x7f0000001900)={&(0x7f0000000700)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001840), 0x1, 0x0, 0xfd81}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) close(r3) 23:05:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 23:05:48 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000001c0)={0x13, 0x10, 0xfa00, {&(0x7f00000009c0), r6}}, 0x18) sendmsg$kcm(r3, &(0x7f0000001900)={&(0x7f0000000700)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001840), 0x1, 0x0, 0xfd81}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) close(r3) [ 309.486187] IPVS: ftp: loaded support on port[0] = 21 [ 309.706472] chnl_net:caif_netlink_parms(): no params data found [ 309.788149] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.794879] bridge0: port 1(bridge_slave_0) entered disabled state [ 309.803528] device bridge_slave_0 entered promiscuous mode [ 309.814200] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.820839] bridge0: port 2(bridge_slave_1) entered disabled state [ 309.829829] device bridge_slave_1 entered promiscuous mode [ 309.867518] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 309.879587] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:05:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 309.933584] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 309.943291] team0: Port device team_slave_0 added [ 309.952697] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 309.961465] team0: Port device team_slave_1 added [ 309.995639] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 310.005455] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 23:05:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 310.097480] device hsr_slave_0 entered promiscuous mode [ 310.122493] device hsr_slave_1 entered promiscuous mode 23:05:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 310.163872] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 310.173486] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 310.206530] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.213195] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.220425] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.227104] bridge0: port 1(bridge_slave_0) entered forwarding state 23:05:49 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000001c0)={0x13, 0x10, 0xfa00, {&(0x7f00000009c0), r6}}, 0x18) sendmsg$kcm(r3, &(0x7f0000001900)={&(0x7f0000000700)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001840), 0x1, 0x0, 0xfd81}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) close(r3) [ 310.425655] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 310.431882] 8021q: adding VLAN 0 to HW filter on device bond0 [ 310.451017] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 310.465723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 310.478878] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.488721] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.552572] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 310.573080] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 310.579224] 8021q: adding VLAN 0 to HW filter on device team0 [ 310.598467] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 310.607049] bridge0: port 1(bridge_slave_0) entered blocking state [ 310.613643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 310.719705] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 310.728199] bridge0: port 2(bridge_slave_1) entered blocking state [ 310.734852] bridge0: port 2(bridge_slave_1) entered forwarding state [ 310.746292] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 310.760190] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 310.779088] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 310.787617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 310.796966] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 310.812877] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 310.821358] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 310.829902] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 310.848510] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 310.857461] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 310.867117] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 310.886051] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 310.892393] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 310.927005] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 310.951890] 8021q: adding VLAN 0 to HW filter on device batadv0 23:05:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:50 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000040)) 23:05:50 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000001c0)={0x13, 0x10, 0xfa00, {&(0x7f00000009c0), r6}}, 0x18) sendmsg$kcm(r3, &(0x7f0000001900)={&(0x7f0000000700)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001840), 0x1, 0x0, 0xfd81}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) close(r3) 23:05:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:51 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000001c0)={0x13, 0x10, 0xfa00, {&(0x7f00000009c0), r6}}, 0x18) sendmsg$kcm(r3, &(0x7f0000001900)={&(0x7f0000000700)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001840), 0x1, 0x0, 0xfd81}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r3) 23:05:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 23:05:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 23:05:52 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000001c0)={0x13, 0x10, 0xfa00, {&(0x7f00000009c0), r6}}, 0x18) sendmsg$kcm(r3, &(0x7f0000001900)={&(0x7f0000000700)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001840), 0x1, 0x0, 0xfd81}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r3) 23:05:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 23:05:52 executing program 0 (fault-call:4 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:53 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000001c0)={0x13, 0x10, 0xfa00, {&(0x7f00000009c0), r6}}, 0x18) sendmsg$kcm(r3, &(0x7f0000001900)={&(0x7f0000000700)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001840), 0x1, 0x0, 0xfd81}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r3) 23:05:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 315.204073] device bridge_slave_1 left promiscuous mode [ 315.209973] bridge0: port 2(bridge_slave_1) entered disabled state [ 315.334826] device bridge_slave_0 left promiscuous mode [ 315.340680] bridge0: port 1(bridge_slave_0) entered disabled state 23:05:54 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000001c0)={0x13, 0x10, 0xfa00, {&(0x7f00000009c0), r6}}, 0x18) sendmsg$kcm(r3, &(0x7f0000001900)={&(0x7f0000000700)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001840), 0x1, 0x0, 0xfd81}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) close(r3) [ 315.733113] device hsr_slave_1 left promiscuous mode 23:05:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 315.790034] device hsr_slave_0 left promiscuous mode [ 315.873427] team0 (unregistering): Port device team_slave_1 removed [ 315.912145] team0 (unregistering): Port device team_slave_0 removed [ 315.948721] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 316.002199] bond0 (unregistering): Releasing backup interface bond_slave_0 23:05:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 316.139634] bond0 (unregistering): Released all slaves 23:05:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:55 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000001c0)={0x13, 0x10, 0xfa00, {&(0x7f00000009c0), r6}}, 0x18) sendmsg$kcm(r3, &(0x7f0000001900)={&(0x7f0000000700)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001840), 0x1, 0x0, 0xfd81}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) close(r3) 23:05:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 318.020816] IPVS: ftp: loaded support on port[0] = 21 [ 318.183508] chnl_net:caif_netlink_parms(): no params data found [ 318.259779] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.266422] bridge0: port 1(bridge_slave_0) entered disabled state [ 318.275105] device bridge_slave_0 entered promiscuous mode [ 318.285094] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.291893] bridge0: port 2(bridge_slave_1) entered disabled state [ 318.300429] device bridge_slave_1 entered promiscuous mode [ 318.338312] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 318.350654] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 318.384385] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 318.393449] team0: Port device team_slave_0 added [ 318.400405] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 318.409312] team0: Port device team_slave_1 added [ 318.418164] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 318.426902] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 318.498123] device hsr_slave_0 entered promiscuous mode [ 318.653430] device hsr_slave_1 entered promiscuous mode [ 318.803419] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 318.811082] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 318.839531] bridge0: port 2(bridge_slave_1) entered blocking state [ 318.846157] bridge0: port 2(bridge_slave_1) entered forwarding state [ 318.853394] bridge0: port 1(bridge_slave_0) entered blocking state [ 318.859942] bridge0: port 1(bridge_slave_0) entered forwarding state [ 318.951862] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 318.958022] 8021q: adding VLAN 0 to HW filter on device bond0 [ 318.973664] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 318.990350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 319.000014] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.011609] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.026254] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 319.047789] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 319.054057] 8021q: adding VLAN 0 to HW filter on device team0 [ 319.074304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 319.083738] bridge0: port 1(bridge_slave_0) entered blocking state [ 319.090259] bridge0: port 1(bridge_slave_0) entered forwarding state [ 319.146970] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 319.155773] bridge0: port 2(bridge_slave_1) entered blocking state [ 319.162353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 319.173894] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 319.183710] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 319.199023] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 319.206456] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 319.215472] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 319.223944] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 319.245017] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 319.252199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 319.260855] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 319.283046] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 319.289489] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 319.320359] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 319.344312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 319.431124] FAULT_INJECTION: forcing a failure. [ 319.431124] name failslab, interval 1, probability 0, space 0, times 1 [ 319.442889] CPU: 1 PID: 11877 Comm: syz-executor.0 Not tainted 5.0.0-rc1+ #10 [ 319.450236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.459628] Call Trace: [ 319.462376] dump_stack+0x173/0x1d0 [ 319.466100] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 319.471357] should_fail+0xa19/0xb20 [ 319.475160] __should_failslab+0x278/0x2a0 [ 319.479467] should_failslab+0x29/0x70 [ 319.483427] kmem_cache_alloc+0xff/0xb60 [ 319.487555] ? getname_flags+0x12f/0xb10 [ 319.491671] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 319.496937] getname_flags+0x12f/0xb10 [ 319.500894] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 319.506406] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 319.511658] getname+0x55/0x60 [ 319.514916] __se_sys_execve+0x70/0x110 [ 319.518981] __x64_sys_execve+0x4a/0x70 [ 319.523024] do_syscall_64+0xbc/0xf0 [ 319.526881] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 319.532124] RIP: 0033:0x457f29 [ 319.535373] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 319.554342] RSP: 002b:00007fc5a9be0c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 319.562123] RAX: ffffffffffffffda RBX: 00007fc5a9be0c90 RCX: 0000000000457f29 [ 319.569443] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000240 [ 319.576768] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 319.584086] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc5a9be16d4 [ 319.591390] R13: 00000000004be513 R14: 00000000004cee00 R15: 0000000000000004 23:05:58 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r2, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r3 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000540)) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000580)="2243e5cd0547945f4f5b651e47772b34a7f5d56a5d162db3a9139acb95c6bd92ba598621312a812d49de805c47e68bd2a855b0b41a8b74b075574e907a9cdf4f551be94e", 0x44) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000600)={0x3, 'eql\x00'}, 0x18) bind$netlink(r0, &(0x7f0000000640)={0x10, 0x0, 0x25dfdbfc, 0x10000}, 0xc) connect(r0, &(0x7f0000000680)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000740)={0x1, &(0x7f0000000700)=[{0x6, 0x37d59238, 0x7, 0x2e}]}) recvmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000780)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000800)=""/213, 0xd5}, {&(0x7f0000000900)=""/128, 0x80}, {&(0x7f0000000980)=""/130, 0x82}, {&(0x7f0000000a40)=""/207, 0xcf}, {&(0x7f0000000b40)=""/184, 0xb8}], 0x5, &(0x7f0000000c80)=""/53, 0x35}, 0x2) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000d00)={0xd, 0x6, 0xfffffffffffffff9}) keyctl$update(0x2, r3, &(0x7f0000000d40)="3f37f28276f0ee911ab8c793288d8d108cf575ea2fb653f8e62cfe745d5c4eb5053b64981c899f797de908a8d8f8ce1b2285f44ab5f77600ec0a5aa68e70aaa162fedc20b32eb98d54bfe570dbddc472798b692aba013c2fbaf786ba3959", 0x5e) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000dc0)) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000e00)={0x40, 0x5c9, 0x2}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000e40)) 23:05:58 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x148) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) write$P9_RSTAT(r0, &(0x7f0000000080)={0x65, 0x7d, 0x1, {0x0, 0x5e, 0x9, 0x101, {0x40, 0x1, 0x2}, 0x200000, 0xa7, 0x4, 0x3, 0xd, 'system*eth0]-', 0xa, '/dev/fuse\x00', 0xa, '/dev/fuse\x00', 0xa, '/dev/fuse\x00'}}, 0x65) 23:05:58 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:58 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r3, &(0x7f00000001c0)={0x13, 0x10, 0xfa00, {&(0x7f00000009c0), r6}}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) close(r3) 23:05:58 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:59 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x80000, 0x0) ioctl$RTC_PIE_ON(r1, 0x7005) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="000000005b1c59ee000000afbfc3", @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c74b036e75f7065726d697373696f6e"]) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000280)={0xa, 0x0, 0xfa00, {r2}}, 0xc) execve(&(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) 23:05:59 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:59 executing program 2: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="f528e9fddfeb0529c082dc92209b250b3906e7ebe9be4cb78ceb852dd2bc3aed5c4627e2b1403d66cdf683717d2e4dc751b8f4db02e058990ce5", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfb, 0x2000}, 0xc) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:59 executing program 2: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x406, r0) connect$unix(r1, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:05:59 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) close(r3) [ 320.909353] IPVS: ftp: loaded support on port[0] = 21 [ 321.180707] chnl_net:caif_netlink_parms(): no params data found [ 321.263987] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.270547] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.279409] device bridge_slave_0 entered promiscuous mode [ 321.289529] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.296208] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.305413] device bridge_slave_1 entered promiscuous mode [ 321.345615] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 321.359465] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 321.393036] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 321.401939] team0: Port device team_slave_0 added [ 321.409228] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 321.418374] team0: Port device team_slave_1 added [ 321.425509] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 321.434158] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 321.727254] device hsr_slave_0 entered promiscuous mode [ 321.925726] device hsr_slave_1 entered promiscuous mode [ 321.964150] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 321.972054] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 322.001233] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.007914] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.015221] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.021824] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.111386] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 322.117864] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.130652] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 322.145770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 322.155681] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.165669] bridge0: port 2(bridge_slave_1) entered disabled state [ 322.177171] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 322.198126] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 322.204398] 8021q: adding VLAN 0 to HW filter on device team0 [ 322.222336] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 322.229524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 322.238588] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 322.248712] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.255276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.271847] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 322.286025] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 322.299598] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 322.308454] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 322.317282] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.325919] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.332480] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.342063] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 322.351881] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 322.372990] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 322.383180] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 322.394778] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 322.409719] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 322.417227] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 322.425751] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 322.434910] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 322.450222] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 322.457411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 322.466138] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.484520] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 322.491804] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 322.500351] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.515089] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 322.521224] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 322.551486] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 322.575014] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 322.722077] kauditd_printk_skb: 3 callbacks suppressed [ 322.722115] audit: type=1326 audit(1551827161.761:31): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11941 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0x0 [ 323.518874] audit: type=1326 audit(1551827162.561:32): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11941 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0x0 23:06:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000080)=@buf={0x21, &(0x7f0000000040)="d44bb5afdc1cfcdc519e3c68f37e0848c033936de20af569926855ed09aa9788c4"}) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:02 executing program 2: mkdir(0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:02 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) close(r3) 23:06:02 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000040)={0x0, 0x2, 0x1, 0x90, &(0x7f0000ffc000/0x3000)=nil, 0x7}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000080)=0x80, 0x8) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000000c0)=0x8, 0x4) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000140)={0x8, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f00000001c0)={r2, &(0x7f0000000180)=""/60}) listen(r0, 0xffffffffdc79b0af) listen(r0, 0x4) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0xf) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000200)={0xfd}) tee(r1, r0, 0x369f, 0x4) rt_sigtimedwait(&(0x7f0000000240)={0x2}, &(0x7f0000000280), &(0x7f0000000300), 0x8) r3 = add_key(&(0x7f0000000340)='big_key\x00', &(0x7f0000000380)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_security(0x11, r3, &(0x7f00000003c0)=""/204, 0xcc) pipe(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000500)={0x0, 0x0, 0x10000}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000540)={r6, 0x80000, r0}) r8 = syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r4, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x10080090}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x1c, r8, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r7, 0xc4c85512, &(0x7f00000006c0)={{0x1, 0x6, 0x10001, 0x7fffffff, '\x00', 0x3}, 0x0, [0xc6ea, 0x2, 0x100000001, 0xd6e, 0x1f, 0xfffffffffffffffc, 0x0, 0x2, 0x0, 0x9, 0x1, 0x6a, 0x7, 0xcf, 0xffffffffffffffff, 0x1, 0x2, 0x5, 0x4a3, 0x80, 0x7b, 0x1, 0x4, 0x45cc, 0xfffffffffffffffa, 0x2, 0x5, 0x42, 0x1f, 0x5ce0, 0x8, 0x1, 0xfffffffe000000, 0x2, 0x2, 0x9, 0x1d6e0fbd, 0x6, 0x13, 0x6, 0x73f3, 0x7, 0x6, 0x401, 0x7, 0x7, 0x0, 0x4, 0x0, 0xadfb, 0x9, 0xfffffffffffffffd, 0x1, 0x100000001, 0x8, 0x3, 0x8, 0x800, 0x7, 0x91, 0x4, 0x0, 0x1ff, 0x100000001, 0x9, 0x6, 0xffffffff, 0x3ff, 0x8001, 0x6, 0x6, 0x7, 0xffff, 0xffffffff, 0x9, 0xffffffffffffffff, 0xf9b5, 0x8, 0x55, 0x8000, 0x0, 0x0, 0xff, 0x20, 0x2, 0x5, 0x3, 0x5, 0x1, 0x8ef6, 0xb694, 0x5, 0x9, 0x0, 0x2, 0x0, 0x401, 0x3, 0xffffffffffffbe32, 0x5, 0x0, 0x7, 0x1, 0x9, 0x102, 0x0, 0x3, 0x9, 0x80, 0x5, 0x7fffffff, 0x7, 0x3, 0x5, 0x401, 0x5, 0x5, 0xfffffffffffff9e5, 0x2, 0x100000001, 0x80000001, 0x7, 0x6, 0x80000001, 0x9, 0x7, 0xfffffffffffff72b, 0x6], {0x0, 0x989680}}) bind$inet6(r5, &(0x7f0000000bc0)={0xa, 0x4e22, 0xfe0000000, @mcast1, 0x200}, 0x1c) socket$inet6(0xa, 0x6, 0x5) syz_genetlink_get_family_id$ipvs(&(0x7f0000000c00)='IPVS\x00') mknodat(r7, &(0x7f0000000c40)='./file0\x00', 0x8040, 0x1) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/sequencer\x00', 0x414902, 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r9, 0x84, 0x21, &(0x7f0000000cc0), &(0x7f0000000d00)=0x4) ioctl$VIDIOC_QUERYMENU(r0, 0xc02c5625, &(0x7f0000000d40)={0x8, 0x80000001, @value=0x51f7}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/uinput\x00', 0x802, 0x0) shmget(0x3, 0x2000, 0x864, &(0x7f0000ffd000/0x2000)=nil) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r4, 0xc040564b, &(0x7f0000000dc0)={0x6, 0x0, 0x2020, 0xe3, 0x6, {0x7, 0x3ff}, 0x1}) 23:06:02 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r2, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r3 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000540)) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000580)="2243e5cd0547945f4f5b651e47772b34a7f5d56a5d162db3a9139acb95c6bd92ba598621312a812d49de805c47e68bd2a855b0b41a8b74b075574e907a9cdf4f551be94e", 0x44) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000600)={0x3, 'eql\x00'}, 0x18) bind$netlink(r0, &(0x7f0000000640)={0x10, 0x0, 0x25dfdbfc, 0x10000}, 0xc) connect(r0, &(0x7f0000000680)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000740)={0x1, &(0x7f0000000700)=[{0x6, 0x37d59238, 0x7, 0x2e}]}) recvmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000780)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000800)=""/213, 0xd5}, {&(0x7f0000000900)=""/128, 0x80}, {&(0x7f0000000980)=""/130, 0x82}, {&(0x7f0000000a40)=""/207, 0xcf}, {&(0x7f0000000b40)=""/184, 0xb8}], 0x5, &(0x7f0000000c80)=""/53, 0x35}, 0x2) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000d00)={0xd, 0x6, 0xfffffffffffffff9}) keyctl$update(0x2, r3, &(0x7f0000000d40)="3f37f28276f0ee911ab8c793288d8d108cf575ea2fb653f8e62cfe745d5c4eb5053b64981c899f797de908a8d8f8ce1b2285f44ab5f77600ec0a5aa68e70aaa162fedc20b32eb98d54bfe570dbddc472798b692aba013c2fbaf786ba3959", 0x5e) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000dc0)) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000e00)={0x40, 0x5c9, 0x2}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000e40)) 23:06:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 323.900727] audit: type=1326 audit(1551827162.941:33): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11957 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0x0 23:06:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:03 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) close(r3) 23:06:03 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643dcd6915c921f6650100000000000000160cd7847fc70dea0530c7c0348dc29573cd2df239a1e52b1fd6fe433b37116298750d523c3b3654f7ff2a230dbf4ebec7b6b38b7da0708a0b40433395c520c1e12f664ce1ea935ff97d17951600b44ad846312a2d000000000000000000000000000000000000000000000000000000", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 324.770488] IPVS: ftp: loaded support on port[0] = 21 23:06:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:03 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r2, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r3 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000540)) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000580)="2243e5cd0547945f4f5b651e47772b34a7f5d56a5d162db3a9139acb95c6bd92ba598621312a812d49de805c47e68bd2a855b0b41a8b74b075574e907a9cdf4f551be94e", 0x44) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000600)={0x3, 'eql\x00'}, 0x18) bind$netlink(r0, &(0x7f0000000640)={0x10, 0x0, 0x25dfdbfc, 0x10000}, 0xc) connect(r0, &(0x7f0000000680)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000740)={0x1, &(0x7f0000000700)=[{0x6, 0x37d59238, 0x7, 0x2e}]}) recvmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000780)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000800)=""/213, 0xd5}, {&(0x7f0000000900)=""/128, 0x80}, {&(0x7f0000000980)=""/130, 0x82}, {&(0x7f0000000a40)=""/207, 0xcf}, {&(0x7f0000000b40)=""/184, 0xb8}], 0x5, &(0x7f0000000c80)=""/53, 0x35}, 0x2) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000d00)={0xd, 0x6, 0xfffffffffffffff9}) keyctl$update(0x2, r3, &(0x7f0000000d40)="3f37f28276f0ee911ab8c793288d8d108cf575ea2fb653f8e62cfe745d5c4eb5053b64981c899f797de908a8d8f8ce1b2285f44ab5f77600ec0a5aa68e70aaa162fedc20b32eb98d54bfe570dbddc472798b692aba013c2fbaf786ba3959", 0x5e) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000dc0)) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000e00)={0x40, 0x5c9, 0x2}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000e40)) 23:06:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = pkey_alloc(0x0, 0x1) pkey_free(r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x61, &(0x7f0000000280)={'filter\x00', 0x4}, 0x68) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 23:06:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 325.166189] audit: type=1326 audit(1551827164.211:34): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=11987 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0x0 23:06:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 325.309638] chnl_net:caif_netlink_parms(): no params data found [ 325.404171] bridge0: port 1(bridge_slave_0) entered blocking state [ 325.410890] bridge0: port 1(bridge_slave_0) entered disabled state [ 325.419479] device bridge_slave_0 entered promiscuous mode [ 325.473979] bridge0: port 2(bridge_slave_1) entered blocking state [ 325.480666] bridge0: port 2(bridge_slave_1) entered disabled state [ 325.489350] device bridge_slave_1 entered promiscuous mode [ 325.562159] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 325.587509] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 325.687869] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 325.696892] team0: Port device team_slave_0 added [ 325.724107] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 325.732992] team0: Port device team_slave_1 added [ 325.741819] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 325.751020] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 325.899103] device hsr_slave_0 entered promiscuous mode [ 325.992536] device hsr_slave_1 entered promiscuous mode [ 326.133856] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 326.141812] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 326.169916] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.176577] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.183803] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.190346] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.282995] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 326.289142] 8021q: adding VLAN 0 to HW filter on device bond0 [ 326.304084] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 326.318703] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 326.328655] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.337900] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.353297] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 326.375069] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 326.381214] 8021q: adding VLAN 0 to HW filter on device team0 [ 326.400361] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 326.409979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 326.419471] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 326.427878] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.434482] bridge0: port 1(bridge_slave_0) entered forwarding state [ 326.456312] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 326.472651] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 326.481401] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 326.490562] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 326.499186] bridge0: port 2(bridge_slave_1) entered blocking state [ 326.505745] bridge0: port 2(bridge_slave_1) entered forwarding state [ 326.515035] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 326.531263] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 326.538489] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 326.557010] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 326.565023] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 326.576766] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 326.594561] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 326.602848] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 326.611184] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 326.620551] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 326.638232] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 326.651451] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 326.660670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 326.669531] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 326.678162] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 326.686820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 326.701489] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 326.707728] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 326.732733] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 326.760454] 8021q: adding VLAN 0 to HW filter on device batadv0 23:06:06 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) close(r3) 23:06:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75f05f69643d", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:06 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) close(r3) 23:06:06 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r2, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r3 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000540)) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000580)="2243e5cd0547945f4f5b651e47772b34a7f5d56a5d162db3a9139acb95c6bd92ba598621312a812d49de805c47e68bd2a855b0b41a8b74b075574e907a9cdf4f551be94e", 0x44) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000600)={0x3, 'eql\x00'}, 0x18) bind$netlink(r0, &(0x7f0000000640)={0x10, 0x0, 0x25dfdbfc, 0x10000}, 0xc) connect(r0, &(0x7f0000000680)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000740)={0x1, &(0x7f0000000700)=[{0x6, 0x37d59238, 0x7, 0x2e}]}) recvmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000780)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000800)=""/213, 0xd5}, {&(0x7f0000000900)=""/128, 0x80}, {&(0x7f0000000980)=""/130, 0x82}, {&(0x7f0000000a40)=""/207, 0xcf}, {&(0x7f0000000b40)=""/184, 0xb8}], 0x5, &(0x7f0000000c80)=""/53, 0x35}, 0x2) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000d00)={0xd, 0x6, 0xfffffffffffffff9}) keyctl$update(0x2, r3, &(0x7f0000000d40)="3f37f28276f0ee911ab8c793288d8d108cf575ea2fb653f8e62cfe745d5c4eb5053b64981c899f797de908a8d8f8ce1b2285f44ab5f77600ec0a5aa68e70aaa162fedc20b32eb98d54bfe570dbddc472798b692aba013c2fbaf786ba3959", 0x5e) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000dc0)) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000e00)={0x40, 0x5c9, 0x2}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000e40)) 23:06:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 327.212136] audit: type=1326 audit(1551827166.251:35): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12029 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0x0 23:06:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x4}}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) 23:06:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:06 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffff9c, 0x40505330, &(0x7f0000000640)={{0x6a32}, {0x8, 0x8}, 0x7fff, 0x4, 0x5}) execve(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000340)='\x00', &(0x7f0000000380)='\x8e[#$selinuxlo\x00', &(0x7f00000003c0)='/dev/fuse\x00'], &(0x7f0000000500)=[&(0x7f0000000440)='\x00', &(0x7f0000000480)='systemvboxnet0\'$,trusted\x00', &(0x7f00000004c0)='default_permissions']) r1 = dup(r0) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000040)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) r2 = dup2(r0, r0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000006c0)={0xd46, 0x0, 0x1, 0x6, 0x1, [{0x80, 0xffffffffffffffc6, 0x0, 0x0, 0x0, 0x1081}]}) lsetxattr$trusted_overlay_upper(&(0x7f0000000540)='./file0/file0/file0\x00', &(0x7f0000000580)='trusted.overlay.upper\x00', &(0x7f00000005c0)={0x0, 0xfb, 0x71, 0x6, 0x7fffffff, "718e74bc20dcf63c8059d1b1d3579784", "789a3ffed340fdc4100ee6f4eccb592d061da20293bd073d739c51caeb986a5e0f86e5fb4da2db79d99f54fefc8bc8c9c4ec1472e9348c70755587f1499cc9887ce6e504b70ce090f4af4f07e0d7e25bc5b4752349c6baa1c56eeb0f"}, 0x71, 0x3) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000280)={0x0, 0x3}) ioctl$KVM_SET_CLOCK(r2, 0x4030ae7b, &(0x7f00000000c0)={0x8, 0x8}) 23:06:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:07 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r2, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r3 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000540)) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000580)="2243e5cd0547945f4f5b651e47772b34a7f5d56a5d162db3a9139acb95c6bd92ba598621312a812d49de805c47e68bd2a855b0b41a8b74b075574e907a9cdf4f551be94e", 0x44) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000600)={0x3, 'eql\x00'}, 0x18) bind$netlink(r0, &(0x7f0000000640)={0x10, 0x0, 0x25dfdbfc, 0x10000}, 0xc) connect(r0, &(0x7f0000000680)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000740)={0x1, &(0x7f0000000700)=[{0x6, 0x37d59238, 0x7, 0x2e}]}) recvmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000780)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000800)=""/213, 0xd5}, {&(0x7f0000000900)=""/128, 0x80}, {&(0x7f0000000980)=""/130, 0x82}, {&(0x7f0000000a40)=""/207, 0xcf}, {&(0x7f0000000b40)=""/184, 0xb8}], 0x5, &(0x7f0000000c80)=""/53, 0x35}, 0x2) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000d00)={0xd, 0x6, 0xfffffffffffffff9}) keyctl$update(0x2, r3, &(0x7f0000000d40)="3f37f28276f0ee911ab8c793288d8d108cf575ea2fb653f8e62cfe745d5c4eb5053b64981c899f797de908a8d8f8ce1b2285f44ab5f77600ec0a5aa68e70aaa162fedc20b32eb98d54bfe570dbddc472798b692aba013c2fbaf786ba3959", 0x5e) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000dc0)) ioctl$KVM_S390_UCAS_UNMAP(r4, 0x4018ae51, &(0x7f0000000e00)={0x40, 0x5c9, 0x2}) [ 328.254798] audit: type=1326 audit(1551827167.301:36): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12077 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0x0 23:06:07 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) close(r3) 23:06:07 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) close(r3) 23:06:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x1) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffffff, &(0x7f0000000400)='./file0/file0\x00', 0x18000, 0x100) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f00000004c0)={0x2, 0x2, 0x2, 0xffffffffffffffe0, &(0x7f0000000440)=[{}, {}]}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x10200, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80240502}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0xb8, r3, 0x1, 0x70bd2d, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80}]}, @IPVS_CMD_ATTR_SERVICE={0x60, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5f}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x50}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4004041}, 0xc74f1720c85372ab) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:08 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r2, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r3 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000540)) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000580)="2243e5cd0547945f4f5b651e47772b34a7f5d56a5d162db3a9139acb95c6bd92ba598621312a812d49de805c47e68bd2a855b0b41a8b74b075574e907a9cdf4f551be94e", 0x44) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000600)={0x3, 'eql\x00'}, 0x18) bind$netlink(r0, &(0x7f0000000640)={0x10, 0x0, 0x25dfdbfc, 0x10000}, 0xc) connect(r0, &(0x7f0000000680)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000740)={0x1, &(0x7f0000000700)=[{0x6, 0x37d59238, 0x7, 0x2e}]}) recvmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000780)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000800)=""/213, 0xd5}, {&(0x7f0000000900)=""/128, 0x80}, {&(0x7f0000000980)=""/130, 0x82}, {&(0x7f0000000a40)=""/207, 0xcf}, {&(0x7f0000000b40)=""/184, 0xb8}], 0x5, &(0x7f0000000c80)=""/53, 0x35}, 0x2) fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000d00)={0xd, 0x6, 0xfffffffffffffff9}) keyctl$update(0x2, r3, &(0x7f0000000d40)="3f37f28276f0ee911ab8c793288d8d108cf575ea2fb653f8e62cfe745d5c4eb5053b64981c899f797de908a8d8f8ce1b2285f44ab5f77600ec0a5aa68e70aaa162fedc20b32eb98d54bfe570dbddc472798b692aba013c2fbaf786ba3959", 0x5e) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000dc0)) 23:06:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x40) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c06656661756c745f7065726d02d4734b2bf90d2c00"]) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7, 0x2) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000080)={r2, 0x2bd}) 23:06:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:08 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r3 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r3, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r2) [ 329.342685] audit: type=1326 audit(1551827168.381:37): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12125 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0x0 23:06:08 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r4 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kcmp(r2, r2, 0x0, r5, r3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) close(r3) 23:06:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x8, 0x10000) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0xfff8000000000000, 0x6, 0x9}, &(0x7f00000000c0)=0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="90000000", @ANYRES16=r2, @ANYBLOB="00082bbd7000fbdbdf250900000008000500fb5a0000640002000800060001000080080002004e23000014000100ac1e000100000000000000000000000008000500a3d500000800070079000000080007000000000008000600000000801400010000000000000000000000000000000001080006000800000008ce0400010000000800050000000000"], 0x90}, 0x1, 0x0, 0x0, 0x4040880}, 0x40810) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000340)={r1, @in6={{0xa, 0x4e23, 0x0, @mcast1, 0x8}}}, 0x84) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_GET_SECUREBITS(0x1b) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x8000, 0x0) ioctl$KVM_S390_INTERRUPT_CPU(r1, 0x4010ae94, &(0x7f0000000080)={0xfffffffffffffff8, 0x6, 0x4}) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d6e34925a28b9ecb695154f30d585ac937128dd465956932cc4fba83e4ed42660216b5c4f505c2a642ef884d4be6a299948e1594853135223984cdf30de801c6fabcc9fa7869b0673cb28fabe41f175bc74379f", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000040)='keyring\xfd\x00'}, 0x30) r2 = dup2(r0, r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000280)='trusted.overlay.origin\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x3) write$RDMA_USER_CM_CMD_ACCEPT(r2, &(0x7f0000000440)={0x8, 0x120, 0xfa00, {0x2, {0x4, 0x200, "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", 0x62, 0x2, 0x30, 0x6, 0x8000, 0x7f, 0x20}, r3}}, 0x128) ptrace$setregs(0xf, r1, 0x5, &(0x7f0000000140)="a1e8d6605a65333663c4108cb806686fc551dc6ac25eaa6b06ce8190cb1368856cf91697ebda3559d7e56279cba723cdc2f016c41e058b7b143e4105d37fb03c70074a05137a99696b043bcb53957db180d03fd414b25fd8b201e8485eef3e42ffedfc6cb4da9b6cf6bb61c8b39d8eee98c1e4") 23:06:09 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r2, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r3 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000540)) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000580)="2243e5cd0547945f4f5b651e47772b34a7f5d56a5d162db3a9139acb95c6bd92ba598621312a812d49de805c47e68bd2a855b0b41a8b74b075574e907a9cdf4f551be94e", 0x44) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000600)={0x3, 'eql\x00'}, 0x18) bind$netlink(r0, &(0x7f0000000640)={0x10, 0x0, 0x25dfdbfc, 0x10000}, 0xc) connect(r0, &(0x7f0000000680)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000740)={0x1, &(0x7f0000000700)=[{0x6, 0x37d59238, 0x7, 0x2e}]}) recvmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000780)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000800)=""/213, 0xd5}, {&(0x7f0000000900)=""/128, 0x80}, {&(0x7f0000000980)=""/130, 0x82}, {&(0x7f0000000a40)=""/207, 0xcf}, {&(0x7f0000000b40)=""/184, 0xb8}], 0x5, &(0x7f0000000c80)=""/53, 0x35}, 0x2) fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000d00)={0xd, 0x6, 0xfffffffffffffff9}) keyctl$update(0x2, r3, &(0x7f0000000d40)="3f37f28276f0ee911ab8c793288d8d108cf575ea2fb653f8e62cfe745d5c4eb5053b64981c899f797de908a8d8f8ce1b2285f44ab5f77600ec0a5aa68e70aaa162fedc20b32eb98d54bfe570dbddc472798b692aba013c2fbaf786ba3959", 0x5e) 23:06:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x8000003, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:09 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) r3 = socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) fcntl$getownex(r3, 0x10, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) close(r2) [ 330.462702] audit: type=1326 audit(1551827169.501:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12183 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0x0 23:06:09 executing program 4: r0 = semget$private(0x0, 0x20000000103, 0x0) semop(r0, &(0x7f00000000c0)=[{0x1, 0x8}, {0x1}], 0x2) semop(r0, &(0x7f0000000040)=[{0x1}, {0x0, 0x2a5, 0x3}], 0x179) semop(r0, &(0x7f0000000000)=[{0x0, 0x7}], 0x1) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000080)={0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x9}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x8, 0x8, 0x0, 0x2, 0xaa84, 0x1f, 0x9, {0x0, @in6={{0xa, 0x4e23, 0x3e000000, @ipv4={[], [], @empty}, 0x10000}}, 0x9, 0x0, 0xfff, 0x6b, 0x14000000}}, &(0x7f0000000240)=0xb0) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000280)={r2, 0x4, 0x3, 0x4, 0x1, 0x2, 0x3f, 0x3, {r3, @in={{0x2, 0x4e23, @local}}, 0x5, 0x10001, 0x1, 0x8, 0x8e}}, &(0x7f0000000340)=0xb0) 23:06:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:10 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r2, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r3 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000540)) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000580)="2243e5cd0547945f4f5b651e47772b34a7f5d56a5d162db3a9139acb95c6bd92ba598621312a812d49de805c47e68bd2a855b0b41a8b74b075574e907a9cdf4f551be94e", 0x44) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000600)={0x3, 'eql\x00'}, 0x18) bind$netlink(r0, &(0x7f0000000640)={0x10, 0x0, 0x25dfdbfc, 0x10000}, 0xc) connect(r0, &(0x7f0000000680)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000740)={0x1, &(0x7f0000000700)=[{0x6, 0x37d59238, 0x7, 0x2e}]}) recvmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000780)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000800)=""/213, 0xd5}, {&(0x7f0000000900)=""/128, 0x80}, {&(0x7f0000000980)=""/130, 0x82}, {&(0x7f0000000a40)=""/207, 0xcf}, {&(0x7f0000000b40)=""/184, 0xb8}], 0x5, &(0x7f0000000c80)=""/53, 0x35}, 0x2) fcntl$dupfd(r0, 0x0, r0) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000d00)={0xd, 0x6, 0xfffffffffffffff9}) 23:06:10 executing program 5: prctl$PR_GET_FP_MODE(0x2e) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_CHILD_SUBREAPER(0x25) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x25, &(0x7f0000000040)={@local, @local, @loopback}, 0xc) r2 = getegid() setgid(r2) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x7, 0xc00) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r4, 0x300, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0xa4d}}, ["", "", ""]}, 0x24}}, 0x8000) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000200)={'erspan0\x00', 0x38}) time(&(0x7f0000000240)) prctl$PR_GET_TSC(0x19, &(0x7f0000000280)) getresgid(&(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)) getpeername$netlink(r3, &(0x7f0000000380), &(0x7f00000003c0)=0xc) ioctl$UI_DEV_DESTROY(r3, 0x5502) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f0000000400)={0x8, 0x2}) ioctl$DRM_IOCTL_AGP_ACQUIRE(r3, 0x6430) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000480)=@add_del={0x2, &(0x7f0000000440)='bpq0\x00'}) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) ioctl$CAPI_GET_PROFILE(r3, 0xc0404309, &(0x7f00000004c0)=0x200) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000500)=""/157) epoll_pwait(r3, &(0x7f00000005c0)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x3, &(0x7f0000000640), 0x8) ioctl$EVIOCGID(r3, 0x80084502, &(0x7f0000000680)=""/150) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000740)={0x0, @in={{0x2, 0x4e22, @empty}}, [0x9, 0x1e, 0x101, 0x7, 0x6, 0x5, 0x10001, 0x7, 0x3, 0x3, 0x200, 0x5, 0xfffffffffffffff8, 0xb, 0x8]}, &(0x7f0000000840)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000008c0)={r5, 0x1c, &(0x7f0000000880)=[@in6={0xa, 0x4e22, 0x5, @mcast2, 0xffffffffffff7fff}]}, &(0x7f0000000900)=0x10) ioctl$BLKIOOPT(r3, 0x1279, &(0x7f0000000940)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000980)={{0x9, 0xffff}, 'port0\x00', 0x25, 0x19, 0x3ba, 0xdea5, 0x1ff, 0x1f, 0x40, 0x0, 0x3, 0x8}) [ 331.348490] audit: type=1326 audit(1551827170.391:39): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12210 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0x0 23:06:10 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-vsock\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) 23:06:10 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8937, &(0x7f0000000000)={'bridge_slave_1\x00\x04', @random="01003a1e2410"}) 23:06:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:11 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xe6, 0x101000) ioctl$CAPI_INSTALLED(r0, 0x80024322) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffffe, 0x5, {0x100000000}}, 0x18) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) ioctl$FICLONE(r0, 0x40049409, r0) setxattr$security_smack_entry(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='security.SMACK64IPOUT\x00', &(0x7f00000002c0)='fuse\x00', 0x5, 0x0) clone(0x8000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000540)='./file0/file0/file0\x00', 0x0, 0x0) 23:06:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:11 executing program 4: r0 = socket$inet6(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="5500000018007f5300fe01b2a4a280930a6000fdff2843687500000039000500fe800000000000dc1338d5440000c43bb8220000060cec4fab91d4000000000000000000dc302cfe27147000000000000000000000", 0x55}], 0x1}, 0x0) 23:06:11 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r2, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r3 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000540)) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000580)="2243e5cd0547945f4f5b651e47772b34a7f5d56a5d162db3a9139acb95c6bd92ba598621312a812d49de805c47e68bd2a855b0b41a8b74b075574e907a9cdf4f551be94e", 0x44) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000600)={0x3, 'eql\x00'}, 0x18) bind$netlink(r0, &(0x7f0000000640)={0x10, 0x0, 0x25dfdbfc, 0x10000}, 0xc) connect(r0, &(0x7f0000000680)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000740)={0x1, &(0x7f0000000700)=[{0x6, 0x37d59238, 0x7, 0x2e}]}) recvmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000780)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000800)=""/213, 0xd5}, {&(0x7f0000000900)=""/128, 0x80}, {&(0x7f0000000980)=""/130, 0x82}, {&(0x7f0000000a40)=""/207, 0xcf}, {&(0x7f0000000b40)=""/184, 0xb8}], 0x5, &(0x7f0000000c80)=""/53, 0x35}, 0x2) fcntl$dupfd(r0, 0x0, r0) [ 332.297100] IPVS: ftp: loaded support on port[0] = 21 [ 332.408631] audit: type=1326 audit(1551827171.451:40): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12245 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0x0 23:06:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f0000847000)={&(0x7f00001b1d4c)=ANY=[@ANYBLOB="fe8000000000000000000000000000ff000000003300000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000f00000000000000048000100726d6431363000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000169bcfb3434900"], 0x1}}, 0x0) [ 332.514693] chnl_net:caif_netlink_parms(): no params data found 23:06:11 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) socket$inet(0x2, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000380)='security.ima\x00', 0x0, 0x0, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) [ 332.629341] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.636115] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.667907] device bridge_slave_0 entered promiscuous mode [ 332.686895] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.693777] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.702376] device bridge_slave_1 entered promiscuous mode 23:06:11 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r1, 0x80247009, &(0x7f00000000c0)) [ 332.764603] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 332.849929] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 332.890868] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 332.899883] team0: Port device team_slave_0 added [ 332.910937] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 332.920277] team0: Port device team_slave_1 added [ 332.931314] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 23:06:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) getpeername$packet(r0, 0x0, 0x0) [ 332.940510] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 333.037960] device hsr_slave_0 entered promiscuous mode [ 333.073893] device hsr_slave_1 entered promiscuous mode [ 333.113930] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 333.122314] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 333.190177] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.196821] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.204075] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.210627] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.423157] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 333.429295] 8021q: adding VLAN 0 to HW filter on device bond0 [ 333.440227] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 333.452921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 333.461498] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.469460] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.478195] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 333.495284] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 333.501412] 8021q: adding VLAN 0 to HW filter on device team0 [ 333.513771] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 333.520967] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 333.529998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 333.538360] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.544966] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.560220] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 333.573006] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 333.585780] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 333.593599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 333.602474] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 333.610783] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.617379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.626649] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 333.636289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 333.650618] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 333.661445] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 333.669232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 333.677982] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 333.686205] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 333.695870] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 333.705745] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 333.719505] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 333.728103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 333.736664] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 333.751247] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 333.760922] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 333.769544] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 333.781524] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 333.787984] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 333.808545] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 333.825119] 8021q: adding VLAN 0 to HW filter on device batadv0 23:06:13 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x10, 0xffffffffffffffff, 0x0) ioctl$RTC_RD_TIME(r1, 0x80287010, &(0x7f00000000c0)) 23:06:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 23:06:13 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x2c0}], 0x3b6, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) preadv(r0, &(0x7f0000000480), 0x16b, 0x0) 23:06:13 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r2, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r3 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000540)) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000580)="2243e5cd0547945f4f5b651e47772b34a7f5d56a5d162db3a9139acb95c6bd92ba598621312a812d49de805c47e68bd2a855b0b41a8b74b075574e907a9cdf4f551be94e", 0x44) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000600)={0x3, 'eql\x00'}, 0x18) bind$netlink(r0, &(0x7f0000000640)={0x10, 0x0, 0x25dfdbfc, 0x10000}, 0xc) connect(r0, &(0x7f0000000680)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000740)={0x1, &(0x7f0000000700)=[{0x6, 0x37d59238, 0x7, 0x2e}]}) recvmsg(r0, &(0x7f0000000cc0)={&(0x7f0000000780)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000800)=""/213, 0xd5}, {&(0x7f0000000900)=""/128, 0x80}, {&(0x7f0000000980)=""/130, 0x82}, {&(0x7f0000000a40)=""/207, 0xcf}, {&(0x7f0000000b40)=""/184, 0xb8}], 0x5, &(0x7f0000000c80)=""/53, 0x35}, 0x2) 23:06:13 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x4) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="ae645e", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x11, @empty, 0x4e22, 0x0, 'dh\x00', 0x8, 0x0, 0x1f}, 0x2c) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:13 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) socket$inet(0x2, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) 23:06:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) [ 334.059242] audit: type=1326 audit(1551827173.101:41): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12282 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0x0 23:06:13 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000500)=ANY=[@ANYPTR64], 0x8) recvmmsg(r1, &(0x7f0000002bc0), 0x3ffffffffffffd4, 0x6, 0x0) 23:06:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grouV_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:13 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 23:06:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 23:06:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x400, 0x361080) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000340)={0x0, 0x0, [], @bt={0x4, 0x7, 0x6, 0x5, 0x2, 0x15a3, 0x11, 0x8}}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000080)={0x1, 0x3, [{r0, 0x0, 0x1000000008000}, {r0, 0x0, 0xfffffffffffff000, 0x2000}, {r0, 0x0, 0x8000, 0x1000}]}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:13 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000100)="f4", 0x1) recvmmsg(r1, &(0x7f0000002bc0), 0x3ffffffffffffd4, 0x6, 0x0) 23:06:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="66643d023bf20f1e81db5c84f2dd6a2665fe18916b9e00000025eac5e8cf5423e1a1c4704a6500ad9851f999db045d10441a304e89660f1ec17509000000000000ffbd579e57105e205fd26e9b4d1234deeafd151333463646219ddbe91d924d0213f19dafc8f0e8201948cd63ff741cfd0f425c64544c1b3b4bf36c8e01008b67831486eda4a1df7d23d72e1bf78bd7c3a938a87e01b4f4", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$void(r0, 0xc0045c79) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x5) pwrite64(r0, &(0x7f00000004c0)="2ae04270bad33fec3f3fb53323ecbfa3268a3693c60f237eaa15bcd557c2e9f004e025f6590f25a56c403e183b7932af8ff4bee0e1969a6e934665516ec12f5e4c5c78b4cc068bcaf97fa4644a91f4a3369adf4e4dd9776ebe373eef6412867ce4d86f54ef9387b9dbbadc86ee84e094350fbc1b392f2cf64fbf1eba001d1d8724fa749f94a90c682d48a8fe3461d222f6c03f780c", 0x95, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000180)={0x0, 0xfffffffffffffffd}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000280)={r2, 0x5b, "b140dc6c0a7a9ce3a0d856d98c0cc82568a5533f7dc3935ddd9ccf727518e84ad16416ebf466ca39f4085f68568fce58f044859d65bc4964bb632f9eef625b05dd9b595e13e0e3dd268786a809ba24e3d081848423695e41f5c7e1"}, &(0x7f0000000480)=0x63) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:14 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r2, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r3 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000540)) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000580)="2243e5cd0547945f4f5b651e47772b34a7f5d56a5d162db3a9139acb95c6bd92ba598621312a812d49de805c47e68bd2a855b0b41a8b74b075574e907a9cdf4f551be94e", 0x44) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000600)={0x3, 'eql\x00'}, 0x18) bind$netlink(r0, &(0x7f0000000640)={0x10, 0x0, 0x25dfdbfc, 0x10000}, 0xc) connect(r0, &(0x7f0000000680)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000740)={0x1, &(0x7f0000000700)=[{0x6, 0x37d59238, 0x7, 0x2e}]}) 23:06:14 executing program 5: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) ioctl$int_in(r3, 0x5421, &(0x7f0000000240)=0x2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x1000000010005, 0x0) 23:06:14 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) socket$inet(0x2, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) 23:06:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000340)='/dev/input/mouse#\x00', 0x5, 0x101000) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000380)=0x3) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d4de4b1a1cdfe89f9e5cad9d56c751ba6b2f2e4fbbd2b1d5be898a9c37a6202b610a0651ae143807a7d6cb5f1e7e6fc06bb277eeafbb99ef0f029d9f3616a3216655d27517027e4fbb8dfc8ac8a60ae960a53615ddc3472afe6323d46a0dcc4a7c6d03297e410293c0d78b4fe946122432a4307a6286134a6d845167fd9b0409797ac189d9928e872685ecb1c6b449d052b3feb5c7b40ea", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6465fc4df23e14121d599ef79fef123d36711b0f5077a78155d62380c36661756c27f5f00de181643e76a722260dbce3abb3c19ffccbdce83730b20c35c48922dc59afdb99601b9f7d7a70257a8567b598f882928a043c89532cc26c5fdc738cdd9a4da8daea81f8955727f258ad7ac9de196489fd00f25e06b554a37d34e17ece1b7800863917aa50d3343f090b37014001c80aa7d489171ab7ec3473cebbfe15cae34eb1ab03d10c4596e6a1e13040cbc41902c96a68f50e250586076b7ff9b0e421c7ce47"]) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) lstat(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$get_persistent(0x16, r2, r3) 23:06:14 executing program 5: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000340)={0xd, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="04630440000000000663044010"], 0x0, 0x0, 0x0}) [ 335.351876] audit: type=1326 audit(1551827174.391:42): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=12354 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0x0 [ 335.538416] binder: 12363:12364 IncRefs 0 refcount change on invalid ref 0 ret -22 [ 335.547530] binder: 12363:12364 Release 1 refcount change on invalid ref 16 ret -22 23:06:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @dev}, 0x10) connect$inet(r0, &(0x7f0000000180), 0x10) shutdown(r0, 0x0) 23:06:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x4000, 0x0) ioctl$RNDZAPENTCNT(r1, 0x5204, &(0x7f00000002c0)=0x9) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) r2 = creat(&(0x7f0000000040)='./file1\x00', 0x10) epoll_pwait(r2, &(0x7f0000000080)=[{}, {}, {}, {}], 0x4, 0x2, &(0x7f00000000c0)={0x3}, 0x8) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000340)=0x1d, 0x26) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000380)={0x0, 0xcc}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000400)={r3, 0xd9c, 0x2, [0x6, 0x10001]}, &(0x7f0000000440)=0xc) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:23 executing program 5: socketpair$unix(0x1, 0x8000000005, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a067fbc45ff810500000000000058000b480400945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010005081000414900000004fcff", 0x58}], 0x1) 23:06:23 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) socket$inet(0x2, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) 23:06:23 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r2, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r3 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000540)) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000580)="2243e5cd0547945f4f5b651e47772b34a7f5d56a5d162db3a9139acb95c6bd92ba598621312a812d49de805c47e68bd2a855b0b41a8b74b075574e907a9cdf4f551be94e", 0x44) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000600)={0x3, 'eql\x00'}, 0x18) bind$netlink(r0, &(0x7f0000000640)={0x10, 0x0, 0x25dfdbfc, 0x10000}, 0xc) connect(r0, &(0x7f0000000680)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x2) 23:06:23 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) 23:06:23 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3199c070") sendmsg(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="5500000018007f70e9fd01b2a4a280930a600080fea8430291000000390005002300fbff040000000d0005000be9ffffffffc68b65082314e9030b9d566885b16732e54f626369627cf0c8009b84dcb1df136ef75a", 0x55}], 0x1}, 0x0) 23:06:23 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x81000008912, &(0x7f0000000100)="0adc1f123c40a41d88b070") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000008f00)={'tunl0\x00B\xb5\xab*\x00\x00\x00\xee\x00'}) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000003c0)={0x0, 0x0, @pic={0x0, 0x0, 0x0, 0x5}}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 23:06:23 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r2, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r3 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000540)) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000580)="2243e5cd0547945f4f5b651e47772b34a7f5d56a5d162db3a9139acb95c6bd92ba598621312a812d49de805c47e68bd2a855b0b41a8b74b075574e907a9cdf4f551be94e", 0x44) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000600)={0x3, 'eql\x00'}, 0x18) bind$netlink(r0, &(0x7f0000000640)={0x10, 0x0, 0x25dfdbfc, 0x10000}, 0xc) connect(r0, &(0x7f0000000680)=@un=@abs={0x1, 0x0, 0x4e21}, 0x80) [ 344.863523] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 23:06:24 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f0000000080)=""/16, 0x10) r2 = dup2(r1, r0) rt_sigprocmask(0x0, &(0x7f00000002c0)={0xffffffffffffffd}, 0x0, 0x8) r3 = memfd_create(&(0x7f0000000100)='\x02\x00\x00\x00\b\xa8\xdf\x9ec\xdc\x9e\x1d\x8b\xe6', 0x0) ftruncate(r3, 0x40001) sendfile(r2, r3, 0x0, 0x80000001) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 23:06:24 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000001, 0x0, 0x0) 23:06:24 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r2, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r3 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000540)) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000580)="2243e5cd0547945f4f5b651e47772b34a7f5d56a5d162db3a9139acb95c6bd92ba598621312a812d49de805c47e68bd2a855b0b41a8b74b075574e907a9cdf4f551be94e", 0x44) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000600)={0x3, 'eql\x00'}, 0x18) bind$netlink(r0, &(0x7f0000000640)={0x10, 0x0, 0x25dfdbfc, 0x10000}, 0xc) 23:06:24 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x20020000000e, &(0x7f0000000140), 0x450c4170) [ 345.411194] sock: process `syz-executor.2' is using obsolete setsockopt SO_BSDCOMPAT 23:06:24 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xc00500200000923d, 0x0, 0x0, 0x0) 23:06:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:06:24 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) readlink(0x0, &(0x7f00000005c0)=""/135, 0x87) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) 23:06:24 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r2, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r3 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000540)) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000580)="2243e5cd0547945f4f5b651e47772b34a7f5d56a5d162db3a9139acb95c6bd92ba598621312a812d49de805c47e68bd2a855b0b41a8b74b075574e907a9cdf4f551be94e", 0x44) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000600)={0x3, 'eql\x00'}, 0x18) 23:06:24 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) [ 345.819954] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:06:25 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r2, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r3 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r3, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000540)) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000580)="2243e5cd0547945f4f5b651e47772b34a7f5d56a5d162db3a9139acb95c6bd92ba598621312a812d49de805c47e68bd2a855b0b41a8b74b075574e907a9cdf4f551be94e", 0x44) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) [ 345.915949] kvm [12426]: vcpu0, guest rIP: 0x90c2 Hyper-V uhandled wrmsr: 0x40000011 data 0x0 [ 345.936013] kvm [12426]: vcpu0, guest rIP: 0x90c2 Hyper-V uhandled wrmsr: 0x40000012 data 0x0 [ 345.976581] kvm [12426]: vcpu0, guest rIP: 0x90c2 Hyper-V uhandled wrmsr: 0x40000013 data 0x0 [ 345.986940] kvm [12426]: vcpu0, guest rIP: 0x90c2 Hyper-V uhandled wrmsr: 0x40000014 data 0x0 [ 346.024332] kvm [12426]: vcpu0, guest rIP: 0x90c2 Hyper-V uhandled wrmsr: 0x40000015 data 0x0 [ 346.059078] kvm [12426]: vcpu0, guest rIP: 0x90c2 Hyper-V uhandled wrmsr: 0x40000016 data 0x0 23:06:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 346.068821] kvm [12426]: vcpu0, guest rIP: 0x90c2 Hyper-V uhandled wrmsr: 0x40000017 data 0x0 [ 346.112235] kvm [12426]: vcpu0, guest rIP: 0x90c2 Hyper-V uhandled wrmsr: 0x40000018 data 0x0 [ 346.147722] kvm [12426]: vcpu0, guest rIP: 0x90c2 Hyper-V uhandled wrmsr: 0x40000019 data 0x0 [ 346.181403] kvm [12426]: vcpu0, guest rIP: 0x90c2 Hyper-V uhandled wrmsr: 0x4000001a data 0x0 23:06:25 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x80, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x12, 0xb1, &(0x7f0000000340)="7bd5cc184f2ccb492c2d45d254ac416384bc3bbf1fdc25d4d88baeede6ad8e8ad5c02bbbf2c6df1258714be03dbad9011c7c21cd964f3be0773bd7ef2e72b50b655c67a0f413bfabde9b3b119842adc767893cbef29c7060d406b1ea42f2b9acd960964f081999e84aeff8121e2c1cd78c7a5537a3b83b97f1efce8f7631ff8f7aae3c022a6b36668abfb462cde250cd1b4f83f01a79080753fb703929e271405e7e4233efdf02e2f5b07041ef60b9a036"}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd?', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f0000000700)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10800800}, 0xc, &(0x7f0000000740)={&(0x7f0000000400)={0x28c, r3, 0xf00, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0xfc, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9000}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}]}, @TIPC_NLA_BEARER={0xc4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x5, 0x6, @dev={0xfe, 0x80, [], 0x29}, 0x8e}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8, @rand_addr="4f1bf25b297bd0ff643461c548dcc319"}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, [], 0x13}}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xa0000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}]}]}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x50}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x84}]}]}, 0x28c}, 0x1, 0x0, 0x0, 0x50}, 0x40000) 23:06:25 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r1, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r2 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r2, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000540)) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000580)="2243e5cd0547945f4f5b651e47772b34a7f5d56a5d162db3a9139acb95c6bd92ba598621312a812d49de805c47e68bd2a855b0b41a8b74b075574e907a9cdf4f551be94e", 0x44) 23:06:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:06:27 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000003, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x410) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xc00500200000923d, 0x0, 0x0, 0x0) 23:06:27 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) 23:06:27 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:27 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1}}], 0x1, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:06:27 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r1, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r2 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r2, 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000540)) [ 348.890865] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:06:28 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r1, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) r2 = add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r2, 0x0, 0x0) 23:06:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c00bd21f6144b21f76663f5"]) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x4800, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000180)={0x0, 0x5}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000340)={r2, @in6={{0xa, 0x4e21, 0x4, @empty, 0x3ff}}, 0xf20, 0x6, 0x2, 0x8, 0x5}, &(0x7f0000000280)=0x98) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:28 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x1}}], 0x1, 0x0, 0x0) 23:06:28 executing program 0: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000380)=0x3) mkdir(&(0x7f0000000000)='./file0\x00', 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYPTR=&(0x7f0000000500)=ANY=[@ANYRESDEC=r1, @ANYBLOB="edb56532f6728657173d21e1497e4cedae4d02635c6287bd9eda8561872a36f19c2077ac1f35e58ba153df339d0640b4e98e7f8b2802877bac1464bf0171ff6faed4a6589830bb0e458f7f384292ec5d53fc208ecb52f1e724c0b6a9f25adb60a25ae0139d9117fdaf6ea7c0ea284f0752d290cdaaba8fe7c9f89f4ebd1913a8577f20338b7ea1139064b3b36fb7423c74c4f5265d065e7d46b291c27b54ad6f0b71afcedd0794db3409773e8e3e46a648e22eda03cc90511176968dc00f1c5a6f5deee17c1117ac7d81946d54e36bc2abae4d70b6b25af3", @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRESDEC=r1, @ANYRES64=r1, @ANYRESDEC=r1], @ANYPTR=&(0x7f0000000180)=ANY=[@ANYRES16, @ANYRES64=0x0, @ANYRES64=r1, @ANYRES16]], @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656671756c745f7065726d697373696f6e732c0059719644d45ec1a0a6969a6daac9ac5d35fe5c230c2665fc9660739456ec206f5bbe75aa23544971909ef8ffe9ad87f9345d1d6d1b748318992f2def3b7e58a9cef2b0f01c2bc1486bb932da9ca0c09b894f210a24664af7a509bbbbb2767412058595f4e973e1832ff369f164c67387af3163cd68fd5eb6547da5a7c87ad2bc966a12022c79819e72ede70c01fd795c53185bc6ea092b43d36b9634bfcbe724a7f1e683829690c824e5674b7c8999c7680388ec023f7b46fc823316"]) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400000, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="010004000080c2000001ffffffffffffaaaac2aaaa0ab465417738f9"]) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000480)) bind$inet6(r2, &(0x7f00000002c0)={0xa, 0x4e24, 0x8001, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4}, 0x1c) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000280)=0x14) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f00000001c0)=0x2) ioctl$EVIOCSABS20(r2, 0x401845e0, &(0x7f0000000340)={0x5911, 0x5, 0x10000, 0x1, 0x5, 0x2}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) stat(&(0x7f00000003c0)='./file0/file0\x00', &(0x7f0000000400)) 23:06:28 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:30 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='lo\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040), 0x4) sendto$inet(r0, &(0x7f00000000c0)="82", 0x1, 0x0, 0x0, 0x0) 23:06:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:30 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) 23:06:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000000)={'ah\x00'}, &(0x7f0000000040)=0x1e) 23:06:30 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r1, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) add_key(&(0x7f00000004c0)='pkcs7_test\x00', &(0x7f0000000500)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) [ 351.965682] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:06:31 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r1, 0x4}, &(0x7f0000000400)=0x8) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000440)={{0x2, 0x4e24, @broadcast}, {0x6, @local}, 0x10, {0x2, 0x4e20, @remote}, 'bridge_slave_1\x00'}) 23:06:31 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0)) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) mkdir(&(0x7f0000000180)='./file0\x00', 0x105) ioctl$KDSETMODE(r2, 0x4b3a, 0x10001) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fw=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643dffd1c354e33f6cd5067e88bc02ac9babab621bcbfac70a31bccbcf6a1f65807100388530a5599aaeecb44d3e1d1e", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',default_permissions,\x00']) write$FUSE_WRITE(r2, &(0x7f00000001c0)={0x18, 0x0, 0x4, {0x3f}}, 0x18) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r2, &(0x7f00000004c0)={0xa0, 0xfffffffffffffffe, 0x6, {{0x3, 0x3, 0x4, 0xffff, 0xfffffffffffffb5e, 0xffff, {0x2, 0x0, 0x7fffffff, 0x9, 0x0, 0x6, 0x1f, 0x8, 0xa1, 0x7, 0x2, r3, r1, 0xba, 0x80000000}}, {0x0, 0x1}}}, 0xa0) 23:06:31 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) vmsplice(r1, &(0x7f0000000b40)=[{&(0x7f0000001a00)="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", 0x5c1}], 0x1, 0x0) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 23:06:31 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x4, 0x0, "dd8fcd35cbca4f2d1777bbbc9323da9d634135c376793ea81ad2b3162337bae07101c0ba91dd369ed7ce6a29b97100c41ebccf0a4f00f0506650d47faf7f4b9d35bd4b70c85a291ee250fd15549f5187"}, 0xd8) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:06:31 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89, 0x0}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000003c0)={r1, 0x4}, &(0x7f0000000400)=0x8) 23:06:31 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='./file0/file0\x00', 0x0, 0x0) 23:06:31 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:31 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 23:06:31 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000340)={0x22, 0x0, 0x4, 0xffffffff9afafa89}, &(0x7f0000000380)=0x10) 23:06:31 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000002c0)={'vcan0\x00', 0x0}) r2 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r2, &(0x7f0000010ff0), 0x10) recvmmsg(r2, &(0x7f0000000140)=[{{0x0, 0xfece, 0x0, 0x0, 0x0, 0xf5}}], 0x3, 0x0, 0x0) sendmsg$can_bcm(r0, &(0x7f00000000c0)={&(0x7f0000007ff0)={0x1d, r1}, 0x10, &(0x7f0000002ff0)={&(0x7f000000afb8)={0x1, 0x3, 0x0, {0x0, 0x2710}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "8e15adecfc04aba1"}}, 0xfcd8}}, 0x0) 23:06:31 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x4000000000000000, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x2, 0x0, 0x9, 0xe, 0x400000000000000, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0x11e, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x17}}}]}, 0x70}}, 0x0) 23:06:31 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x10000, 0x0) sendmsg(r1, &(0x7f0000002880)={&(0x7f0000000080)=@pptp={0x18, 0x2, {0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000340)="1957b8a66431d83cc17c1801f18cd5ffb261531e1c02f9d8f0b5bffbbc6113dd6f4363a4f5ef74371f4995acc18b9f3646cdadbb320aaf3395701fd57e636a539d4d4cadaa2ea38964f5c4d43a0f9ec3d34a0dd21d63fa7cb4652b4c61de213eff7d49c26e2177b7f3d3ed93ee974b7c5cf4ed68732ea09efec59e5bb39ef26b6899065cfee6630103ab08f27f1d129e2dbc25", 0x93}, {&(0x7f0000000280)="31fe616bb434cebe1f18462a618be29d752d6e28c6c7f39c3912365a7764dc7ddf3e947a243540672b9b7c5f5aa62d79eb1517ca735a3a2bd9", 0x39}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="22496085388ce10c7361ef6145ca13701d70f0ed2fb04b7b12c43c5aced0dede84ebba0609fe81cd5af48fdc8c92d46fa40a14af6c74a4512ebfe26cd01647f75d8ced61628c14529d7d2e431a5dc8504792c26242ecc1f7bdbe6a54b8756d6bd4899ee64b89a8e9ff3c1bcef7461962540cd043e52d4f3232c242fd70a4db6c5054e1c684283272fc5493d98dcfa520edcc28ea67147de970aeda90dfe346a2b3f1c0b850b3b6ff9ef508dfdd5dde873bfccf03be8dfb94627ef1856009f0deccf324d3dd9f9a306b7fe8", 0xcb}], 0x4, &(0x7f0000001500)=[{0x48, 0x109, 0x80000001, "1bd1f2aa374760356d3eadf3542fbee4a450021a9a479cabe8d45b1061c00d5d8d06301fb958a002f224dc157dfbb0f01c91"}, {0x30, 0x10d, 0x401, "936227a11c4a515fa60f8ceaf08bf7fa898879896b116a29a41bfc"}, {0x20, 0x106, 0x20, "74203ae9d6797e0c1e0cf5b8cc6b29"}, {0x1010, 0x10d, 0x3573, "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"}, {0xe8, 0x19f, 0xfffffffffffffff7, "b78cec2da9bf46f07e642024504e75c705c6cf230979a86478103abffa2c608048e2bf8b133f7c3be07c84c265306bd5aa0678ddf84dfa2b5b1af0dc5ae822888d30cb8096c00ce0bbec53d24418543faf2055231ad2c011be2fd4a954d182ad8d1510a4835d3dc2facd05856f22c13d0c83d10dd34794f345fc68cee31378baf6a8015eb75a09bdae510816d4e67a957dc77f1922a5db4bf8a1021b868252f12e3d5dbed10abfff5682c90a95dc84abb105556f11a53d8585d2d91a2492c0023654e42caa1230698501c00d774cd443cd33"}, {0x100, 0x0, 0x1, "98681dfa79a486e1e6e290c0315b0e03aeead57bce7a0f25b752b8062347326c6a59dc043b761b39e269fdbb81ec88ce0064bdf36428135dda32bbef0cdbd216da38049acbae395207a6e0db9fbc04fd72aa629946b043e3b6e4921fe8b6d83422f98c2ad83eec14a4addbb1fbeef0950b735d7b1d432851cf6dd65117a00a7bbd7dc66d54db6708e180865936cb90f6c86b050536cdb177fa56123d4cdbb62067165f5b0ffee3254615619130e6af136e435a9e31040e19a5b78c661f9342889c4626ea87718183444d2c6dce44a7872ece5823f8f22528944d0fd38a5904e5b51f8f989c0424db2ed58996"}, {0xc0, 0x112, 0x7, "c84c3776dbbf34b1f77363fcb702a35a8638cf6390fde7f001657cd0e8ef53b7edca8a41f25b4010ab8496b78b771452077765e480eaf36e448b9c37db8931d3de9551087ab92a8f53248de2d0937ee8f7dafd9ff4fdd14d0fc25a1c381bb43f19448d18c0802354591ae10dae570d8943ff26b2dbdff264baf706150eb193bc06020390453c584e36f6a953f12b3033a92f55fb8eb3c6d07cc02ecc0bf28d721baa8a125a29ead147054ff0f4"}], 0x1350}, 0x24000041) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x11) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='lo\x00', 0x10) sendto$inet(r0, 0x0, 0xffffffe3, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000240)='I', 0x1, 0x4007ff9, 0x0, 0x0) shutdown(r0, 0x1) recvfrom$inet(r0, 0x0, 0xd9, 0x2, 0x0, 0xfffffffffffffc6c) [ 353.210168] cgroup: fork rejected by pids controller in /syz0 23:06:32 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x3, 0x4) 23:06:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x5, 0x0) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:32 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:32 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x4000000000000000, &(0x7f0000000380)={&(0x7f0000000300)={0x2, 0x2, 0x0, 0x9, 0xe, 0x400000000000000, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast1={0x11e, 0x17, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x17}}}]}, 0x70}}, 0x0) 23:06:32 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x400, 0x0) 23:06:32 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 23:06:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x11) sendto$inet(r0, 0x0, 0xffffffe3, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000240)='I', 0x1, 0x4007ff9, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xd9, 0x2, 0x0, 0xfffffffffffffc6c) 23:06:32 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:32 executing program 4: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c62, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) readv(r0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/141, 0x8d}], 0x1) 23:06:33 executing program 2: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:33 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000200)=""/159) [ 354.112920] protocol 88fb is buggy, dev hsr_slave_0 [ 354.118697] protocol 88fb is buggy, dev hsr_slave_1 23:06:33 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x1, &(0x7f00000001c0)=0x2) [ 354.182722] protocol 88fb is buggy, dev hsr_slave_0 [ 354.188459] protocol 88fb is buggy, dev hsr_slave_1 23:06:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:33 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x82000, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000280)) getsockname$packet(r0, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000340)=0x14) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f00000003c0)={0xac, 0xfffffffffffffffc, 0x134000000000000, 0x646d, 0x3f}, 0x14) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x1, 0x0) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f595ee11ce741d95a3030303034303030302c757365725f69643d000000000000000000000000006f79411da6c0c99c8b6828c2c2fb1aab23b0", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6465669968756c74e5726d69732000000000000000"]) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vga_arbiter\x00', 0x100, 0x0) connect$caif(r0, &(0x7f0000000140)=@util={0x25, "fc5bc33a339559c5fb2a6fa881b17f62"}, 0x18) 23:06:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x30, 0x0, 0x31c, 0x0, 0x0, {{}, 0x0, 0x5, 0x0, {0xfffffffffffffcdc}}}, 0x30}}, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000001540)=""/138, 0x8a}, {&(0x7f0000001700)=""/162, 0xa2}, {&(0x7f00000017c0)=""/4096, 0x1000}, {&(0x7f00000027c0)=""/129, 0x81}], 0x4}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) 23:06:33 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000100)={0x4, 0xfff00, [{0x7, 0x0, 0x3}, {0x492, 0x0, 0x4}, {0x6, 0x0, 0x791}, {0x2, 0x0, 0x1}]}) 23:06:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:33 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 23:06:33 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuacct.usage\x00', 0x2, 0x0) r2 = gettid() write$cgroup_pid(r1, &(0x7f0000000180)=r2, 0x12) 23:06:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:33 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) 23:06:33 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x400031, 0xffffffffffffffff, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000), 0x0) 23:06:34 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:34 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000880)="240000005a0007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) 23:06:34 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x2000) shutdown(r0, 0x1) 23:06:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000040)=0x0) wait4(r2, &(0x7f0000000080), 0x1, &(0x7f0000000340)) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:34 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000b40)={r0, &(0x7f0000000300), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000000), 0x0}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000380)='W', 0x0}, 0x18) r1 = socket$kcm(0x29, 0x2, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000280)={r2, r3}) 23:06:34 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:34 executing program 5: r0 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) read$alg(r0, &(0x7f0000000100)=""/16, 0x10) bind$packet(r0, &(0x7f0000000040)={0x11, 0x400000000200004, r1}, 0x14) 23:06:34 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(0xffffffffffffffff) 23:06:34 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_team\x00', 0x0}) r2 = socket$inet6(0xa, 0x3, 0x10000000003) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f00000003c0)={@remote, r1}, 0x14) 23:06:34 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x2, {{0xf61, 0x1f, 0x2, 0xffffffffffffffff, 0x100000001, 0x27f7, 0x9a7, 0x8169}}}, 0x60) shutdown(r0, 0x1) 23:06:34 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:34 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) shutdown(r0, 0x1) 23:06:35 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe9a, 0x200408d4, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:06:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:35 executing program 3: shutdown(0xffffffffffffffff, 0x1) 23:06:35 executing program 3: shutdown(0xffffffffffffffff, 0x1) 23:06:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x2a9, 0x0, 0x0, 0x0, 0x4}) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={0x0, {}, {0x2, 0x0, @broadcast}, {0x2, 0x0, @remote}, 0xab052ebbe6fbd72e, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, 0x8000}) 23:06:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000000000000<0000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = fcntl$dupfd(r0, 0x406, 0xffffffffffffff9c) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000700)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000003c0)={{{@in6, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@initdev}}, &(0x7f00000004c0)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='fuse\x00', 0x8000, &(0x7f0000000500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1c00}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x9b5d}}, {@max_read={'max_read', 0x3d, 0x3f}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@euid_eq={'euid', 0x3d, r4}}, {@audit='audit'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(r3, &(0x7f0000000740)="9e29486026b98f126964e7c7a18ecd873344a6fe8688cbd064fdafd38386e5d880398673b1168a22c0b852265161185536b7af1f0110bd75fcfd139022a57e6075f5ba61ab519341728634d42bfb062c57a9af2db14e8757cd5b54af8421930bec8cc2024f0d418b0f0be4d68868539f60a01136f40d4da00dfbfd5f22e83805434b63af569ef3e53b16f1d6499e757f1c0a21d525e85911f63857506dc46861cf474261ac5da138a5d7f5339f622841d671c9d0613dec941326cd028e89d2cdfc1ce201257dfba329ed", 0xca, 0x5, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e24}, 0x6e) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000680)='/dev/dsp\x00', 0x4000, 0x0) ioctl$SG_GET_SG_TABLESIZE(r5, 0x227f, &(0x7f00000006c0)) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:35 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(0xffffffffffffffff) 23:06:35 executing program 5: clone(0x1000000000011, &(0x7f00000003c0), 0x0, 0x0, 0x0) waitid(0x0, 0x0, &(0x7f0000000180), 0x4, 0x0) pipe(0x0) 23:06:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='lo\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 23:06:35 executing program 3: shutdown(0xffffffffffffffff, 0x1) 23:06:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_Id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:35 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) [ 356.945312] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:06:36 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x40000, 0x0) shutdown(r0, 0x1) 23:06:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:36 executing program 4: socket(0x10, 0x3, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x1c) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x1}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 23:06:36 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x40000, 0x0) shutdown(r0, 0x1) 23:06:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 357.482844] ptrace attach of "/root/syz-executor.4"[13001] was attempted by "/root/syz-executor.4"[13003] 23:06:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'veth1_to_bridge\x00'}) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="000000000c00000000000000080001007366710048000200f0ffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000028a7d9b3ace8b9a0000000000000007c415f1e81eb07bc2a3d7d109b1580ce67623b84f9977af3b8bfd0bcf7c2935ac8cf018c353c9fd88f554ae4ef87d224fa6105338d7d7fb7314e1978bd40b42b9ddbc7bf19c1a625744c5bbc41aceffe9bd983591620393d1fc3b3e23c5b5c26fbff7354419e654e91956c9d4fb884ec4c95a2827d520e18b8e9cd8382987746f54b101d26d0756d2513"], 0x1}}, 0x0) 23:06:36 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() memfd_create(0x0, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(0xffffffffffffffff) 23:06:36 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:36 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @multicast1}}) 23:06:36 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, 0x0, 0x40000, 0x0) shutdown(r0, 0x1) 23:06:36 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb7}, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/77, 0x4d}, {&(0x7f0000000500)=""/246, 0xf6}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000000380)=""/184, 0xb8}, {&(0x7f0000000600)=""/204, 0xcc}], 0x5}, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="4c0000001200ff09fffefd9567a283b724a600800000000000000068354046002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca63d89613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 23:06:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) sendfile(r0, r0, &(0x7f0000000040), 0x8000) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) 23:06:37 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) shutdown(r0, 0x1) 23:06:37 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000000)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) getsockname(r0, &(0x7f0000000040)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f00000000c0)=0x80) 23:06:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) [ 358.130841] netlink: 'syz-executor.5': attribute type 29 has an invalid length. [ 358.138945] netlink: 'syz-executor.5': attribute type 29 has an invalid length. [ 358.147682] netlink: 'syz-executor.5': attribute type 29 has an invalid length. [ 358.246105] netlink: 'syz-executor.5': attribute type 29 has an invalid length. [ 358.254901] netlink: 'syz-executor.5': attribute type 29 has an invalid length. [ 358.280593] bond0: Releasing backup interface bond_slave_1 23:06:37 executing program 3: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) [ 358.367673] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 23:06:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, 0x0) 23:06:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffd) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:37 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() memfd_create(0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) 23:06:37 executing program 3: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) 23:06:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, 0x0) 23:06:38 executing program 3: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) [ 359.255356] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 23:06:38 executing program 5: 23:06:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, 0x0) 23:06:38 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) shutdown(r0, 0x0) 23:06:38 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_team\x00', 0x0}) r2 = socket$inet6(0xa, 0x3, 0x10000000003) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f00000003c0)={@remote, r1}, 0x14) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f00000000c0)={@dev, r1}, 0x14) close(r2) 23:06:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:38 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000500)={0x3, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 23:06:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x1, 0x0, [{0x1}]}) 23:06:38 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',deft_permissions,\x00\x00\x00\x00']) clone(0x4000002102001ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:39 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() memfd_create(0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) 23:06:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x2, 0x0) 23:06:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x1, 0x0, [{0x1}]}) 23:06:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:39 executing program 5: r0 = socket$inet(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb7}, 0x0) recvmsg(r0, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000100)=""/77, 0x4d}, {&(0x7f0000000500)=""/246, 0xf6}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000000380)=""/184, 0xb8}, {&(0x7f00000002c0)=""/91, 0x5b}, {&(0x7f0000000600)=""/204, 0xcc}, {&(0x7f0000000040)=""/49, 0x31}], 0x7}, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000200)="4c0000001200ff09fffefd9567a283b724a600800000000000000068354046002c001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca63d89613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 23:06:39 executing program 4: 23:06:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x1, 0x0, [{0x1}]}) [ 360.380262] netlink: 'syz-executor.5': attribute type 29 has an invalid length. [ 360.388246] netlink: 'syz-executor.5': attribute type 29 has an invalid length. [ 360.396922] netlink: 'syz-executor.5': attribute type 29 has an invalid length. 23:06:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:39 executing program 4: 23:06:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {}]}) 23:06:39 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = getpgid(0x0) sched_getattr(r1, &(0x7f0000000040), 0x30, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:39 executing program 5: 23:06:40 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) 23:06:40 executing program 4: 23:06:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:40 executing program 5: 23:06:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {}]}) 23:06:40 executing program 4: 23:06:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:40 executing program 4: 23:06:40 executing program 5: 23:06:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {}]}) 23:06:40 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000800)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f7ff46d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d93d73926358cc7d39338ea6f0cdac681357e545c131763f308bfe08526a8d1d8ac20e423118dc1c98bc2d5a997c6af75fcd2cef40a2b6f89c800000000000000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) process_vm_writev(r1, &(0x7f0000000500)=[{&(0x7f0000000080)=""/26, 0x1a}, {&(0x7f00000000c0)=""/30, 0x1e}, {&(0x7f0000000340)=""/169, 0xa9}, {&(0x7f0000000400)=""/201, 0xc9}, {&(0x7f0000000280)}, {&(0x7f00000002c0)}], 0x6, &(0x7f00000007c0)=[{&(0x7f0000000580)=""/202, 0xca}, {&(0x7f0000000680)=""/93, 0x5d}, {&(0x7f0000000700)=""/17, 0x11}, {&(0x7f0000000740)=""/102, 0x66}], 0x4, 0x0) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:41 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) gettid() r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) 23:06:41 executing program 4: 23:06:41 executing program 5: 23:06:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x1, 0x0, [{0xd}]}) 23:06:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:41 executing program 4: 23:06:41 executing program 5: 23:06:41 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000340)={0x5, @sliced={0x8, [0x16b, 0x7, 0x80000001, 0x0, 0x81, 0x0, 0x1ff, 0x5e, 0x0, 0x3d6621f8, 0x40, 0x7, 0x9329, 0xffffffffffffffff, 0xffffffff80000001, 0x9, 0x7fffffff, 0x1, 0xc4, 0x1, 0x3b, 0x3, 0x6, 0x9, 0xffffffffbae8645c, 0x8000, 0x2, 0x6, 0x0, 0xd6b, 0x7, 0x2, 0x7fffffff, 0x1, 0x4, 0xfffffffffffffff7, 0x5, 0x4, 0x61, 0x8, 0x8, 0x4, 0xf7, 0x80000000, 0x9, 0x6, 0x6, 0x6], 0x5}}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x1, 0x0, [{0xd}]}) 23:06:41 executing program 4: 23:06:41 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:41 executing program 5: 23:06:42 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) 23:06:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x1, 0x0, [{0xd}]}) 23:06:42 executing program 4: 23:06:42 executing program 5: 23:06:42 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000180)='/dev/vcs#\x00', 0x7, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000007c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x80000, &(0x7f00000006c0)=ANY=[@ANYBLOB="12a29a3845666435ec76ba4e0f14ea81415f8ce5ee89212f06d360afbafe5459fecf822eaec1ca67c5c98aa3c26c9fb7c29e62f67d2b833323cf43f3e9f5eb3eacfc0cfe2d7da548942ae740412aa5149d926a44e292b588b2d528294dfd7049c1b6de70633bee079b65c599b3f761d3bd1caccc6a3ab2d528e83cebd2bc350000000000000000", @ANYRESHEX=r2, @ANYPTR=&(0x7f0000000640)=ANY=[@ANYRESDEC=r0, @ANYRESOCT=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYPTR64=&(0x7f0000000480)=ANY=[@ANYBLOB="fe2f39fa27db1fa93008830c4486447e43f76d5d4fa9185ef931f991e0ff5195488b94fa954edb1c86cb756bdebae65de017169b2bbd07e5e14b78b07666e60d36154b43c216252111333f939007dd5d360c6c3c69d966ecc0d8ad48bce3a42553740f9dfa70abc7e23ea7b30cafffb247e95db7d42aa767cefa4297b99eb8c68046bf392364", @ANYRES32=r0, @ANYRES16=0x0, @ANYRES32=r1, @ANYBLOB="02221fa8387db44a8e1b6909e4f38f363b437f91396815f77a931a43e5ccf7396fb801f156a3d257ab6a69e36f1d2cf113093afebc4d47be6008d74837aba49ec9f23eab1e1aab32565df9cd086d5a7c76684681801429ab6792921b16d44560f5b08f3c57ba33465890", @ANYBLOB="ca0b6388a04d8a96975b6796c0fd2f9fe2f6b8376807bfba0f95bd42f6adca6ccd13a22cdb659c65800161438897e92ee13427269f8a1d4b716ba63a059cffc133fbc919a7df7c9f97e2de5e1bb2ace1a227eedefb5bc3cfbfa3fae58a44c9d4003a7b51535ba74b4dbd9cd2de12aaf9b424c99b4ec9aa97656c5575d616c47bd28d1f2373e1690631f0c0c23dd2dc96c43a"], @ANYRES64], @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x488c1, 0x0) ioctl$UI_SET_EVBIT(r3, 0x40045564, 0x1d) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x4, 0x1, 0x1f, 0x1c0000000000, 0x4}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000280)={r4, 0x4}, 0x8) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:42 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:42 executing program 5: 23:06:42 executing program 4: 23:06:42 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{}, {0xd}]}) 23:06:42 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:42 executing program 5: 23:06:42 executing program 4: 23:06:43 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:43 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) 23:06:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{}, {0xd}]}) 23:06:43 executing program 5: 23:06:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1c11c0, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080)={0x5}, 0x4) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:43 executing program 4: 23:06:43 executing program 4: 23:06:43 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:43 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{}, {0xd}]}) 23:06:43 executing program 4: 23:06:43 executing program 5: 23:06:43 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:43 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80000, 0x0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000080)=0x8) 23:06:44 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) getrandom(&(0x7f0000000280)=""/126, 0x7e, 0x2) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) 23:06:44 executing program 4: 23:06:44 executing program 5: 23:06:44 executing program 2: 23:06:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:44 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file0\x00', 0x400000, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000002c0)='/dev/dmmidi#\x00', 0x101, 0x119400) renameat(r0, &(0x7f0000000280)='./file0/file0/file0\x00', r1, &(0x7f0000000340)='./file0/file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c6769643d0000000000550dfc58b96c3bc85196ce2083b7ce6f49cefa94cc5734abc03f0d8dacb1cd6f007ad01d7d9a8ae6d7dd77d666c7dc309147ab29eff2685c6e6a915265dd9fee5956065a6ba2c67a122b38b2407cb9de9de79a2d9f5411dfa7dc469ebbad1478cbd8c38b06b1cdfb7e255f08945eacd2028b2b46d0e356a44e5ea34fe536404a7533d0e5a6fcfe6f8824a6093b4093d2d3d3b7d1bc5f9b61100e", @ANYRESDEC=0x0, @ANYBLOB="2c64026661756c745f706572f7657373696f6e732c00"]) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000380)={0x5, 0x100ff, [{0x4, 0x0, 0x9}, {0xffffffff, 0x0, 0x80}, {0x13}, {0xf3ad, 0x0, 0xa71}, {0xfd9c, 0x0, 0x8000}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x10}, 0xfffffffffffffcfa) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) 23:06:44 executing program 5: 23:06:44 executing program 2: 23:06:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:44 executing program 4: r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000000500)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x1e6) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000140)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff01000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000046ff85070000000000000000000000000001000000010000000a00000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1) 23:06:44 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x103}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025e0046bbc04fef7001c020b49ff00000000800008000800030001", 0x21) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 23:06:44 executing program 5: 23:06:45 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, 0x0}, 0x53a}], 0x2, 0x1) gettid() r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) 23:06:45 executing program 4: 23:06:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:45 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000340)={"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"}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f00000000c0), &(0x7f0000000080)=0x4) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:45 executing program 5: 23:06:45 executing program 4: 23:06:45 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0xfffffe4b) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f0000000540)=0x1, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0xffffffffffffff74, &(0x7f0000002b00), 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) 23:06:45 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:45 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x103}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025e0046bbc04fef7001c020b49ff00000000800008000800030001", 0x21) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 23:06:45 executing program 4: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0xfffffffffffffffc, 0x0, 0xffffffffffffffff}, 0x2c) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x127) sendmsg$tipc(r3, &(0x7f0000001540)={&(0x7f0000000040)=@nameseq={0x1e, 0x1, 0x0, {0x0, 0xfffffffc}}, 0x10, 0x0}, 0x0) 23:06:45 executing program 1: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000cc0)={0x0, 0x0}) gettid() r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 23:06:45 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:45 executing program 4: clock_gettime(0x800000000000002, &(0x7f0000000300)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) r0 = creat(&(0x7f0000000280)='./file1\x00', 0x0) ioctl(r0, 0x6681, 0x0) add_key(&(0x7f0000000240)='rxrpc_s\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000340)="c30f83367049ca0acdc9d1dafb2e63b1cd184154b60e17e5c697a62a30bc846a332a074bc28b01b4040c24e9", 0x2c, 0xfffffffffffffff8) add_key$user(0x0, &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@local, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000000100)=0xe8) bind(r0, &(0x7f0000000480)=@xdp={0x2c, 0xb1d390ba46a5ffad, r1, 0x5}, 0x80) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000000)) 23:06:46 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = memfd_create(&(0x7f00000028c0)='/deV/\x00\xe1\xb1c$I\xd0](\x10\xbbZ\x19\xd0\x14\x96}%\xed\x85\xb1YT\x9c\xf8@f\xa0\xd0G\x10-,\xc3+\xb8i\xc0\xaf\xbf\xfc\x99\x95\x835\xab\xeaH\b\"\x82\x82\x7f:k\xfe\xeb\x97\xd1\xbb&I\xe8\xf9\xe0\xab^\xbb\xbeY\xbf\x9f\xe3\xa5\xae\xfc\x93\xe2\xcfC\x8f\x89\xcbqB\x90a\xd3o8\xb1\xfa\xae\xe6\xb2\xaf\xfb\x1a\x10\xd5\x82\xb1$Q\x8c\x13\x9b\xc7z\xecM\x00\x01z\x8f\xdb\xb4\x82\x05S[\x85\xd9c\x16\x8dg?\x91y\xd3\xffN\xe9\x8bg\xe7\xfe<\xca#`(\xf5\xa7\x05\xc7\x12W\x94\xbc;\'\x1a\xa2\b)\x1a\xec\xec_i\xb8F\xb0\x06\x00bG\xb1\xbb\xdfx\xf8\x98\xda@\xe5M\xd0\xe4\xf0\x01V\x11/\xfa\x83\xe6^\xf0XfT\x90\xb1&D\xd1\x16a\x99\a#\xa5#\xbb\x99Fp\x92\x03\xcf\x8f\x85i\x81\xb1\x9e\x9a\a\x95\x17\xd84YT\f)\x1aSD\x19\x9d\x0e\x99!\x87\xe2?\xf2j\xfcS\xcb%C\x9b\xf8\x93\xd17\xf1\x97G\xa0g\xb5\xde\x1a\xc7\x83\xc1\x17\xcc\xd8\xf4\x15\xe5\x0e\xa7\x91N\xa3\x93\xe5&H\x7f\x1d\xd9\xa8)', 0x0) ftruncate(r1, 0xfffffd) sendfile(r0, r1, &(0x7f00000037c0), 0xfffffdef) 23:06:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r1, 0x7, 0x70bd2c, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc0c0}, 0x4000880) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f00000003c0)=@req={0x28, &(0x7f0000000380)={'gretap0\x00', @ifru_mtu}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:46 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:46 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='ns\x00') getdents(r0, &(0x7f0000000000)=""/144, 0x90) 23:06:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:47 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x103}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025e0046bbc04fef7001c020b49ff00000000800008000800030001", 0x21) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 23:06:47 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:47 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) 23:06:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:47 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000400)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$IOC_PR_PREEMPT(r0, 0x805c6103, &(0x7f00000001c0)) 23:06:47 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0x1ff, 0x0, {0x1, @vbi}}) 23:06:47 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:47 executing program 0: mkdir(&(0x7f0000000080)='./file0/file0\x00', 0xd4) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x1d) connect(r1, &(0x7f0000000240)=@sco={0x1f, {0x4, 0x0, 0x1, 0xffff, 0x2}}, 0x329) fcntl$setsig(r0, 0xa, 0x16) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) 23:06:47 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:47 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 23:06:47 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000100)={0x0, 0x1ff, 0x1, {0x1, @vbi={0x0, 0x0, 0x0, 0x0, [0x0, 0xfffffffffffffff7]}}}) [ 368.876413] syz-executor.5: vmalloc: allocation failure: 0 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz5,mems_allowed=0-1 [ 368.890631] CPU: 1 PID: 14124 Comm: syz-executor.5 Not tainted 5.0.0-rc1+ #10 [ 368.897974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 368.907382] Call Trace: [ 368.910059] dump_stack+0x173/0x1d0 [ 368.913758] warn_alloc+0x4eb/0x710 [ 368.917872] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 368.923371] __vmalloc_node_range+0x1f4/0x13a0 [ 368.928052] ? kmem_cache_alloc_trace+0x55d/0xb40 [ 368.933138] vmalloc_user+0xde/0x440 [ 368.937014] ? vb2_vmalloc_alloc+0x19d/0x4a0 [ 368.941499] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 368.946767] vb2_vmalloc_alloc+0x19d/0x4a0 [ 368.951090] __vb2_queue_alloc+0xe74/0x2100 [ 368.955482] ? vb2_common_vm_close+0xc0/0xc0 [ 368.959970] vb2_core_create_bufs+0x761/0xd00 [ 368.964552] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 368.969812] vb2_create_bufs+0x92f/0xdf0 [ 368.973967] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 368.979361] v4l2_m2m_ioctl_create_bufs+0x1bc/0x1d0 [ 368.984452] ? v4l2_m2m_ioctl_reqbufs+0x310/0x310 [ 368.989353] v4l_create_bufs+0x2c0/0x3b0 [ 368.993492] ? v4l_unsubscribe_event+0xc0/0xc0 [ 368.998131] __video_do_ioctl+0x1444/0x1b50 [ 369.002565] ? __video_do_ioctl+0x771/0x1b50 [ 369.007081] video_usercopy+0xe60/0x1830 [ 369.011222] ? video_ioctl2+0xb0/0xb0 [ 369.015137] video_ioctl2+0x9f/0xb0 [ 369.018832] ? video_usercopy+0x1830/0x1830 [ 369.023208] v4l2_ioctl+0x23f/0x270 [ 369.026895] ? v4l2_poll+0x400/0x400 [ 369.030673] do_vfs_ioctl+0xebd/0x2bf0 [ 369.034642] ? security_file_ioctl+0x92/0x200 [ 369.039228] __se_sys_ioctl+0x1da/0x270 [ 369.043271] __x64_sys_ioctl+0x4a/0x70 [ 369.047752] do_syscall_64+0xbc/0xf0 [ 369.051550] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 369.056790] RIP: 0033:0x457f29 [ 369.060052] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 369.079027] RSP: 002b:00007fd90948dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 369.086809] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 [ 369.094129] RDX: 0000000020000100 RSI: 00000000c100565c RDI: 0000000000000003 [ 369.101610] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 369.108918] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd90948e6d4 [ 369.116229] R13: 00000000004c28fa R14: 00000000004d5388 R15: 00000000ffffffff [ 369.123823] Mem-Info: [ 369.126368] active_anon:80068 inactive_anon:208 isolated_anon:0 [ 369.126368] active_file:7561 inactive_file:36153 isolated_file:0 [ 369.126368] unevictable:0 dirty:30 writeback:0 unstable:0 [ 369.126368] slab_reclaimable:4347 slab_unreclaimable:12839 [ 369.126368] mapped:58477 shmem:261 pagetables:1731 bounce:0 [ 369.126368] free:910236 free_pcp:1006 free_cma:0 [ 369.160169] Node 0 active_anon:318100kB inactive_anon:824kB active_file:30104kB inactive_file:144612kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:233888kB dirty:140kB writeback:0kB shmem:1044kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 122880kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 369.188855] Node 1 active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 369.214841] Node 0 DMA free:15904kB min:212kB low:264kB high:316kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 369.241604] lowmem_reserve[]: 0 2800 3490 3490 [ 369.246267] Node 0 DMA32 free:534564kB min:38380kB low:47972kB high:57564kB active_anon:314416kB inactive_anon:452kB active_file:22520kB inactive_file:142116kB unevictable:0kB writepending:132kB present:3129332kB managed:2872032kB mlocked:0kB kernel_stack:5952kB pagetables:6664kB bounce:0kB free_pcp:1556kB local_pcp:852kB free_cma:0kB [ 369.276322] lowmem_reserve[]: 0 0 690 690 [ 369.280546] Node 0 Normal free:11828kB min:9464kB low:11828kB high:14192kB active_anon:1560kB inactive_anon:372kB active_file:7584kB inactive_file:2496kB unevictable:0kB writepending:8kB present:786432kB managed:706992kB mlocked:0kB kernel_stack:10368kB pagetables:296kB bounce:0kB free_pcp:1880kB local_pcp:688kB free_cma:0kB [ 369.309817] lowmem_reserve[]: 0 0 0 0 [ 369.313766] Node 1 Normal free:3091124kB min:42048kB low:52560kB high:63072kB active_anon:0kB inactive_anon:0kB active_file:140kB inactive_file:0kB unevictable:0kB writepending:0kB present:3932160kB managed:3141288kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 369.341746] lowmem_reserve[]: 0 0 0 0 [ 369.345638] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 369.359200] Node 0 DMA32: 5*4kB (UME) 106*8kB (UM) 253*16kB (UME) 417*32kB (UM) 418*64kB (UM) 208*128kB (UME) 4*256kB (UME) 4*512kB (UME) 3*1024kB (UME) 5*2048kB (ME) 109*4096kB (UM) = 534484kB 23:06:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) [ 369.376908] Node 0 Normal: 1*4kB (E) 222*8kB (M) 124*16kB (UM) 42*32kB (UME) 23*64kB (UME) 13*128kB (UME) 6*256kB (UME) 4*512kB (UM) 0*1024kB 0*2048kB 0*4096kB = 11828kB [ 369.392586] Node 1 Normal: 5*4kB (UME) 4*8kB (ME) 4*16kB (U) 6*32kB (UME) 4*64kB (UME) 9*128kB (UME) 2*256kB (UM) 5*512kB (UM) 6*1024kB (M) 4*2048kB (M) 750*4096kB (M) = 3091124kB [ 369.409125] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 369.418133] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 369.426888] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 369.435892] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 369.444586] 43978 total pagecache pages [ 369.448596] 0 pages in swap cache [ 369.452184] Swap cache stats: add 0, delete 0, find 0/0 [ 369.457583] Free swap = 0kB [ 369.460630] Total swap = 0kB [ 369.463822] 1965979 pages RAM [ 369.466953] 0 pages HighMem/MovableOnly [ 369.470963] 281925 pages reserved [ 369.474539] 0 pages cma reserved 23:06:48 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x103}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="240000001a0025e0046bbc04fef7001c020b49ff00000000800008000800030001", 0x21) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") sendmmsg$alg(r0, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 23:06:48 executing program 4: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) getpeername$packet(r1, 0x0, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000008c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_int(r0, 0x0, 0x4) ioctl$FS_IOC_RESVSP(r3, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x100000000000000a}) write$P9_RFLUSH(r3, &(0x7f0000000680)={0x7}, 0xffffff50) execveat(0xffffffffffffffff, 0x0, &(0x7f0000000640), &(0x7f0000000780)=[&(0x7f00000006c0)='/selinux/context\x00'], 0x0) request_key(&(0x7f0000000180)='logon\x00', 0x0, 0x0, 0xfffffffffffffffc) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f00000002c0)=""/81) fcntl$getflags(0xffffffffffffffff, 0x408) fsetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', &(0x7f00000001c0)='/dev/input/mice\x00', 0x10, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000300)={0x2}) fdatasync(r3) syz_genetlink_get_family_id$team(&(0x7f0000000800)='team\x00') write$binfmt_misc(r3, &(0x7f0000000500)={'syz1', "224687429ef71d29c6231eba5e5418b1955db16ca0c767f7cccf776a41141eefd3a9ad8d987c05d2ccd5f5930bfe04d56ae895cb7f20f1c4dfaeba61926ae20642d10069c831cc8707448963c5d3b90b66faec0f51111adcca5f5191fc5d26b895ccccd2d7850607ebfd42dddc6d2491a5fd3191db59576a7c853c326b30ca804ac5c774443b1ebfb92be51bc4d20adb8e99b71a3256a508da39c144e9619933d150862e02bb709ee5648dac255ac010764fd52ff4c463cc"}, 0xbc) 23:06:48 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1400}}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r2, 0x5385, &(0x7f0000000340)={0x9f, ""/159}) 23:06:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd, 0x7fff}]}) 23:06:48 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast2, 0x0, 0x2b}, 0x0, @in=@local}}, 0xe8) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="021200000200000097d316bc73"], 0xd}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) 23:06:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, 0x0) 23:06:49 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:49 executing program 5: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000200)={0x1, @capture={0x0, 0x0, {0x0, 0x4}}}) 23:06:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="6664ea49c4ac", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\b\x00\x00\x00up_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) rt_sigprocmask(0x1, &(0x7f00000002c0)={0x5}, &(0x7f0000000340), 0x8) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xe) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x5}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000280)={0x4e24, 0x6, 0x8000, 0x7, 0x0, 0x101, 0x3, 0x1000, r2}, 0x20) 23:06:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000b40)="762d013abf428f831f537d10987f3f009e134c11cb6b5d479d61fac22b7c399e31904cab65dc1f2efc", 0x29, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000006b80)=[{{0x0, 0x0, 0x0}, 0xb492}, {{0x0, 0x0, &(0x7f0000006b00)=[{0x0}, {0x0}], 0x2}}], 0x2, 0x40000100, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000006e40)={{{@in=@local, @in=@broadcast, 0x4e21, 0x0, 0x4e21, 0x0, 0xc1332b95a98c61c5, 0x0, 0x0, 0xff}, {0x1, 0xffff, 0x401, 0x484bd41b, 0x0, 0x13d}, {0x70, 0x1, 0x401}, 0x19ad, 0x0, 0x0, 0x1, 0x0, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x6, 0x0, 0x4, 0x2, 0x3, 0x10001}}, 0xe8) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000002c0)=0xda8, 0x171) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000001c0)={{0x5, 0x8, 0xfffffffffffffff9, 0xfffffffffffffff8}, 'syz1\x00', 0x3a}) 23:06:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, 0x0) 23:06:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f0000000180)}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_subtree(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0e"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40086602, 0x400008) 23:06:49 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, 0x0) 23:06:49 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ff2000/0x2000)=nil, 0x5000) 23:06:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$security_capability(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)='security.capability\x00', &(0x7f0000000340)=@v3={0x3000000, [{0x7, 0x100}, {0x7}], r1}, 0x18, 0x1) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:50 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(0x0, 0x0, 0x0) 23:06:50 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x1, 0x0, [{0x1}]}) 23:06:50 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0xd) ioctl$TCSETSF(r1, 0x541b, &(0x7f0000000040)) 23:06:50 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbff}, 0xc) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:06:50 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0)=@int=0x100, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x1, 0x0, [{0x1}]}) 23:06:50 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video35\x00', 0x2, 0x0) 23:06:50 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:50 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbff}, 0xc) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:06:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x1, 0x0, [{0x1}]}) 23:06:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'sit0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") 23:06:51 executing program 0: mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0xc0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:51 executing program 2: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) socket$inet(0x2, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:51 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0x0, 0x7fff}]}) 23:06:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0/file0\x00', 0x0, 0x0) 23:06:51 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$tipc(0x1e, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000280)={'ip_vti0\x00', @ifru_data=&(0x7f00000001c0)="d37a44ea83307d69a6fe965eec4f14bec7af0659874ce0d1068824f2e211d768"}) 23:06:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) unshare(0x40040000) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="ff0000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64656661756c745f706572c99a1650696f6e732c00"]) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0x0, 0x7fff}]}) [ 372.978920] IPVS: ftp: loaded support on port[0] = 21 23:06:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0x0, 0x7fff}]}) 23:06:52 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 23:06:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:52 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000680)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x0) 23:06:52 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:52 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000b40)="762d013abf428f831f537d10987f3f009e134c11cb6b5d479d61fac22b7c399e31904cab65dc1f2efc", 0x29, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006b80)=[{{0x0, 0x0, 0x0}, 0xb492}, {{0x0, 0x0, &(0x7f0000006b00)=[{0x0}, {0x0}], 0x2}}], 0x2, 0x40000100, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000006e40)={{{@in=@local, @in=@broadcast, 0x4e21, 0x0, 0x4e21, 0x0, 0xc1332b95a98c61c5, 0xa0, 0x0, 0xff}, {0x1, 0xffff, 0x401, 0x484bd41b, 0x0, 0x13d, 0x10000}, {0x70, 0x1, 0x401}, 0x19ad, 0x0, 0x1, 0x1, 0x0, 0x3}, {{@in=@empty, 0x4d3, 0x3c}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x6, 0x0, 0x4, 0x2, 0x3, 0x10001}}, 0xe8) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000002c0)=0xda8, 0x171) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000001c0)={{0x5, 0x8, 0xfffffffffffffff9, 0xfffffffffffffff8}, 'syz1\x00', 0x3a}) 23:06:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:53 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{0x1}, {0xd}]}) 23:06:53 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:06:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4020180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 23:06:54 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) 23:06:54 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000b40)="762d013abf428f831f537d10987f3f009e134c11cb6b5d479d61fac22b7c399e31904cab65dc1f2efc95ac1348db", 0x2e, 0x0, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000002c0)=0xda8, 0x171) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x4, 0x2) ioctl$TIOCNOTTY(r1, 0x5422) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 23:06:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x1, 0x0, [{0xd, 0x7fff}]}) 23:06:54 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:54 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:06:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x1, 0x0, [{0xd, 0x7fff}]}) 23:06:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x80000000003, 0x0) ioctl$int_in(r1, 0x800000c0045006, &(0x7f00000000c0)=0x80000000035) 23:06:55 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:06:55 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:55 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:06:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x1, 0x0, [{0xd, 0x7fff}]}) 23:06:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000300)=0x1) ioctl$GIO_UNIMAP(r0, 0x8910, 0x0) 23:06:55 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:55 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000040000001) ioctl$FS_IOC_FSGETXATTR(r0, 0x802c550a, &(0x7f0000000100)={0x2, 0x0, 0x0, 0x74000a, 0xf7ffffff7ff0bdbe}) 23:06:55 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:06:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='\x00', 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000280)={r0, 0x53, 0x1}, &(0x7f0000000340)={'enc=', 'pkcs1', ' hash=', {'vmac(des)\x00'}}, &(0x7f00000003c0)="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", &(0x7f00000013c0)=""/118) mkdir(&(0x7f00000002c0)='./file0/file0\x00', 0x120) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{}, {0xd, 0x7fff}]}) 23:06:56 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:06:56 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 23:06:56 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000300)=0x1) ioctl$GIO_UNIMAP(r0, 0x8910, 0x0) 23:06:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{}, {0xd, 0x7fff}]}) 23:06:56 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:56 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:06:56 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 23:06:56 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000006480)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000000)={0x2, 0x0, [{}, {0xd, 0x7fff}]}) 23:06:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x34, 0x829, 0x0, 0x0, {0x3, 0x1000000}, [@nested={0x3c, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0xffffffff00000000}}]}]}, 0x2c}}, 0x0) 23:06:56 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:06:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) dup2(r0, r1) 23:06:57 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 23:06:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) write$input_event(r1, &(0x7f00000000c0)={{}, 0x3, 0x2000000000, 0x400}, 0x18) 23:06:57 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:06:57 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x0, 0x9}}, 0x20) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0) 23:06:57 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{0x0, 0x0, 0x0}], 0x1, 0x0) 23:06:57 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:06:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 23:06:57 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000300)=0x1) ioctl$GIO_UNIMAP(r0, 0x5437, 0x0) 23:06:57 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d8004563dcea1227609e9e29857a688f8952de0b39df718179f3fcf167e740bb0fa2eb23896c5b19c2f39db52d9b9610a339f129c9049c15888bb5b241f6a4c081f1de277e065d18ee2292df30d9d92dd5b05a3ae4fe07f2d2c34434fb261a44bae3c32c34342e015b1dc85093b34006f448f19b0922e121d5c99791fc25fb78f7956b8485ba6497f3816bd81eab6aba27e", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0/file0/file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x200, &(0x7f0000000040)='./file0/file0/file0\x00', r1, &(0x7f0000000340)="6ef8a53de921e43fea7392c55ce8d913084323a26466a310a220f0974dbe0fd7fcb2d83b34b1f69f7e281f477c1d0381a01350994dea52d6f0c859b9ef05d7a8ef4902e1b728cc95522b87c613c1c05afb5241511c9f6bd0d9a3c1106346c99d954e155d044f84babac146cc0c1ce26fab44ce3f491ae720f191e816c283c7227c50cb01189cd880980a64e34a199f4c42bc7fc14c0027c4e22434bd103cf946caea5a76d1b4196ca8696568913a77819f1b930e6e42") 23:06:57 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) 23:06:58 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x0, 0x0, r0, 0x0}]) 23:06:58 executing program 3: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000200)={0x1, @raw_data="44629661306d8944de2398f663296c6f369b7b4ff9b6905c333868bbb302e26c5ce35913d49706022573c68529846d65352764726078ae93a5385ac7c86c7bfb17f03a1b26c3229e00ffc838609f65feb321a1011ad777f6d793863c01dae88b22af756202e12a144fcb063f4afc322ce8432d8d8f0191a3b43b3d185f4a86e5cff82ae279d738ea8961b5f98b54a8f52c90105b0a67c448e20d925580ec0bd97987935ddadd9c0c8e65a43863f336f4d1d537c1fcbfe91cb96f6473e52fbaf6ce88bb9a30a5c688"}) 23:06:58 executing program 5: syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:06:58 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:06:58 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x8}, 0x0) 23:06:58 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:06:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = getuid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:06:58 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f0000000000)) 23:06:58 executing program 5: syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) [ 379.721850] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 379.820491] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 23:06:58 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:06:59 executing program 5: syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:06:59 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000300)=0x1) ioctl$GIO_UNIMAP(r0, 0x89f0, 0x0) 23:06:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@getrule={0x14, 0x22, 0x401}, 0x14}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in6=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x8}, 0x0) 23:06:59 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:06:59 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) [ 380.319438] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 23:06:59 executing program 5: set_mempolicy(0x0, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:06:59 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000b40)="762d013abf428f831f537d10987f3f009e134c11cb6b5d479d61fac22b7c399e31904cab65dc1f2efc95ac1348db", 0x2e, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000006b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003e40)=""/230, 0xe6}}, {{0x0, 0x0, &(0x7f0000006b00)=[{0x0}, {0x0}], 0x2}}], 0x2, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000002c0)=0xda8, 0x171) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 23:06:59 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:06:59 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000300)=0x1) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x8910, 0x0) 23:06:59 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(r0) 23:06:59 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000340)='/dev/vbi#\x00', 0x0, 0x2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000003c0)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000040)=0x3, 0x4) r2 = syz_open_dev$usb(&(0x7f00000002c0)='/dev/bus/usb/00#/00#\x00', 0x5, 0x40) ioctl$NBD_DISCONNECT(r2, 0xab08) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4(r3, &(0x7f0000000080)=@nfc_llcp, &(0x7f0000000280)=0x80, 0x80000) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x5) 23:06:59 executing program 5: set_mempolicy(0x0, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:06:59 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:00 executing program 5: set_mempolicy(0x0, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:07:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0xf, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) 23:07:00 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:00 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 23:07:00 executing program 5: set_mempolicy(0x4003, 0x0, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:07:00 executing program 0: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x2) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0xc0040022}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r1, 0xc21, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffff0643}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x22}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000001}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r2, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643dc0684c5fd0296a9e6e53fc1322205505ae1b42502f6497f5d2951e3b16861d93a1bf91bd81b77c1c231317d5a1c937c7f5701e7753e1a8393d525cabd082d5a0387f3972e21bcfb052609fc4b9b14cb33d803f62fc46723e452e00774490513fbde84f6618608389620ce23da945f1c12480afb920ec8b811c1d6b86d3fa91d6304fbb1da63e10cc80484e47081bf2", @ANYRESDEC=0x0, @ANYBLOB="2c67896f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 23:07:00 executing program 3: openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r0 = open(0x0, 0x0, 0x80) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) write$binfmt_script(r2, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x28b) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) fallocate(r1, 0x40, 0x4, 0xfff) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000100)={0x2, 0x2}, 0x10) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000580)=0xffffffffffffffff) ioctl$int_in(r4, 0x5452, &(0x7f0000000040)=0x19b) sendto$inet(r4, 0x0, 0x0, 0x900000020000000, &(0x7f0000000000)={0x2, 0x2, @local}, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000180)='SEG6\x00') sendto$inet(r4, &(0x7f00000001c0)="a5fe9e7be7060850100792f46b647308d3e2a67328969288734cc698158a84b40408261762639ee5e5881d4fb471fcb9639d30513ab42a04f920d8c1fa0c6ed49b0028fda44d1e69121bd2ff68125d42c7beccab2998e3392614583dd729cd341292ded369a34c4c75e12e8e0f519531fc8f11e74b74f2e5ad24cd0ab65395a2307394f48438306edcbb2ad2261f7535abea9833df32f75d92d392390b4fef75c9923a1745b53c", 0xa7, 0x8801, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r3, 0x6, &(0x7f0000000080)={0x0, 0x2, 0xc701, 0x6, r5}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1000000000040000, 0x100) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) quotactl(0xffffeffffffffffe, 0x0, 0x0, 0x0) clock_getres(0x2, &(0x7f00000000c0)) r6 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x9) ioctl$RTC_AIE_ON(r0, 0x7001) connect$inet(0xffffffffffffffff, 0x0, 0x0) add_key(&(0x7f00000001c0)='cifs.srgoL\xba]\xa4bLWD\xd3a\x1ed', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000380)="9b68d05fd2c86ce86915964bea150d31254488764f7f8929a86f7737ff750f4f8ebc5074d5ac0ca066a76e7094c3e3ba85350e7e6a1f59694241e09759cd523fe3cb0eb798", 0x45, 0xfffffffffffffffc) ioctl$RTC_PIE_OFF(r6, 0x7006) 23:07:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:01 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 23:07:01 executing program 5: set_mempolicy(0x4003, 0x0, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:07:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:01 executing program 3: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) sendmmsg(r2, &(0x7f0000007e00), 0x136a88c8311572c, 0x0) 23:07:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:07:01 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x400, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, &(0x7f00000001c0)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="cb8c6e66643d41977bf22e306bfdeab4002ed525e3b15f68557b428fc48a2f5db9f777f4ab5ac7854b6b8870d1839778aa9053531d7484d68d5fa544216a79dca0346329c01ac3ad97b804bd055bf737fc706237cc355be3c0a016e6b511a5ed86a29b9aca49e82f98ba98b7bdb3f19dd065f8eef2e4aa8bfdfc00d43b754522f56b87caa5", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2321202e2f67696c65300a99bd9b63830d0316c46e8d7bb8d5e5fb4871b6ee9a42496669050524b8"], 0x1) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x10040, 0x0) ioctl$VIDIOC_QUERYMENU(r2, 0xc02c5625, &(0x7f0000000080)={0x1, 0xffffffff, @name="0e89edda4a74c370c2a5b7b6f44522dc4981e8e8265160e9eb2706163aa06d2f"}) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) symlink(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000280)='./file0/file0\x00') 23:07:01 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:01 executing program 5: set_mempolicy(0x4003, 0x0, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:07:01 executing program 2: timer_create(0x2, 0x0, &(0x7f00000002c0)) 23:07:01 executing program 4: r0 = socket$kcm(0xa, 0x0, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:01 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 23:07:01 executing program 3: r0 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0x102, 0x100000000000001}, 0x20) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000400)=ANY=[@ANYBLOB="000000000000000000000000fdff0000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x1}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x0, 0x2}, 0x20) 23:07:01 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8), 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:07:02 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0xc, 0x0, &(0x7f0000000480)=[@dead_binder_done], 0x0, 0xfdfdffff, 0x0}) [ 382.902500] protocol 88fb is buggy, dev hsr_slave_0 [ 382.908274] protocol 88fb is buggy, dev hsr_slave_1 [ 382.914347] protocol 88fb is buggy, dev hsr_slave_0 [ 382.920030] protocol 88fb is buggy, dev hsr_slave_1 [ 382.926051] protocol 88fb is buggy, dev hsr_slave_0 [ 382.931755] protocol 88fb is buggy, dev hsr_slave_1 [ 382.937647] protocol 88fb is buggy, dev hsr_slave_0 [ 382.943386] protocol 88fb is buggy, dev hsr_slave_1 23:07:02 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sched_yield() execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 383.061210] binder: 15444:15445 BC_DEAD_BINDER_DONE 0000000000000000 not found [ 383.106789] binder: 15444:15447 BC_DEAD_BINDER_DONE 0000000000000000 not found 23:07:02 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) vmsplice(r1, &(0x7f0000001500)=[{&(0x7f00000013c0), 0xfffffd90}], 0x1, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 23:07:02 executing program 4: r0 = socket$kcm(0xa, 0x0, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) [ 383.222760] protocol 88fb is buggy, dev hsr_slave_0 [ 383.228493] protocol 88fb is buggy, dev hsr_slave_1 23:07:02 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x80000) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r0, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 23:07:02 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8), 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:07:02 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 23:07:02 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'veth0_to_bond\x00'}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0) 23:07:02 executing program 4: r0 = socket$kcm(0xa, 0x0, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:02 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8), 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:07:02 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x80000) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r0, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 23:07:03 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 23:07:03 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:07:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_int(r0, 0x1, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'veth0_to_bond\x00'}) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0) 23:07:03 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:03 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x80000) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r0, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 23:07:03 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x12) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x502, 0x0) timerfd_gettime(r2, &(0x7f0000000080)) 23:07:03 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:07:03 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r0) 23:07:03 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x100000004e22, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x152) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14, 0x80000) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x2, 0x100132, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00000005c0), 0x0, 0x0, 0x0, 0x0) 23:07:03 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:03 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) 23:07:04 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:07:04 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000180)=@srh, 0x8) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000140), 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) 23:07:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) r1 = dup(r0) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f00000000c0)={0x4000000, 0xfff, 0x2}) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:04 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = memfd_create(&(0x7f00000028c0)='/deV/\x00\xe1\xb1c$I\xd0](\x10\xbbZ\x19\xd0\x14\x96}%\xed\x85\xb1YT\x9c\xf8@f\xa0\xd0G\x10-,\xc3+\xb8i\xc0\xaf\xbf\xfc\x99\x95\x835\xab\xeaH\b\"\x82\x82\x7f:k\xfe\xeb\x97\xd1\xbb&I\xe8\xf9\xe0\xab^\xbb\xbeY\xbf\x9f\xe3\xa5\xae\xfc\x93\xe2\xcfC\x8f\x89\xcbqB\x90a\xd3o8\xb1\xfa\xae\xe6\xb2\xaf\xfb\x1a\x10\xd5\x82\xb1$Q\x8c\x13\x9b\xc7z\xecM\x00\x01z\x8f\xdb\xb4\x82\x05S[\x85\xd9c\x16\x8dg?\x91y\xd3\xffN\xe9\x8bg\xe7\xfe<\xca#`(\xf5\xa7\x05\xc7\x12W\x94\xbc;\'\x1a\xa2\b)\x1a\xec\xec_i\xb8F\xb0\x06\x00bG\xb1\xbb\xdfx\xf8\x98\xda@\xe5M\xd0\xe4\xf0\x01V\x11/\xfa\x83\xe6^\xf0XfT\x90\xb1&D\xd1\x16a\x99\a#\xa5#\xbb\x99Fp\x92\x03\xcf\x8f\x85i\x81\xb1\x9e\x9a\a\x95\x17\xd84YT\f)\x1aSD\x19\x9d\x0e\x99!\x87\xe2?\xf2j\xfcS\xcb%C\x9b\xf8\x93\xd17\xf1\x97G\xa0g\xb5\xde\x1a\xc7\x83\xc1\x17\xcc\xd8\xf4\x15\xe5\x0e\xa7\x91N\xa3\x93\xe5&H\x7f\x1d\xd9\xa8)', 0x0) ftruncate(r1, 0xfffffd) sendfile(r0, r1, &(0x7f00000037c0)=0xf10001, 0xfffffdef) chmod(0x0, 0x0) getgroups(0x0, 0x0) 23:07:04 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) close(r0) 23:07:04 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(0x0) mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:07:04 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f0000000180)}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400008) 23:07:04 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:04 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(0x0) mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:07:04 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) close(r0) 23:07:04 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:05 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x1020, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x6002, 0x0) 23:07:05 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x0, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:05 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(0x0) mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:07:05 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) close(r0) 23:07:05 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4140, 0x0) fcntl$setsig(r0, 0xa, 0xb) fcntl$setlease(r0, 0x400, 0x1) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000280)={0x2e8, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x6c, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0xfff, @ipv4={[], [], @local}, 0xe366}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}]}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffffffff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xd3e}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x340}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_LINK={0x88, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x21897724}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x24, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0xdc, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_team\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x28}}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x6, @loopback, 0x9}}}}]}]}, 0x2e8}}, 0x4080) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r1, &(0x7f0000001640)=ANY=[], 0xf5aab446) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 23:07:05 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:05 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="2569b1", @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643dcf48eaa495e84548b042b5737241c1564da662a2919fd15eac01190a63dced1c0f07af9959cba3affa6b5eb02235079a1b269a8433a5d4", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:05 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = memfd_create(&(0x7f00000028c0)='/deV/\x00\xe1\xb1c$I\xd0](\x10\xbbZ\x19\xd0\x14\x96}%\xed\x85\xb1YT\x9c\xf8@f\xa0\xd0G\x10-,\xc3+\xb8i\xc0\xaf\xbf\xfc\x99\x95\x835\xab\xeaH\b\"\x82\x82\x7f:k\xfe\xeb\x97\xd1\xbb&I\xe8\xf9\xe0\xab^\xbb\xbeY\xbf\x9f\xe3\xa5\xae\xfc\x93\xe2\xcfC\x8f\x89\xcbqB\x90a\xd3o8\xb1\xfa\xae\xe6\xb2\xaf\xfb\x1a\x10\xd5\x82\xb1$Q\x8c\x13\x9b\xc7z\xecM\x00\x01z\x8f\xdb\xb4\x82\x05S[\x85\xd9c\x16\x8dg?\x91y\xd3\xffN\xe9\x8bg\xe7\xfe<\xca#`(\xf5\xa7\x05\xc7\x12W\x94\xbc;\'\x1a\xa2\b)\x1a\xec\xec_i\xb8F\xb0\x06\x00bG\xb1\xbb\xdfx\xf8\x98\xda@\xe5M\xd0\xe4\xf0\x01V\x11/\xfa\x83\xe6^\xf0XfT\x90\xb1&D\xd1\x16a\x99\a#\xa5#\xbb\x99Fp\x92\x03\xcf\x8f\x85i\x81\xb1\x9e\x9a\a\x95\x17\xd84YT\f)\x1aSD\x19\x9d\x0e\x99!\x87\xe2?\xf2j\xfcS\xcb%C\x9b\xf8\x93\xd17\xf1\x97G\xa0g\xb5\xde\x1a\xc7\x83\xc1\x17\xcc\xd8\xf4\x15\xe5\x0e\xa7\x91N\xa3\x93\xe5&H\x7f\x1d\xd9\xa8)', 0x0) ftruncate(r1, 0xfffffd) sendfile(r0, r1, &(0x7f00000037c0)=0xf10001, 0xfffffdef) chmod(0x0, 0x0) getgroups(0x0, 0x0) 23:07:05 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:07:05 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:06 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(0xffffffffffffffff) 23:07:06 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:07:06 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:06 executing program 0: mkdir(&(0x7f0000000080)='./file1\x00', 0x20) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:06 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(0xffffffffffffffff) 23:07:06 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:06 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000140), 0x8) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) 23:07:06 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x2) 23:07:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() clock_gettime(0x2, &(0x7f0000000280)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f00000002c0)={0x0, r3+30000000}, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) tkill(r2, 0x17) 23:07:06 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:07 executing program 1: gettid() r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000940)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000000c0), 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(0xffffffffffffffff) 23:07:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c64006601005f7065726d697373696f6e732c000000"]) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 388.146423] ptrace attach of "/root/syz-executor.2"[15963] was attempted by "/root/syz-executor.2"[15969] 23:07:07 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) 23:07:07 executing program 3: mknod$loop(&(0x7f0000000100)='./file0\x00', 0x6009, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount(&(0x7f0000000140)=@filename='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='squashfs\x00', 0x0, 0x0) 23:07:07 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:07 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) 23:07:07 executing program 3: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x4140, 0x0) fcntl$setsig(r0, 0xa, 0xb) fcntl$setlease(r0, 0x400, 0x1) rt_sigtimedwait(&(0x7f00005a1000)={0xfffffffffffffffd}, 0x0, 0x0, 0x8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000600)={&(0x7f0000000280)={0x288, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x0, 0xfff, @ipv4={[], [], @local}, 0xe366}}, {0x14, 0x2, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}]}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7ff}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x340}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800000000}]}, @TIPC_NLA_LINK={0x78, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x21897724}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffc}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MEDIA={0x24, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0xdc, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_team\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1000}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x28}}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x6, @loopback, 0x9}}}}]}]}, 0x288}}, 0x4080) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r1, &(0x7f0000001640)=ANY=[], 0xf5aab446) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) 23:07:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = memfd_create(&(0x7f00000028c0)='/deV/\x00\xe1\xb1c$I\xd0](\x10\xbbZ\x19\xd0\x14\x96}%\xed\x85\xb1YT\x9c\xf8@f\xa0\xd0G\x10-,\xc3+\xb8i\xc0\xaf\xbf\xfc\x99\x95\x835\xab\xeaH\b\"\x82\x82\x7f:k\xfe\xeb\x97\xd1\xbb&I\xe8\xf9\xe0\xab^\xbb\xbeY\xbf\x9f\xe3\xa5\xae\xfc\x93\xe2\xcfC\x8f\x89\xcbqB\x90a\xd3o8\xb1\xfa\xae\xe6\xb2\xaf\xfb\x1a\x10\xd5\x82\xb1$Q\x8c\x13\x9b\xc7z\xecM\x00\x01z\x8f\xdb\xb4\x82\x05S[\x85\xd9c\x16\x8dg?\x91y\xd3\xffN\xe9\x8bg\xe7\xfe<\xca#`(\xf5\xa7\x05\xc7\x12W\x94\xbc;\'\x1a\xa2\b)\x1a\xec\xec_i\xb8F\xb0\x06\x00bG\xb1\xbb\xdfx\xf8\x98\xda@\xe5M\xd0\xe4\xf0\x01V\x11/\xfa\x83\xe6^\xf0XfT\x90\xb1&D\xd1\x16a\x99\a#\xa5#\xbb\x99Fp\x92\x03\xcf\x8f\x85i\x81\xb1\x9e\x9a\a\x95\x17\xd84YT\f)\x1aSD\x19\x9d\x0e\x99!\x87\xe2?\xf2j\xfcS\xcb%C\x9b\xf8\x93\xd17\xf1\x97G\xa0g\xb5\xde\x1a\xc7\x83\xc1\x17\xcc\xd8\xf4\x15\xe5\x0e\xa7\x91N\xa3\x93\xe5&H\x7f\x1d\xd9\xa8)', 0x0) ftruncate(r1, 0xfffffd) sendfile(r0, r1, &(0x7f00000037c0)=0xf10001, 0xfffffdef) chmod(0x0, 0x0) 23:07:07 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="c60205a91302f101d933f7460cc552d5fef7201e02d64c1cdf6cf825fa885bd677c66756d0f3c288c12c952f93e5451debb8fb9567ac4920f2ed5da8213fae92570b2c9d3ea8963eb685a0fd6d82dd3bc9a84e49afa5515191a015036c244537a65ff7a4d54277f24981f85aafaa3f55a8fea057376dcf7d6cd0010a5a9d2f8dfc3ceb99ac5bc1fcfe11f192daa64c5e322965bf75a2b33c5b330d1306ea7c8ed3b112f19f1c66", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000020000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x0, 0x20}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000140)={r2, 0x80000000}, &(0x7f0000000180)=0x8) clone(0x4000002102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:07 executing program 5: set_mempolicy(0x4003, &(0x7f00003ccff8)=0x10003, 0x79) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') mbind(&(0x7f0000009000/0x3000)=nil, 0x3000, 0x1, 0x0, 0x0, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) 23:07:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() clock_gettime(0x2, &(0x7f0000000280)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f00000002c0)={0x0, r3+30000000}, 0x8) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) tkill(r2, 0x17) 23:07:08 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) [ 389.208918] net_ratelimit: 29 callbacks suppressed [ 389.208939] protocol 88fb is buggy, dev hsr_slave_0 [ 389.219601] protocol 88fb is buggy, dev hsr_slave_1 [ 389.225568] protocol 88fb is buggy, dev hsr_slave_0 [ 389.231102] protocol 88fb is buggy, dev hsr_slave_1 [ 389.236896] protocol 88fb is buggy, dev hsr_slave_0 [ 389.242410] protocol 88fb is buggy, dev hsr_slave_1 [ 389.248092] protocol 88fb is buggy, dev hsr_slave_0 [ 389.253681] protocol 88fb is buggy, dev hsr_slave_1 23:07:08 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:08 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = memfd_create(&(0x7f00000028c0)='/deV/\x00\xe1\xb1c$I\xd0](\x10\xbbZ\x19\xd0\x14\x96}%\xed\x85\xb1YT\x9c\xf8@f\xa0\xd0G\x10-,\xc3+\xb8i\xc0\xaf\xbf\xfc\x99\x95\x835\xab\xeaH\b\"\x82\x82\x7f:k\xfe\xeb\x97\xd1\xbb&I\xe8\xf9\xe0\xab^\xbb\xbeY\xbf\x9f\xe3\xa5\xae\xfc\x93\xe2\xcfC\x8f\x89\xcbqB\x90a\xd3o8\xb1\xfa\xae\xe6\xb2\xaf\xfb\x1a\x10\xd5\x82\xb1$Q\x8c\x13\x9b\xc7z\xecM\x00\x01z\x8f\xdb\xb4\x82\x05S[\x85\xd9c\x16\x8dg?\x91y\xd3\xffN\xe9\x8bg\xe7\xfe<\xca#`(\xf5\xa7\x05\xc7\x12W\x94\xbc;\'\x1a\xa2\b)\x1a\xec\xec_i\xb8F\xb0\x06\x00bG\xb1\xbb\xdfx\xf8\x98\xda@\xe5M\xd0\xe4\xf0\x01V\x11/\xfa\x83\xe6^\xf0XfT\x90\xb1&D\xd1\x16a\x99\a#\xa5#\xbb\x99Fp\x92\x03\xcf\x8f\x85i\x81\xb1\x9e\x9a\a\x95\x17\xd84YT\f)\x1aSD\x19\x9d\x0e\x99!\x87\xe2?\xf2j\xfcS\xcb%C\x9b\xf8\x93\xd17\xf1\x97G\xa0g\xb5\xde\x1a\xc7\x83\xc1\x17\xcc\xd8\xf4\x15\xe5\x0e\xa7\x91N\xa3\x93\xe5&H\x7f\x1d\xd9\xa8)', 0x0) ftruncate(r1, 0xfffffd) sendfile(r0, r1, &(0x7f00000037c0)=0xf10001, 0xfffffdef) [ 389.472934] protocol 88fb is buggy, dev hsr_slave_0 [ 389.478725] protocol 88fb is buggy, dev hsr_slave_1 23:07:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:08 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:08 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000280)=0x7ff, 0x4) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 23:07:08 executing program 1: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000080)={'lo:\x01\x00'}) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$packet(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b97000)={0x1, &(0x7f000048fff0)=[{0x6}]}, 0x10) getsockopt$sock_buf(r1, 0x1, 0x1a, &(0x7f0000000000)=""/1, &(0x7f0000561ffc)=0xff1d) 23:07:09 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:09 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x5d}}, 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 23:07:09 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5437, 0x0) 23:07:09 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:09 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) timerfd_settime(r2, 0x0, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) epoll_pwait(r1, &(0x7f00008c9fc4)=[{}], 0x1, 0xfffffffffffffff7, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000021ff4)={0x2001}) 23:07:09 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount(0x0, 0x0, 0x0, 0x0, 0x0) dup2(r1, r0) 23:07:09 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:09 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/wireless\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x0) 23:07:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) mkdir(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) lstat(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000380)) [ 390.949448] audit: type=1326 audit(1551827229.991:43): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16372 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0xffff0000 23:07:10 executing program 3: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0x10, 0x2, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000019007f5300fe01b2a4a280930a600000ffa843359154bd802c0001002caa976b00d1000019000500fe800000000000ee1338d54400136ef75afb83de448daa7227a9c440b8220000060cec4fab91d50000", 0x55}], 0x1}, 0x0) r2 = gettid() tkill(r2, 0x23) 23:07:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) chmod(0x0, 0x0) 23:07:10 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:10 executing program 1: rmdir(&(0x7f0000000280)='./file0\x00') r0 = open(&(0x7f00000001c0)='./file0\x00', 0xa59412805c63939d, 0x0) write$binfmt_aout(r0, &(0x7f0000000340)={{0x0, 0x80000001, 0x800, 0x0, 0x0, 0x0, 0x322, 0x2}, "1b275f729238852e2d80e2f4a5a76a89af93e2d1adcd1ea736b8c9e17943a6bce8bd8d0bb0f97c03f9fd8ad784f77c0fd1fd6b4a1237a335b64d072019b2a3"}, 0x5f) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$int_in(r0, 0x541d, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000100)={'bcsf0\x00', {0x2, 0x0, @loopback}}) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, &(0x7f0000000300)) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x6}, 0x4) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000140)) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$packet_fanout_data(r2, 0x107, 0x16, 0x0, 0x0) r3 = socket(0x200000000000011, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000240)={'lo\x00', 0x0}) bind$packet(r3, &(0x7f0000000000)={0x11, 0x1, r4}, 0x14) sendmmsg(r3, &(0x7f0000000d00), 0x400004e, 0x0) [ 391.109048] audit: type=1326 audit(1551827230.151:44): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16384 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0xffff0000 [ 391.205931] netlink: 13 bytes leftover after parsing attributes in process `syz-executor.3'. 23:07:10 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 23:07:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x301000, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:10 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b0") bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 391.741501] audit: type=1326 audit(1551827230.781:45): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16372 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0xffff0000 23:07:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) mkdir(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) lstat(&(0x7f0000000300)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000380)) [ 391.911959] audit: type=1326 audit(1551827230.951:46): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16384 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0xffff0000 23:07:11 executing program 4: socket$kcm(0xa, 0x2, 0x73) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") timerfd_create(0x5, 0x0) [ 392.121375] audit: type=1326 audit(1551827231.161:47): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16417 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0xffff0000 23:07:11 executing program 4: socket$kcm(0xa, 0x2, 0x73) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:11 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) pipe(&(0x7f0000000040)) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x10}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x200000000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:07:12 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000003c0)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x8005001f, 0x0, 0x0, 0x0, 0x0, 0x6500}) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000240)={{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}) 23:07:12 executing program 4: socket$kcm(0xa, 0x2, 0x73) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) 23:07:12 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x200000000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) 23:07:12 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000500)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) 23:07:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 393.241409] audit: type=1326 audit(1551827232.281:48): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16448 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0xffff0000 23:07:12 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, 0x0, 0x0) 23:07:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) mkdirat(0xffffffffffffffff, 0x0, 0x0) 23:07:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 393.574373] audit: type=1326 audit(1551827232.621:49): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16466 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0xffff0000 23:07:12 executing program 1: r0 = socket$inet(0x2, 0x801, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000600)={'filter\x00'}, 0x0) 23:07:12 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, 0x0, 0x0) 23:07:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:12 executing program 4: r0 = socket$kcm(0xa, 0x2, 0x73) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bind$inet6(r0, 0x0, 0x0) 23:07:13 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0xffffffffffffffff) mount(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000a40)='ramfs\x00', 0x0, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0/file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file1/file0\x00', 0x0) statfs(&(0x7f0000000080)='./file0/file1/file1\x00', &(0x7f00000001c0)=""/250) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x40000fffffd, 0x0) syz_open_dev$evdev(&(0x7f0000072fee)='/dev/input/event#\x00', 0x0, 0x2) syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') socket$inet6(0xa, 0x0, 0x102) syz_open_dev$evdev(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000740), &(0x7f0000000780)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() mremap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x1000, 0x2, &(0x7f0000ffc000/0x1000)=nil) r2 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000000880)={@un=@abs={0x1, 0x0, 0x4e21}, {0x0}}, 0x9c) fcntl$setown(r2, 0x8, r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x1ff) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000580)={0x0, 0x20, 0x8009, 0x5, 0xabdf, 0x49, 0x2, 0x7}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, &(0x7f0000000200)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz0\x03', 0x1ff) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="30000000310001000000000000000000000000001c00010018001a00000010000100636f6e6e6d61726b0000000000001df0faa62283b863e1f9809bc52e73ef44ae5b26436d60d0ff61b0d95b2d00f5b29c826010ab15a5af4d653fb6936e2f800900000000000013c1f06ee434d06b36e9b8acd862727808bae574626b18b6380504afadf3b076b6f301aacd7b8354289979f25626ff0e6534323a05f3c5b36728c76bf72b234eb33465602c6e0800537b633ace71c8b52f9e872418b713e1c65f5f18bbd88d22f1c002f6a3279d8d68cbf99224b3c2f9d2fd5eb8f57a4c618b1ed5ac9a8dcc69e893f232323767ab7e318a510017eec866"], 0x1}}, 0x800) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, 0x0) getresuid(0x0, &(0x7f0000000600), &(0x7f0000000640)) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x20000, 0x0) [ 394.020336] audit: type=1326 audit(1551827233.061:50): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=16448 comm="syz-executor.2" exe="/root/syz-executor.2" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0xffff0000 23:07:13 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f0000000540)) timer_getoverrun(0x0) 23:07:13 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 23:07:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") openat$sequencer2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer2\x00', 0x181640, 0x0) 23:07:13 executing program 5: 23:07:13 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000080)=ANY=[@ANYBLOB='[']) 23:07:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:13 executing program 4: 23:07:14 executing program 1: 23:07:14 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sync() r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x10, r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040), 0xc, 0x0}, 0x0) ptrace(0x11, r0) 23:07:14 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x15, 0x10, 0x3, 0x0, 0x4}, 0x2c) 23:07:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:14 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000040)='cifs.spnego\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000240)='ceph\x00', &(0x7f0000000280)={'syz'}, 0x0, 0xfffffffffffffffe) 23:07:14 executing program 4: 23:07:14 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030383030303030703030303034103030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="ab78472e3d", @ANYRESDEC=0x0, @ANYBLOB=',default_permis}ions,\x00']) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x404002, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x13, &(0x7f00000002c0)='default_permissions', 0xffffffffffffffff}, 0x30) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) r4 = getegid() prctl$PR_MCE_KILL(0x21, 0x1, 0x1) sendmsg$unix(r1, &(0x7f0000000440)={&(0x7f0000000080)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000000280), 0x0, &(0x7f0000000400)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}], 0x20, 0x2000c040}, 0x4014) execve(&(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x0) utimensat(r1, &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000480)={{0x0, 0x2710}}, 0x100) 23:07:14 executing program 1: [ 395.462590] net_ratelimit: 26 callbacks suppressed [ 395.462610] protocol 88fb is buggy, dev hsr_slave_0 [ 395.473291] protocol 88fb is buggy, dev hsr_slave_1 [ 395.479152] protocol 88fb is buggy, dev hsr_slave_0 [ 395.484813] protocol 88fb is buggy, dev hsr_slave_1 [ 395.490676] protocol 88fb is buggy, dev hsr_slave_0 [ 395.496352] protocol 88fb is buggy, dev hsr_slave_1 [ 395.502225] protocol 88fb is buggy, dev hsr_slave_0 [ 395.507830] protocol 88fb is buggy, dev hsr_slave_1 23:07:14 executing program 5: 23:07:14 executing program 1: 23:07:14 executing program 4: 23:07:14 executing program 2: [ 395.702773] protocol 88fb is buggy, dev hsr_slave_0 [ 395.708589] protocol 88fb is buggy, dev hsr_slave_1 23:07:14 executing program 5: 23:07:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:15 executing program 1: 23:07:15 executing program 5: 23:07:15 executing program 4: 23:07:15 executing program 2: 23:07:15 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303034303030302c757365696c7afd97578ae6725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) r1 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x0, 0x8c401) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000180)={0x400, 0x100}) clone(0x880100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:15 executing program 1: 23:07:15 executing program 4: 23:07:15 executing program 2: 23:07:15 executing program 5: 23:07:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:15 executing program 5: 23:07:15 executing program 1: 23:07:15 executing program 4: 23:07:15 executing program 2: 23:07:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x8000, 0x0) getsockname$unix(r0, &(0x7f0000000080), &(0x7f0000000280)=0x6e) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:16 executing program 1: 23:07:16 executing program 2: 23:07:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 23:07:16 executing program 5: 23:07:16 executing program 4: 23:07:16 executing program 1: 23:07:16 executing program 2: 23:07:16 executing program 4: 23:07:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 23:07:16 executing program 1: 23:07:16 executing program 5: 23:07:16 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18, 0xffffffffffffffda, 0x8, {0x1}}, 0x18) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:16 executing program 2: 23:07:16 executing program 4: 23:07:16 executing program 5: 23:07:16 executing program 1: 23:07:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 23:07:17 executing program 2: 23:07:17 executing program 1: 23:07:17 executing program 5: 23:07:17 executing program 4: 23:07:17 executing program 2: 23:07:17 executing program 4: 23:07:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000240)={0x4, 0x0, 0x80000001, 0x1e, &(0x7f0000000080)=""/30, 0x3a, &(0x7f00000000c0)=""/58, 0xfe, &(0x7f0000000340)=""/254}) execve(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 23:07:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:17 executing program 5: 23:07:17 executing program 1: 23:07:17 executing program 2: 23:07:17 executing program 4: 23:07:18 executing program 1: 23:07:18 executing program 5: 23:07:18 executing program 4: 23:07:18 executing program 2: 23:07:18 executing program 5: 23:07:18 executing program 1: 23:07:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:18 executing program 2: 23:07:18 executing program 4: 23:07:18 executing program 5: 23:07:18 executing program 1: 23:07:18 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) execve(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000003c0)=[&(0x7f0000000080)='group_id', &(0x7f00000000c0)='default_permissions', &(0x7f0000000280)='fd', &(0x7f00000002c0)='mime_typesystem%-*-\x00', &(0x7f0000000340)='fd', &(0x7f0000000380)='rootmode'], &(0x7f0000000580)=[&(0x7f0000000400)='!}{em0#selfwlan0[$user\x00', &(0x7f0000000440)='eth1(}\x00', &(0x7f0000000480)='fd', &(0x7f00000004c0)='eth0eth1\xd1mime_type{\x93vmnet0vmnet0\x00', &(0x7f0000000500)='md5sum@*}\x00', &(0x7f0000000540)='user_id']) 23:07:19 executing program 4: 23:07:19 executing program 1: 23:07:19 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20, @local}, 0x45) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") sendto$inet(r0, 0x0, 0x0, 0x1000000020000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000280), 0xfffffffffffffedd, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xf9a000)=nil, 0xf9a000, 0x1, 0x32, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) 23:07:19 executing program 5: 23:07:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:19 executing program 4: [ 400.332932] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:07:19 executing program 5: 23:07:19 executing program 1: 23:07:19 executing program 4: 23:07:19 executing program 5: 23:07:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:apt_var_lib_t:s0\x00', 0x23, 0x3) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:19 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r0, 0xae80, 0x0) 23:07:19 executing program 2: 23:07:19 executing program 1: 23:07:20 executing program 4: 23:07:20 executing program 5: 23:07:20 executing program 2: 23:07:20 executing program 1: 23:07:20 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r0, 0xae80, 0x0) 23:07:20 executing program 5: 23:07:20 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:20 executing program 4: 23:07:20 executing program 1: 23:07:20 executing program 5: 23:07:20 executing program 2: 23:07:20 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r0, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r0, 0xae80, 0x0) 23:07:20 executing program 4: [ 401.702501] net_ratelimit: 26 callbacks suppressed [ 401.702523] protocol 88fb is buggy, dev hsr_slave_0 [ 401.713316] protocol 88fb is buggy, dev hsr_slave_1 [ 401.719218] protocol 88fb is buggy, dev hsr_slave_0 [ 401.724905] protocol 88fb is buggy, dev hsr_slave_1 [ 401.730818] protocol 88fb is buggy, dev hsr_slave_0 [ 401.736523] protocol 88fb is buggy, dev hsr_slave_1 [ 401.742463] protocol 88fb is buggy, dev hsr_slave_0 [ 401.748106] protocol 88fb is buggy, dev hsr_slave_1 23:07:20 executing program 2: 23:07:21 executing program 4: [ 401.942671] protocol 88fb is buggy, dev hsr_slave_0 [ 401.948594] protocol 88fb is buggy, dev hsr_slave_1 23:07:21 executing program 5: 23:07:21 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r1, 0xae80, 0x0) 23:07:21 executing program 1: 23:07:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cff656661756c745f7065726d694000696f6e732c00"]) clone(0x32200001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ustat(0x0, &(0x7f0000000040)) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:21 executing program 5: 23:07:21 executing program 2: 23:07:21 executing program 4: 23:07:21 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r1, 0xae80, 0x0) 23:07:21 executing program 1: 23:07:21 executing program 1: 23:07:21 executing program 2: 23:07:21 executing program 4: 23:07:21 executing program 5: 23:07:21 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r1, 0xae80, 0x0) 23:07:21 executing program 1: 23:07:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) gettid() clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:22 executing program 4: 23:07:22 executing program 2: 23:07:22 executing program 5: 23:07:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c888c9ff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:22 executing program 1: 23:07:22 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'hash\x00', 0x0, 0x0, 'sha512\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) accept$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x0) 23:07:22 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom(r1, 0x0, 0x0, 0x2, 0x0, 0x0) shutdown(r1, 0x0) 23:07:22 executing program 4: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x12, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000950000ad7ae92e6fe1c40ee79fa3a3bde6e248cc39683d457973a81e068925420f5d33370689370a2237bb45e158ce035ca943707d6788df58251351702c1f94765adf40057a986202da4bf16f0937ace960991dd6d2992a595cc402e243cf64fcfad48069747a144898eef756ad8ad3f23e4dafb950665b45c8aa38b2f85987"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x48) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000580)='ip6_vti0\x00') 23:07:22 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000b40)='v', 0x1, 0x0, 0x0, 0x0) clock_gettime(0x0, 0x0) recvmmsg(r0, &(0x7f0000006b80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000003e40)=""/230, 0xe6}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000100, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000006e40)={{{@in=@local, @in=@broadcast, 0x4e21, 0x0, 0x4e21, 0x0, 0x0, 0xa0, 0x0, 0xff}, {0x1, 0xffff, 0x401, 0x484bd41b, 0x0, 0x13d, 0x10000, 0xbf8}, {0x70, 0x1, 0x401}, 0x19ad, 0x0, 0x1, 0x1}, {{@in=@empty, 0x4d3, 0x3c}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x6, 0x1, 0x0, 0x0, 0x3, 0x10001}}, 0xe8) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000002c0)=0xda8, 0x171) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f00000001c0)={{0x5, 0x8, 0xfffffffffffffff9, 0xfffffffffffffff8}, 'syz1\x00', 0x3a}) 23:07:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:22 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ftruncate(0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x7}, 0xff7f) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) 23:07:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643dff172f2d327d24c109e2fbc101d6333d13ca123118dad2c07de416157c1a0099f93190c656039298562d77a25e73d5d510e9611b480472ce20c39c22437f65b6bb59b2b46e530442272dc8a1b1fad9433310da4c55e84f22076ad2a27dc6aebab1f407511730750c96a398600992472cc745f00b32f4ca2d3336ed8b558b60c756b3456bc197cfe97cc6dc4a62cdfbf07518a13d040b8da0272c48f7e53c62f3cdd0af2f9d3a423cb073df187f52a1c81c1af4e757d37779f305ddb732c8f17189ad60e1752ee00c3a0f096f984dd3ba23c03ee5c9", @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,\x00']) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000340)) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="230000001e0081aee4050c00000f0000008bc36f7d79ce3263dac37b7403242189c609", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000001880)=""/83, 0x53}, {&(0x7f0000001900)=""/209, 0xd1}], 0x2, &(0x7f0000001a40)}, 0x10120) perf_event_open(&(0x7f0000001b00)={0x7, 0x70, 0x9, 0x3ff, 0x8000, 0x5, 0x0, 0x7, 0x402a4, 0x2, 0x3, 0x3, 0xb41a, 0x2, 0x9, 0x1, 0xd6, 0x3ff, 0x7, 0x86, 0x6, 0x1, 0x9, 0x7, 0x7, 0xcac, 0xd36e405, 0x6a456282, 0x4, 0x1c0000000, 0xffffffffffffffff, 0x8000, 0x618, 0x37d, 0xfffffffffffffffb, 0x9, 0xb5e, 0xfffffffffffffffa, 0x0, 0x10000, 0x3, @perf_config_ext={0x8, 0x77bdec95}, 0x0, 0x10000, 0x3, 0x0, 0x7, 0x4f6, 0x1}, 0x0, 0x10, 0xffffffffffffffff, 0x3) socketpair(0xa, 0x7, 0x40000, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffd9f, &(0x7f0000000100), 0x0, &(0x7f0000001580), 0xfcdb}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000000)) write$cgroup_pid(r1, &(0x7f0000000340), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) r3 = gettid() perf_event_open(&(0x7f0000003fc0)={0x4, 0x70, 0x6, 0x10001, 0x8, 0x4, 0x0, 0xc37, 0x220, 0x8, 0xffffffffffff8001, 0x5, 0x20, 0x0, 0x8, 0xffffffffffffffe1, 0x1, 0xa131, 0x2, 0x1f, 0xb50a, 0x35d, 0x3, 0x2, 0x1, 0xac, 0x2, 0x0, 0x1, 0xfff, 0x101, 0x8, 0x3, 0xffffffff, 0x4, 0x8d, 0x100, 0xfffffffffffff000, 0x0, 0x7, 0x1, @perf_config_ext={0x3, 0x1}, 0x4000, 0x0, 0x3, 0x0, 0x3b7, 0x5, 0xff}, r3, 0x10, r2, 0xa) 23:07:23 executing program 4: r0 = socket(0xa, 0x80803, 0x3) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@abs, 0x6e) ioctl$sock_SIOCINQ(r0, 0x541b, 0x0) 23:07:23 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x26102) ftruncate(r1, 0x208200) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$P9_RREMOVE(r4, &(0x7f0000000280)={0x7}, 0xff7f) pread64(r2, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r3, 0xc028660f, &(0x7f0000000100)={0x0, r4}) 23:07:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 404.327619] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.2'. 23:07:23 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 404.411336] netlink: 7 bytes leftover after parsing attributes in process `syz-executor.2'. 23:07:23 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) capget(0x0, &(0x7f0000000100)={0x0, 0x0, 0x3, 0x3f, 0x4}) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r2, 0x111, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x1, 0x20000, r1, &(0x7f0000000000), 0xfffffce4}]) 23:07:23 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write$cgroup_type(r1, &(0x7f0000000080)='threaded\x00', 0x9) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10002, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, 0x0, 0x20000080) 23:07:23 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r1, 0xae80, 0x0) 23:07:23 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) close(r0) 23:07:23 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) [ 404.978609] syz-executor.2 (17580) used greatest stack depth: 53904 bytes left 23:07:24 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) [ 405.308358] binder: 17589:17591 transaction failed 29189/-22, size 0-0 line 2896 [ 405.335613] binder: undelivered TRANSACTION_ERROR: 29189 [ 406.332783] device bridge_slave_1 left promiscuous mode [ 406.338777] bridge0: port 2(bridge_slave_1) entered disabled state [ 406.373531] device bridge_slave_0 left promiscuous mode [ 406.379410] bridge0: port 1(bridge_slave_0) entered disabled state [ 406.555077] device hsr_slave_1 left promiscuous mode [ 406.617144] device hsr_slave_0 left promiscuous mode [ 406.666370] team0 (unregistering): Port device team_slave_1 removed [ 406.678796] team0 (unregistering): Port device team_slave_0 removed [ 406.689922] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 406.728121] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 406.823241] bond0 (unregistering): Released all slaves [ 407.869899] IPVS: ftp: loaded support on port[0] = 21 [ 407.942525] net_ratelimit: 27 callbacks suppressed [ 407.942545] protocol 88fb is buggy, dev hsr_slave_0 [ 407.953189] protocol 88fb is buggy, dev hsr_slave_1 [ 407.959009] protocol 88fb is buggy, dev hsr_slave_0 [ 407.964614] protocol 88fb is buggy, dev hsr_slave_1 [ 407.970497] protocol 88fb is buggy, dev hsr_slave_0 [ 407.976110] protocol 88fb is buggy, dev hsr_slave_1 [ 407.987921] chnl_net:caif_netlink_parms(): no params data found [ 408.037536] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.044059] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.052144] device bridge_slave_0 entered promiscuous mode [ 408.060049] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.066661] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.074349] device bridge_slave_1 entered promiscuous mode [ 408.098623] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 408.109121] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 408.132833] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 408.140827] team0: Port device team_slave_0 added [ 408.147062] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 408.155774] team0: Port device team_slave_1 added [ 408.161477] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 408.170090] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 408.182700] protocol 88fb is buggy, dev hsr_slave_0 [ 408.188241] protocol 88fb is buggy, dev hsr_slave_1 [ 408.262562] protocol 88fb is buggy, dev hsr_slave_0 [ 408.268039] protocol 88fb is buggy, dev hsr_slave_1 [ 408.276617] device hsr_slave_0 entered promiscuous mode [ 408.342274] device hsr_slave_1 entered promiscuous mode [ 408.393216] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 408.400560] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 408.422566] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.429084] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.436390] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.442917] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.504189] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 408.510298] 8021q: adding VLAN 0 to HW filter on device bond0 [ 408.521244] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 408.534511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 408.544182] bridge0: port 1(bridge_slave_0) entered disabled state [ 408.553068] bridge0: port 2(bridge_slave_1) entered disabled state [ 408.561299] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 408.577251] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 408.583632] 8021q: adding VLAN 0 to HW filter on device team0 [ 408.596950] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 408.605182] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.611800] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.634425] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 408.644821] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.651341] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.669560] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 408.679567] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 408.705040] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 408.715197] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 408.730372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 408.743076] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 408.749137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 408.773736] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 408.791285] 8021q: adding VLAN 0 to HW filter on device batadv0 23:07:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) 23:07:27 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r1, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r1, 0xae80, 0x0) 23:07:27 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:27 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f0000000580)="a3", 0x1, 0x0, 0x0, 0x0) 23:07:27 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) close(r0) 23:07:27 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendto$inet(r0, &(0x7f0000000240)="f04e", 0x2, 0x800, 0x0, 0x0) 23:07:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:28 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdeb}}], 0x3fffffffffffd33, 0x0, 0x0) 23:07:28 executing program 4: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000140)=0x100) 23:07:28 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) close(r0) 23:07:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 23:07:28 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) connect$inet6(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:28 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) close(r0) 23:07:28 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x5, 0x2000) read$FUSE(r0, &(0x7f0000000340), 0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001340)='/dev/fuse\x00', 0x2, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x50) ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000280)={[{0xa9a3, 0x3ff, 0x9, 0x7, 0x80, 0xdeb, 0xffffffffffff2aa6, 0x480000000000, 0x1, 0x7, 0x800, 0x3, 0x100000000}, {0x3, 0x8001, 0xea, 0x3f, 0x3a6, 0x93b9, 0xd8, 0x1000, 0x2, 0x8, 0x9, 0x7, 0x7}, {0x8000, 0x1, 0x2, 0x2, 0x3, 0x40, 0x1, 0x7, 0xca1, 0x7fffffff, 0x1, 0x3, 0x80}], 0x6b22}) mount$fuse(0x0, &(0x7f0000001480)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001640)=ANY=[@ANYBLOB="66643dae26e62d0ea77962fd7673026dfb0680d7714c", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYRESOCT=r1, @ANYRESDEC=r1, @ANYRES64=r1], @ANYRESDEC=0x0, @ANYBLOB="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"]) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={0x0, @multicast2, @initdev}, &(0x7f0000001380)=0xc) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f00000000c0)={0x0, 0x5, 0x80000000, 0x3, 'syz0\x00', 0x401}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000013c0)={0x0, 0x1f}, &(0x7f0000001400)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000001440)={r2, 0xaab}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000140)={0x3}) 23:07:29 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:29 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x2, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) 23:07:29 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 23:07:32 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f00000000c0)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x4007ff9, 0x0, 0x0) 23:07:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c888c9ff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x101, 0x8, 0x3, 0x3, 0xb87}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={r2, 0xd0f, 0x7}, 0x8) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:32 executing program 4: r0 = socket$inet6(0xa, 0x803, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bond_slave_0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="170000000000ff"]}) 23:07:32 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) [ 413.302463] net_ratelimit: 30 callbacks suppressed [ 413.302484] protocol 88fb is buggy, dev hsr_slave_0 [ 413.313134] protocol 88fb is buggy, dev hsr_slave_1 23:07:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:32 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r1, 0x6) setsockopt(r2, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000100)={{0x0, @loopback, 0x0, 0x0, 'sed\x00'}, {@broadcast}}, 0x44) connect$inet(r2, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r2, &(0x7f000000a080)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) shutdown(r1, 0x0) 23:07:32 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=[{0x18, 0x1, 0x1, "01"}], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) [ 413.547735] IPVS: set_ctl: invalid protocol: 0 127.0.0.1:0 23:07:32 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) [ 413.658213] IPVS: set_ctl: invalid protocol: 0 127.0.0.1:0 23:07:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6101c00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x30}]}, &(0x7f0000000080)='sy\xdb\x8d\x18I\xb4\x10\x8e\x01', 0x7, 0x49e, &(0x7f0000000380)=""/251, 0x0, 0x1}, 0x48) 23:07:32 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a00001500000000000000000000001300090050040000d8ce95c5c98d506c0fa3c2bf969e38b91ccc20e9745dbfadde92737575d3d8ce380f6dfb1512e6e0e844886a27793bf45b3ec42c29a1daf89562eedf8e9dc68c27fa9efb067d33c7983c3bf6652b59e5a23f18ff3a87ef8a2fd830767121733ab7da9cf81eb31222282b467e23d0b6a70fb9aeadc96a775cd1d74826000000160000"], 0x9a}}, 0x0) [ 414.182398] protocol 88fb is buggy, dev hsr_slave_0 [ 414.188131] protocol 88fb is buggy, dev hsr_slave_1 [ 414.194090] protocol 88fb is buggy, dev hsr_slave_0 [ 414.199699] protocol 88fb is buggy, dev hsr_slave_1 [ 414.205644] protocol 88fb is buggy, dev hsr_slave_0 [ 414.211240] protocol 88fb is buggy, dev hsr_slave_1 23:07:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x8c000, 0x0) write$smack_current(r1, &(0x7f0000000080)='\x00', 0x1) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:33 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:33 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) 23:07:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6101c00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x30}]}, &(0x7f0000000080)='sy\xdb\x8d\x18I\xb4\x10\x8e\x01', 0x7, 0x49e, &(0x7f0000000380)=""/251, 0x0, 0x1}, 0x48) 23:07:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001940)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e0000001d008183ad5de087185082cf0124b0eba0070060002339a00576f9835b3f00009148700000f85ac47c45", 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) [ 414.422526] protocol 88fb is buggy, dev hsr_slave_0 [ 414.428262] protocol 88fb is buggy, dev hsr_slave_1 [ 414.446961] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. [ 414.493201] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 23:07:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:33 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:33 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket$inet(0x2, 0x3, 0x7f) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000300)='ip6gretap0\x00', 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) 23:07:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6101c00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x30}]}, &(0x7f0000000080)='sy\xdb\x8d\x18I\xb4\x10\x8e\x01', 0x7, 0x49e, &(0x7f0000000380)=""/251, 0x0, 0x1}, 0x48) 23:07:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x3, 0x101000) write$P9_RSTAT(r1, &(0x7f0000000080)={0x4a, 0x7d, 0x2, {0x0, 0x43, 0x3, 0x6, {0x40, 0x0, 0x3}, 0x8080000, 0x4, 0x9, 0x3f, 0xff8f, 'GPLem0', 0xffffffffffffffb8, 'rootmode', 0x0, '', 0x2, 'fd'}}, 0x4a) ioctl$DRM_IOCTL_AGP_FREE(r1, 0x40206435, &(0x7f0000000280)={0x7ff, 0x0, 0x3, 0x2}) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:33 executing program 2: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:34 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 23:07:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6101c00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x30}]}, &(0x7f0000000080)='sy\xdb\x8d\x18I\xb4\x10\x8e\x01', 0x7, 0x49e, &(0x7f0000000380)=""/251, 0x0, 0x1}, 0x48) 23:07:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$adsp(&(0x7f0000000540)='/dev/adsp#\x00', 0x1, 0x80) getsockname(r1, &(0x7f0000000580)=@nfc_llcp, &(0x7f0000000600)=0x80) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) [ 415.167138] binder: 17779:17780 transaction failed 29189/-22, size 0-0 line 2896 [ 415.217475] binder: undelivered TRANSACTION_ERROR: 29189 23:07:34 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 23:07:34 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = accept$packet(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x20080400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x880}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) socketpair(0x3, 0x0, 0x40, 0x0) sendto$inet(r1, &(0x7f0000000580)="a3", 0x1, 0x0, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000640)=ANY=[@ANYBLOB="858a030000000000000057ac008f6f4a34328382df63dd7b58d057d483c391c600c6fa0688a69404ba734e91f3813956096a5fb2bf3f35be7ac08e0cd1d437da199701800000000000000000e89bcbdd527b6d20602febf51a3c8ed0b2e8ebb8fc704b21856fa38356434b0ca7a8a800dd567d6e75250490540dab3c98836e20dd8181a2610ad4df0000000000000000000038ce7a2d53c877400f18d3358dcbf721d17ee438a394598d9469d8490509fa933b0ad5fafb7954d9a87ad8a42b5b507288f2d2d81676d4d5c3"], 0xcb) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x0, 0x6, 0x8, 0x0, 0x3, 0x1ff}) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x4e22, @loopback}, 0x10) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f0000000100)=0x1e) ioctl$sock_netdev_private(0xffffffffffffffff, 0x89f8, &(0x7f0000000740)="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") getsockname(0xffffffffffffffff, 0x0, &(0x7f0000000300)) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[], 0x10000016b) ioctl$sock_proto_private(r2, 0x89e9, &(0x7f0000000240)) sendto$inet(r1, &(0x7f0000000540)='?', 0x1, 0x20000001, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bc070") 23:07:34 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4002002102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) r1 = dup(r0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000000)) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x48400, 0x0) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000080)) 23:07:34 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 23:07:34 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x100, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000080)=""/142) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:34 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 23:07:34 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:35 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 23:07:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 23:07:35 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) 23:07:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000040)=0xf46, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000140)=0x3ff, 0x4) 23:07:35 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) 23:07:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x2000, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$TUNSETFILTEREBPF(r1, 0x800454e1, &(0x7f00000000c0)=r2) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file0/file0\x00', 0x0, 0x0) 23:07:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6101c00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x30}]}, &(0x7f0000000080)='sy\xdb\x8d\x18I\xb4\x10\x8e\x01', 0x7, 0x49e, &(0x7f0000000380)=""/251, 0x0, 0x1}, 0x48) 23:07:35 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:35 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000a40)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10010174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde317fad4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d4bf6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28a774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a80047fe17dee6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c888c9ff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)='\x00', 0x0) fcntl$setlease(r0, 0x400, 0x1) fcntl$setown(r0, 0x8, 0x0) execveat(r0, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) 23:07:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6101c00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x30}]}, &(0x7f0000000080)='sy\xdb\x8d\x18I\xb4\x10\x8e\x01', 0x7, 0x49e, &(0x7f0000000380)=""/251, 0x0, 0x1}, 0x48) 23:07:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:36 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) shutdown(r0, 0x0) 23:07:36 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) close(r1) close(r0) 23:07:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4002, 0x0) io_setup(0x5b3, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000001540)=[&(0x7f0000000140)={0x0, 0x0, 0xf000000000001b, 0x0, 0x0, r0, 0x0}]) 23:07:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6101c00}, [@alu={0x8000000201a7fe3, 0x0, 0x7, 0x61, 0x0, 0x30}]}, &(0x7f0000000080)='sy\xdb\x8d\x18I\xb4\x10\x8e\x01', 0x7, 0x49e, &(0x7f0000000380)=""/251, 0x0, 0x1}, 0x48) 23:07:36 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x8, 0x0, 0x0, &(0x7f0000000080)='sy\xdb\x8d\x18I\xb4\x10\x8e\x01', 0x7, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x1}, 0x48) 23:07:36 executing program 4: write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) recvmmsg(0xffffffffffffffff, &(0x7f0000001c00)=[{{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000800)=""/65, 0x41}], 0x1, &(0x7f0000000a00)=""/181, 0xb5}}], 0x1, 0x0, &(0x7f0000000040)) timer_create(0x0, &(0x7f00000002c0), 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$FUSE_POLL(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f0000000ac0)={"55c990aa4964e82a3ec457f4c7d69681319b32c4fe546fdaa52a7f1ee7a27d5f71fb895c4bf21bf0301d2a160f646d230ecc224077896302fd1e64ad393ef24145492c44f164e53100dc89f52d25895dcd4320f649fc784145767a5224088c492511d0a5d7bb0c0176706c238dfeee9caae8811ba9d2ec92a4a340c091647ae36123d290d72c375af37957c01aa945bdb6a7a6870069350c7c2ac6b9c032e80d8150743be19fbaf9447badcc1908d174e06fd466e64e24e3c892ee52a4b31338ad67030baeffa5bfa701c1e7bfbd8fd016d87018d05ab11f9e813877bd9cdf0884cbaabe09190f95550884f8a1e6510f6bbe96f86859597bf89741aea068e55b938ebee9d9bff58478513c4b72edbf79f75431b54743ab05d3980b30b2127cf13bf94beba0828a4bb1848bc1f862fac00698e4bd2f4bde3bb35107056c4147c0ed8d7d588ba03c37b82ea384d1db706a8b46ee351812ad747d1045540a48b542996812548270c5af5d27ff72920bebd8371348c7f55a953e236ac13fe737a81bd9b61e30a5e9c526cf61862f5a0a90963c73febe3b66ab29f17b6da74b7647bcc4e527356d57fa1fe3f3dffab39df7b353eda6b839decb4484939f4fc0c84bda1c964941ccf4db1ca0d2c152fd356ac66441c8b68755d533b416d9f7999678227c7a69db08e997252dd6a38fc458d93fac9f1f14f49b7ca4a0b0c8b538d2f30c34503a0975506ae9004b3e5c3d2469cf4e03d9b79dc1499647b5b680a02bdc56c18782c48120dee663918288f068c49d85355d114cfe0c5d1405cf5e37b181f296fa7dc9af116fbe220121fe139739226eefce468f27f5d21ab51ef0e26134c5341cf13799003ceb38d4050c2ba1c9e6decc2d11a8f14a6adadd45e615106b5dd4c07093ba114ac55b4e80d1a3545ab6e8fbf796b908ecc244340fc06e4d4bd6e069b7f0232198ab067a709bcdd4d41500e5dc7032e5993f965d4603033fe61cc523937d7345df42b4f1b62c4daf64f6c29eb2f214b88680bfe19252b67719ccea37d19fe3bfb0c8ad0bd6f4a1df532ec9220269453df5144ff48f63c2ad655b8f20db01b3af95c11f4e7de2bd0a47d47b08b620589a33327bef9ee310505c1736510e88b74281f098099c753d30fcf32f31a0521e32407d689b093f24d07049682ff4662b5b94616699fd704589c0edb02cf3e622088c685564b0c166f9f3cdb12dd8a70684ac6e24570191dda2db2b1965d2397a45060f834405b81fa79204e029b7cd93333dfbef669f3e480fd071f5b87e9fdf984dfe176353ed12ea15484366548336f540a5f1e8b9e19bdeb8d71dce9ecf03d09515bc4bcf7be382176e7e12395ee0f795f76695d0d90eee181d300deb89d7098403ac76309e63f6ca3eade1ce57dcd9de56e24610ed5c470d5540e9f50d068ee8a1431bb3216ae99b18"}) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x105040, 0x0) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f0000000240)={0xfff, 0x7, 0x80000000, 0x7f, 0x17, 0x9, 0xa2b, 0x9, 0x1, 0x1, 0x0, 0x17}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, &(0x7f0000000100)="66b91000004066b80000000066ba000000000f30baa000eddb8f05000f89ae6a660f3a22efa80f09f00fc709f20f1ab60d0066b93608000066b80000000066ba008000000f3066b9800000c00f326635000800000f30", 0x56}], 0x1, 0x0, &(0x7f0000000280), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) 23:07:36 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) close(r1) close(r0) 23:07:36 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 418.124139] kvm: pic: non byte read [ 418.138599] kvm: pic: non byte read [ 418.159246] kvm: pic: non byte read [ 418.168735] kvm: pic: non byte read [ 418.182918] kvm: pic: non byte read [ 418.195898] kvm: pic: non byte read [ 418.222287] kvm: pic: non byte read 23:07:37 executing program 0: r0 = syz_open_dev$video(&(0x7f00000002c0)='/dev/video#\x00', 0x5, 0x0) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, 0x0) 23:07:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x8, 0x0, 0x0, &(0x7f0000000080)='sy\xdb\x8d\x18I\xb4\x10\x8e\x01', 0x7, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x1}, 0x48) 23:07:37 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) close(r1) close(r0) [ 418.233731] kvm: pic: non byte read [ 418.250443] kvm: pic: non byte read [ 418.265257] kvm: pic: non byte read [ 418.342668] net_ratelimit: 16 callbacks suppressed [ 418.342689] protocol 88fb is buggy, dev hsr_slave_0 [ 418.353418] protocol 88fb is buggy, dev hsr_slave_1 [ 418.359310] protocol 88fb is buggy, dev hsr_slave_0 [ 418.365060] protocol 88fb is buggy, dev hsr_slave_1 [ 418.370979] protocol 88fb is buggy, dev hsr_slave_0 [ 418.377446] protocol 88fb is buggy, dev hsr_slave_1 23:07:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x8, 0x0, 0x0, &(0x7f0000000080)='sy\xdb\x8d\x18I\xb4\x10\x8e\x01', 0x7, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x1}, 0x48) [ 418.584253] protocol 88fb is buggy, dev hsr_slave_0 [ 418.591704] protocol 88fb is buggy, dev hsr_slave_1 23:07:37 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r1) close(r0) 23:07:37 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r0, &(0x7f0000007d80), 0x6, 0x0) [ 418.664238] protocol 88fb is buggy, dev hsr_slave_0 [ 418.672883] protocol 88fb is buggy, dev hsr_slave_1 [ 418.822255] kvm_hv_set_msr: 20 callbacks suppressed [ 418.822545] kvm [17908]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000058 data 0x0 23:07:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x8, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6101c00}}, &(0x7f0000000080)='sy\xdb\x8d\x18I\xb4\x10\x8e\x01', 0x7, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x1}, 0x48) [ 418.905729] kvm [17908]: vcpu0, guest rIP: 0x9112 Hyper-V uhandled wrmsr: 0x40000050 data 0x0 23:07:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) close(r0) 23:07:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:38 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r1) close(r0) 23:07:38 executing program 0: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_PARM(r0, 0xc0cc5616, &(0x7f0000000200)={0x3}) 23:07:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x8, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6101c00}}, &(0x7f0000000080)='sy\xdb\x8d\x18I\xb4\x10\x8e\x01', 0x7, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x1}, 0x48) 23:07:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:38 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='sysfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x100000, 0x0) clone(0x70024000, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x7a04, 0x0) 23:07:38 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f00000003c0), 0x0, 0x3}, 0x20) 23:07:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:38 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) close(r1) close(r0) 23:07:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0xffffff11, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x8, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6101c00}}, &(0x7f0000000080)='sy\xdb\x8d\x18I\xb4\x10\x8e\x01', 0x7, 0xfb, &(0x7f0000000380)=""/251, 0x0, 0x1}, 0x48) 23:07:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x3d1) write$binfmt_elf64(r1, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"], 0xc2f) 23:07:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000000)=0xffffffffffffffff) ioctl$int_in(r0, 0x800000005452, &(0x7f0000000100)=0xc8) shutdown(r1, 0x2) 23:07:39 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) close(r0) 23:07:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x0, 0x0, 0x0) 23:07:39 executing program 4: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x4, 0x0, 0x0) 23:07:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6101c00}, [@alu={0x0, 0x0, 0x7, 0x61, 0x0, 0x30}]}, &(0x7f0000000080)='sy\xdb\x8d\x18I\xb4\x10\x8e\x01', 0x7, 0x49e, &(0x7f0000000380)=""/251, 0x0, 0x1}, 0x48) 23:07:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x0, 0x0, 0x0) 23:07:39 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) close(r0) 23:07:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x40, 0xa9, 0xa37, 0x1, 0x1}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000002800000850000000000000095"], 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x6, 0x4, &(0x7f0000000040)=@raw=[@map={0x18, 0x2, 0x1, 0x0, r0}, @call={0x85, 0x0, 0x0, 0x2c}], &(0x7f0000000140)='GPL\x00', 0x41, 0xffc4, &(0x7f00000004c0)=""/167}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000700)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="ba58d6fcaccb7ffce16e1bcfe23b", 0x0, 0x1eed}, 0x28) 23:07:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6101c00}, [@alu={0x0, 0x0, 0x7, 0x61, 0x0, 0x30}]}, &(0x7f0000000080)='sy\xdb\x8d\x18I\xb4\x10\x8e\x01', 0x7, 0x49e, &(0x7f0000000380)=""/251, 0x0, 0x1}, 0x48) 23:07:39 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x44, 0x0, &(0x7f0000000080)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 23:07:39 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x0, 0x0, 0x0) 23:07:39 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r1) close(r0) [ 420.934542] binder: 18034:18035 transaction failed 29189/-22, size 0-0 line 2896 23:07:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f0000000140)=[{&(0x7f0000000280)="480000001400199009004b0101048c592c880900000000000000fe5f0028213ee20600d4ff5bffff00c7e5ed5e00000000c80000000000000000f5ffffffffffffff00eaf60d1812", 0x48}], 0x1) 23:07:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:40 executing program 0: r0 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000100)={0x0, 0x0, 0x0}) 23:07:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6101c00}, [@alu={0x0, 0x0, 0x7, 0x61, 0x0, 0x30}]}, &(0x7f0000000080)='sy\xdb\x8d\x18I\xb4\x10\x8e\x01', 0x7, 0x49e, &(0x7f0000000380)=""/251, 0x0, 0x1}, 0x48) [ 421.138580] binder: undelivered TRANSACTION_ERROR: 29189 23:07:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:40 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(0xffffffffffffffff) close(r0) 23:07:40 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) shutdown(r0, 0x0) 23:07:40 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) 23:07:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r1, &(0x7f00000014c0)=ANY=[@ANYBLOB="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"], 0x438) 23:07:40 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000040), &(0x7f00000000c0)=0x68) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) close(0xffffffffffffffff) close(r0) 23:07:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa6101c00}, [@alu={0x8000000201a7fe3, 0x0, 0x0, 0x61, 0x0, 0x30}]}, &(0x7f0000000080)='sy\xdb\x8d\x18I\xb4\x10\x8e\x01', 0x7, 0x49e, &(0x7f0000000380)=""/251, 0x0, 0x1}, 0x48) 23:07:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000a40)={"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"}) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, &(0x7f0000000080)=0x3) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:07:41 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x6) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) shutdown(r0, 0x0) 23:07:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x8, 0x0, 0x0, @remote, @local, {[], @udp={0x0, 0x0, 0x8}}}}}}, 0x0) [ 422.112475] ================================================================== [ 422.120058] BUG: KMSAN: uninit-value in gue6_err+0x475/0xc40 [ 422.125879] CPU: 0 PID: 9 Comm: ksoftirqd/0 Not tainted 5.0.0-rc1+ #10 [ 422.132548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.141917] Call Trace: [ 422.144555] dump_stack+0x173/0x1d0 [ 422.148238] kmsan_report+0x12e/0x2a0 [ 422.152074] __msan_warning+0x82/0xf0 [ 422.155917] gue6_err+0x475/0xc40 [ 422.159430] ? fou6_build_header+0x640/0x640 [ 422.163928] __udp6_lib_err+0x18d0/0x2590 [ 422.168176] udpv6_err+0x118/0x130 [ 422.171752] icmpv6_notify+0x462/0x9f0 [ 422.175666] ? udpv6_rcv+0x70/0x70 [ 422.179236] icmpv6_rcv+0x18ac/0x3fa0 [ 422.183141] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 422.188360] ? icmpv6_sk_exit+0x2c0/0x2c0 [ 422.192610] ip6_protocol_deliver_rcu+0xb5a/0x23a0 [ 422.197596] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 422.202850] ip6_input+0x2b6/0x350 [ 422.206432] ? ip6_input+0x350/0x350 [ 422.210172] ? ip6_protocol_deliver_rcu+0x23a0/0x23a0 [ 422.215384] ip6_rcv_finish+0x4e7/0x6d0 [ 422.219389] ipv6_rcv+0x34b/0x3f0 [ 422.222881] ? local_bh_enable+0x40/0x40 [ 422.227042] process_backlog+0x756/0x10e0 [ 422.231242] ? ip6_rcv_finish+0x6d0/0x6d0 [ 422.235418] ? rps_trigger_softirq+0x2e0/0x2e0 [ 422.240030] net_rx_action+0x78b/0x1a60 [ 422.244070] ? net_tx_action+0xca0/0xca0 [ 422.248225] __do_softirq+0x53f/0x93a [ 422.252085] ? ksoftirqd_should_run+0x30/0x30 [ 422.256602] run_ksoftirqd+0x26/0x50 [ 422.260347] smpboot_thread_fn+0x4d0/0x9f0 [ 422.264625] kthread+0x4a1/0x4e0 [ 422.268004] ? cpu_report_death+0x190/0x190 [ 422.272351] ? schedule_tail+0x1b2/0x410 [ 422.276435] ? kthread_blkcg+0xf0/0xf0 [ 422.280356] ret_from_fork+0x35/0x40 [ 422.284094] [ 422.285736] Uninit was created at: [ 422.289290] kmsan_internal_poison_shadow+0x92/0x150 [ 422.294407] kmsan_kmalloc+0xa6/0x130 [ 422.298219] kmsan_slab_alloc+0xe/0x10 [ 422.302121] __kmalloc_node_track_caller+0xe9e/0xff0 [ 422.307344] __alloc_skb+0x309/0xa20 [ 422.311097] alloc_skb_with_frags+0x1c7/0xac0 [ 422.315670] sock_alloc_send_pskb+0xafd/0x10a0 [ 422.320272] sock_alloc_send_skb+0xca/0xe0 [ 422.324517] __ip6_append_data+0x42ed/0x5dc0 [ 422.328939] ip6_append_data+0x3c2/0x650 [ 422.333012] icmp6_send+0x2f5c/0x3c40 [ 422.336837] icmpv6_send+0xe5/0x110 [ 422.340481] ip6_link_failure+0x5c/0x2c0 [ 422.344596] ndisc_error_report+0x106/0x1a0 [ 422.348930] neigh_invalidate+0x359/0x8e0 [ 422.353089] neigh_timer_handler+0xdf2/0x1280 [ 422.357600] call_timer_fn+0x285/0x600 [ 422.361499] __run_timers+0xdb4/0x11d0 [ 422.365398] run_timer_softirq+0x2e/0x50 [ 422.369475] __do_softirq+0x53f/0x93a [ 422.373276] ================================================================== [ 422.380634] Disabling lock debugging due to kernel taint [ 422.386088] Kernel panic - not syncing: panic_on_warn set ... [ 422.391989] CPU: 0 PID: 9 Comm: ksoftirqd/0 Tainted: G B 5.0.0-rc1+ #10 [ 422.400061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.409423] Call Trace: [ 422.412050] dump_stack+0x173/0x1d0 [ 422.415714] panic+0x3d1/0xb01 [ 422.418975] kmsan_report+0x293/0x2a0 [ 422.422806] __msan_warning+0x82/0xf0 [ 422.426628] gue6_err+0x475/0xc40 [ 422.430134] ? fou6_build_header+0x640/0x640 [ 422.434555] __udp6_lib_err+0x18d0/0x2590 [ 422.438797] udpv6_err+0x118/0x130 [ 422.442378] icmpv6_notify+0x462/0x9f0 [ 422.446297] ? udpv6_rcv+0x70/0x70 [ 422.449879] icmpv6_rcv+0x18ac/0x3fa0 [ 422.453756] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 422.458966] ? icmpv6_sk_exit+0x2c0/0x2c0 [ 422.463133] ip6_protocol_deliver_rcu+0xb5a/0x23a0 [ 422.468106] ? kmsan_get_shadow_origin_ptr+0x60/0x440 [ 422.473352] ip6_input+0x2b6/0x350 [ 422.476923] ? ip6_input+0x350/0x350 [ 422.480662] ? ip6_protocol_deliver_rcu+0x23a0/0x23a0 [ 422.485877] ip6_rcv_finish+0x4e7/0x6d0 [ 422.489884] ipv6_rcv+0x34b/0x3f0 [ 422.493371] ? local_bh_enable+0x40/0x40 [ 422.497456] process_backlog+0x756/0x10e0 [ 422.501647] ? ip6_rcv_finish+0x6d0/0x6d0 [ 422.505827] ? rps_trigger_softirq+0x2e0/0x2e0 [ 422.510423] net_rx_action+0x78b/0x1a60 [ 422.514468] ? net_tx_action+0xca0/0xca0 [ 422.518554] __do_softirq+0x53f/0x93a [ 422.522397] ? ksoftirqd_should_run+0x30/0x30 [ 422.526929] run_ksoftirqd+0x26/0x50 [ 422.530681] smpboot_thread_fn+0x4d0/0x9f0 [ 422.534961] kthread+0x4a1/0x4e0 [ 422.538352] ? cpu_report_death+0x190/0x190 [ 422.542687] ? schedule_tail+0x1b2/0x410 [ 422.546763] ? kthread_blkcg+0xf0/0xf0 [ 422.550667] ret_from_fork+0x35/0x40 [ 422.555158] Kernel Offset: disabled [ 422.558790] Rebooting in 86400 seconds..